CHES

IACR

Workshop on Cryptographic Hardware and Embedded Systems 2006 (CHES 2006)

Yokohama, Japan
Tuesday October 10th - Friday 13th, 2006

[Tuesday, October 10] [Wednesday, October 11] [Thursday, October 12] [Friday, October 13] [Rump Session]

Program

Tuesday, October 10
TimeEvent
18:00 - 20:00 Registration and welcome drink at the conference hotel

Wednesday, October 11
TimeEvent
 SessionAuthorsTitle
8:00 - Registration desk opens
9:00 - 9:10 Welcome to CHES 2006
9:10 - 10:25 Session 1:
Side Channels I

Chair: Marc Joye
Cedric Archambeau, Eric Peeters, Francois-Xavier Standaert, Jean-Jacques Quisquater Template Attacks in Principal Subspaces
Benedikt Gierlichs, Kerstin Lemke-Rust, Christof Paar Templates vs. Stochastic Methods
Francois-Xavier Standaert, Eric Peeters, Cedric Archambeau, Jean-Jacques Quisquater Towards Security Limits of Side-Channel Attacks
10:25 - 10:45Coffee break
10:45 - 11:10 Session 2:
Low Resources

Chair: Elena Trichina
Deukjo Hong, Jaechul Sung, Seokhie Hong, Jongin Lim, Sangjin Lee, Bon-Seok Koo, Changhoon Lee, Donghoon Chang, Jesang Lee, Kitae Jeong, Hyun Kim, Jongsung Kim, Seongtaek Chee HIGHT: A New Block Cipher Suitable for Low-Resource Device
11:10 - 12:00 Invited Talk I
Chair: Mitsuru Matsui
Kazumaro Aoki
NTT
Integer Factoring utilizing PC Cluster
12:00 - 13:20Lunch
13:20 - 14:35 Session 3:
Hardware Attacks and Countermeasures I

Chair: Pierre-Alain Fouque
Sergei Skorobogatov Optically Enhanced Position-Locked Power Analysis
Stefan Mangard, Kai Schramm Pinpointing the Side-Channel Leakage of Masked AES Hardware Implementations
Amir Moradi, Mohammad T. Manzuri Shalmani, Mahmoud Salmasizadeh A Generalized Method of Differential Fault Attack Against AES Cryptosystem
14:35 - 15:25 Session 4:
Special Purpose Hardware

Chair: Tetsuya Izu
Sandeep Kumar, Christof Paar, Jan Pelzl, Gerd Pfeiffer, Manfred Schimmler Breaking Ciphers with COPACOBANA - A Cost-Optimized Parallel Code Breaker
Kris Gaj, Soonhak Kwon, Patrick Baier, Paul Kohlbrenner, Hoang Le, Mohammed Khaleeluddin, Ramakrishna Bachimanchi Implementing the Elliptic Curve Method of Factoring in Reconfigurable Hardware
15:25 - 15:45Coffee break
15:45 - 17:00 Session 5:
Efficient Algorithms for Embedded Processors

Chair: Berk Sunar
Michael Scott, Neil Costigan, Wesam Abdulwahab Implementing Cryptographic Pairings on Smartcards
Toru Akishita, Masanobu Katagi, Izuru Kitamura SPA-resistant Scalar Multiplication on Hyperelliptic Curve Cryptosystems Combining Divisor Decomposition Technique and Joint Regular Form
Marc Joye, Pascal Paillier Fast Generation of Prime Numbers on Portable Devices: An Update
18:20 - 20:20Banquet
20:20 - 22:00 Rump Session -- Chair: Christof Paar

Thursday, October 12
TimeEvent
 SessionAuthorsTitle
8:30 - Registration desk opens
9:00 - 10:40 Session 6:
Side Channels II

Chair: Erkay Savas
Thanh-Ha Le, Jessy Clediere, Cecile Canovas, Bruno Robisson, Christine Serviere, Jean-Louis Lacoume A proposition for Correlation Power Analysis enhancement
Naofumi Homma, Sei Nagashima, Yuichi Imai, Takafumi Aoki, Akashi Satoh High-Resolution Side-Channel Attack Using Phase-Based Waveform Matching
Joseph Bonneau, Ilya Mironov Cache-Collision Timing Attacks Against AES
Emmanuel Prouff, Christophe Giraud, Sebastien Aumonier Provably Secure S-Box Implementation Based on Fourier Transform
10:40 - 11:10Coffee break
11:10 - 12:10 Invited Talk II
Chair: Louis Goubin
Ari Juels
RSA Labs
The Outer Limits of RFID Security
12:10 - 13:30Lunch
13:30 - 14:45 Session 7:
Hardware Attacks and Countermeasures II

Chair: Ingrid Verbauwhede
Marco Bucci, Luca Giancane, Raimondo Luzzi, Alessandro Trifiletti Three-Phase Dual-Rail Pre-Charge Logic
Zhimin Chen, Yujie Zhou Dual-Rail Random Switching Logic: A Countermeasure to Reduce Side Channel Leakage
Daisuke Suzuki, Minoru Saeki Security Evaluation of DPA Countermeasures Using Dual-Rail Pre-charge Logic Style
14:45 - 15:15Coffee break
15:15 - 16:30 Session 8:
Efficient Hardware I

