Tuesday, September 23rd Sydney Room |
|||
Time | Event | ||
---|---|---|---|
Session | Authors | Title | |
09:30 - 10:00 | Tutorial Registration at Capri Room |
||
10:00 - 13:00 | CHES Tutorial 1 | Guido Bertoni (ST Microelectronics) | Keccak and SHA-3 |
14:30 - 17:30 | CHES Tutorial 2 | Viktor Fischer (Hubert Curien Laboratory, Jean Monnet University Saint-Etienne, France) |
Random number generators for cryptography — design, evaluation and tests |
18:00 - 20:30 | CHES Reception Garden |
Wednesday, September 24th Grand Ballroom |
||||
Time | Event | |||
---|---|---|---|---|
Session | Authors | Title | ||
07:30 - 08:30 | Registration | |||
8:30 - 10:10 | Session 1 Side-Channel Attacks Chair: Elke De Mulder |
Naofumi Homma (Tohoku University), Yu-ichi Hayashi (Tohoku University), Noriyuki Miura (Kobe University), Daisuke Fujimoto (Kobe University), Daichi Tanaka (Kobe University), Makoto Nagata (Kobe University), and Takafumi Aoki (Tohoku University) |
EM Attack Is Non-Invasive? - Design Methodology and Validity Verification of EM Attack Sensor | |
Yossef Oren (Columbia University), Ofir Weisse (Tel Aviv University), and Avishai Wool (Tel Aviv University) |
A New Framework for Constraint-Based Probabilistic Template Side Channel Attacks | |||
Victor Lomné (ANSSI), Emmanuel Prouff (ANSSI), Matthieu Rivain (CryptoExperts), Thomas Roche (ANSSI), and Adrian Thillard (ANSSI) |
How to Estimate the Success Rate of Higher-Order Side-Channel Attacks | |||
Annelie Heuser (Télécom ParisTech), Olivier Rioul (Télécom ParisTech), and Sylvain Guilley (Télécom ParisTech, Secure-IC) |
Good is Not Good Enough: Deriving Optimal Distinguishers from Communication Theory | |||
10:10 - 10:45 | Coffee Break Capri Room |
|||
10:45 - 12:25 | Session 2: New Attacks and Constructions Chair: Axel Poschmann |
Naomi Benger (University of Adelaide), Joop van de Pol (University of Bristol), Nigel P. Smart (University of Bristol), and Yuval Yarom (University of Adelaide) |
"Ooh Aah... Just a Little Bit"': A small amount of side channel can go a long way | |
Harshal Tupsamudre, Shikha Bisht, and Debdeep Mukhopadhyay (IIT Kharagpur) | Destroying Fault Invariant with Randomization - A Countermeasure for AES against Differential Fault Attacks | |||
Takeshi Sugawara (Mitsubishi Electric Corp.), Daisuke Suzuki (Mitsubishi Electric Corp.), Ryoichi Fujii (Mitsubishi Electric Corp.), Shigeaki Tawa (Mitsubishi Electric Corp.), Ryohei Hori (Ritsumeikan Univ.) Mitsuru Shiozaki (Ritsumeikan Univ.), and Takeshi Fujino (Ritsumeikan Univ.) |
Reversing Stealthy Dopant-Level Circuits | |||
Yongqiang Li and Mingsheng Wang (The State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences) | Constructing S-boxes for Lightweight Cryptography with Feistel Structure | |||
12:25 - 13:30 | Lunch | |||
13:30 - 22:00 | Guided Excursion to Kyoungju |
Thursday, September 25th Grand Ballroom |
||||
Time | Event | |||
---|---|---|---|---|
Session | Authors | Title | ||
08:00 - 08:30 | Registration | |||
8:30 - 10:10 | Session 3: Countermeasure Chair: Marcel Medwed |
Adam Ding, Liwei Zhang, Yunsi Fei, and Pei Luo (Northeastern University) | A Statistical Model for Higher Order DPA on Masked Devices | |
Jean-Sébastien Coron (University of Luxembourg), Arnab Roy (University of Luxembourg, Luxembourg and Technical University of Denmark), and Srinivas Vivek (University of Luxembourg) |
Fast Evaluation of Polynomials over Binary Finite Fields and Application to Side-channel Countermeasures | |||
Jean-Sébastien Coron, Johann Großschädl, and Praveen Kumar Vadnala (University of Luxembourg) | Secure Conversion between Boolean and Arithmetic Masking of any order | |||