Chair: Akashi Satoh
Stefan Tillich, Johann Grosschadl Instruction Set Extensions for Efficient AES Implementation on 32-bit Processors
Massoud Masoumi, Farshid Raissi, Mahmoud Ahmadian NanoCMOS Molecular Realization of Rijndael
Ricardo Chaves, Georgi Kuzmanov, Leonel Sousa, Stamatis Vassiliadis Improving SHA-2 Hardware Implementations
16:30 - 16:55 Session 9:
Trusted Computing

Chair: Shiho Moriai
Eric Simpson, Patrick Schaumont Offline Hardware/Software Authentication for Reconfigurable Platforms
18:20 Bus departure to excursion
19:15 - 21:30 Excursion in aquarium
21:40 Bus return to hotel

Friday, October 13
TimeEvent
 SessionAuthorsTitle
8:30 - Registration desk opens
9:00 - 10:15 Session 10:
Side Channels III

Chair: Katsuyuki Okeya
Eric Brier, Benoit Chevallier-Mames, Mathieu Ciet, Christophe Clavier Why One Should Also Secure RSA Public Key Elements
Pierre-Alain Fouque, Sebastien Kunz-Jacques, Gwenaelle Martinet, Frederic Muller, Frederic Valette Power Attack on Small RSA Public Exponent
Douglas Stebila, Nicolas Theriault Unified Point Addition Formulae and Side-Channel Attacks
10:15 - 10:45Coffee break
10:45 - 12:00 Session 11:
Hardware Attacks and Countermeasures III

Chair: Frederic Valette
Pim Tuyls, Geert-Jan Schrijen, Boris Skoric, Jan van Geloven, Nynke Verhaegh, Rob Wolters Read-Proof Hardware from Protective Coatings
Fraidy Bouesse, Gilles Sicard, Marc Renaudin Path Swapping Method to Improve DPA resistance of Quasi Delay Insensitive Asynchronous circuits
Konrad Kulikowski, Alexander Smirnov, Alexander Taubin Automated Design of Cryptographic Devices Resistant to Multiple Side-Channel Attacks
12:00 - 13:20Lunch
13:20 - 14:20 Invited Talk III
Chair: Tsutomu Matsumoto
Ahmad Sadeghi
Ruhr University Bochum
Challenges for Trusted Computing
14:20 - 14:50Coffee break
14:50 - 16:05 Session 12:
Efficient Hardware II

Chair: Francois-Xavier Standaert
Kazuo Sakiyama, Lejla Batina, Bart Preneel, Ingrid Verbauwhede Superscalar Coprocessor for High-speed Curve-based Cryptography
Manuel Koschuch, Joachim Lechner, Andreas Weitzer, Johann Grosschadl, Alexander Szekely, Stefan Tillich, Johannes Wolkerstorfer Hardware/Software Co-Design of Elliptic Curve Cryptography on an 8051 Microcontroller
V.S. Dimitrov, K. Jarvinen, M.J. Jacobson, Jr , W.F. Chan and Z. Huang FPGA Implementation of Point Multiplication on Koblitz Curves Using Kleinian Integers
16:05 - 16:10 Sayonara

Note: Regular presentations are 25 minutes long including Q&A.


Rump Session

Wednesday, October 11 -- Chair: Christof Paar
TimeEvent
20:20 - 22:00 Session Authors Title
20:20 - 20:40 Announcements Tom Berson
(Anagram Laboratories)
PKC 30th Anniversary Celebration
Tsuyoshi Takagi
(Future University Hakodate)
Pairing 2007
Christof Paar
(University Bochum)
escar 2006 & SASC 2007
Shinichi Kawamura
(Toshiba)
Activity of Tamper-Resistance Standardization Research Committee (TSRC)
20:40 - 21:10 Implementation
and
Algorithms
Camille Vuillaume
(Hitachi SDL)
Tamper-Resistant Mobile Terminal
A. Satoh (EyeBeeM)
K. Aoki (MiKaKa)
New Block Cipher for Ultra-Compact Hardware
A. Satoh (EyeBeeM) Brand-New Hash Function
Jin Kwak
(Kyushu University)
RFID Authentication: Minimizing Tag Computation
Kenji Imamoto
(Kyushu University)
Design of Key-Sharing System Based on a Unique Device
Masaaki Shirase et al,
(University Tsukuba,
Future University Hakodate)
An Algorithm for the Eta_T pairing Calculation in Characteristic Three and Its Hardware Implementation
21:10 - 21:25 Cryptanalysis Tetsuya Izu
Jun Kogure
Takeshi Shimoyama
(FUJITSU)
A Success of an Integer Factorization by Using a Special-purpose Hardware
Alexander A. Veith
(Inst. of Social and Economic Development)
Cryptanalysis of Chinese S-Boxes & Japanese L-Boxes
Christof Paar
(University Bochum)
Update on COPACOBANA
21:25 - 22:00 Side Channel Attacks Stefan Mangard
(Graz University)
Power Analysis Attacks - The Book
Lex Schoonen Brightsight
(TNO ITSEF)
Template Attacks - Practical Results
Paul Kocher
(Cryptographic Research)
Protocol-Level DPA Countermeasures
Josh Jaffe
(Cryptography Research)
A First-Order DPA Attack on AES in Counter Mode with Unknown Initial Counter
David Peacham
Byron Thomas
(SiVenture)
A New DFA Attack Against the AES Key Schedule
Shay Gueron
(Haifa University)
Simple Branch Prediction Attacks (SBPA) - New Results
Joe Bonneau
(Stanford University)
Modified Cache Side Channel Attacks