Gilles Barthe (IMDEA Software Institute), François Dupressoir (IMDEA Software Institute), Pierre-Alain Fouque (Université de Rennes 1, Institut Universitaire de France), Benjamin Grégoire (INRIA), Mehdi Tibouchi (NTT Secure Platform Laboratories), and Jean-Christophe Zapalowicz (INRIA) |
Making RSA-PSS Provably Secure Against Non-Random Faults | |||
10:10 - 10:45 | Coffee Break Capri Room |
|||
10:45 - 12:25 | Session 4: Algorithm specific SCA Chair: Mathieu Rivain |
Daniel Genkin (Technion, Tel Aviv University), Itamar Pipman (Tel Aviv University), and Eran Tromer (Tel Aviv University) |
Get Your Hands Off My Laptop: Physical Side-Channel Key-Extraction Attacks on PCs | |
Aurélie Bauer, Eliane Jaulmes, Victor Lomné, Emmanuel Prouff, and Thomas Roche (ANSSI) | Side-Channel Attack Against RSA Key Generation Algorithms | |||
Noboru Kunihiro and Junya Honda (University of Tokyo) | RSA meets DPA: Recovering RSA Secret Keys from Noisy Analog Data | |||
Christophe Clavier, Damien Marion, and Antoine Wurcker (University of Limoges) | Simple Power Analysis on AES Key Expansion Revisited | |||
12:25 - 13:30 | Lunch | |||
13:30 - 14:20 | Session 5: ECC Implementations Chair: Mehdi Tibouchi |
Thomas Unterluggauer and Erich Wenger (IAIK, Graz University of Technology) | Efficient Pairings and ECC for Embedded Systems | |
Daniel J. Bernstein (University of Illinois at Chicago and Technische Universiteit Eindhoven), Chitchanok Chuengsatiansup (Technische Universiteit Eindhoven), and Tanja Lange (Technische Universiteit Eindhoven) |
Curve41417: Karatsuba revisited | |||
14:20 - 14:25 | Pause | |||
14:25 - 15:25 | Session 6: |
André Weimerskirch (University of Michigan Transportation Research Institute) | V2V Communication Security: a privacy-preserving design for 300 million vehicles | |
15:30 - 16:00 | Coffee Break Capri Room |
|||
16:00 - 17:15 | Session 7: Implementations Chair: Junfeng Fan |
Andrea Miele (LACAL EPFL Lausanne), Joppe W. Bos (NXP Semiconductors), Thorsten Kleinjung (LACAL EPFL Lausanne), and Arjen K. Lenstra (LACAL EPFL Lausanne) |
Cofactorization on Graphics Processing Units | |
Thomas Pöppelmann (Ruhr University Bochum), Léo Ducas (University of California, San Diego), and Tim Güneysu (Ruhr University Bochum) |
Enhanced Lattice-Based Signatures on Reconfigurable Hardware | |||
Sujoy Sinha Roy (ESAT/COSIC, KU Leuven), Frederik Vercauteren (ESAT/COSIC, KU Leuven), Nele Mentens (ESAT/COSIC, KU Leuven), Donald Donglong Chen (City University of Hong Kong), and Ingrid Verbauwhede (ESAT/COSIC, KU Leuven) |
Compact Ring-LWE based Cryptoprocessor | |||
18:00 - 23:00 |
Banquet and Rump Session Grand Ballroom Chair: Tim Güneysu and Helena Handschuh |
Friday, September 26th Grand Ballroom |
||||
Time | Event | |||
---|---|---|---|---|
Session | Authors | Title | ||
08:30 - 09:00 | Registration | |||
9:00 - 10:15 | Session 8: Hardware Implementations of Symmetric Cryptosystems Chair: Maire O'Neill |
Pawel Morawiecki (Polish Academy of Sciences and University of Commerce), Kris Gaj (George Mason University), Ekawat Homsirikamol (George Mason University), Krystian Matusiewicz (Intel), Josef Pieprzyk (Macquarie University and Queensland University of Technology), Marcin Rogawski (Cadence Design Systems), Marian Srebrny (Polish Academy of Sciences and University of Commerce), and Marcin Wójcik (University of Bristol) |
ICEPOLE: High-speed, Hardware-oriented Authenticated Encryption | |
Hai Brenner (IDC Herzliya), Lubos Gaspar (ICTEAM/ELECN/Crypto Group UCL), Gaëtan Leurent (EPI SECRET, INRIA), Alon Rosen (IDC Herzliya), and François-Xavier Standaert (ICTEAM/ELECN/Crypto Group UCL) |
FPGA implementations of SPRING (And their Countermeasures against Side-Channel Attacks) | |||
Khoongming Khoo
(DSO National Laboratories), Thomas Peyrin (SPMS, Nanyang Technological University), Axel Poschmann (NXP Semiconductors), and Huihui Yap (DSO National Laboratories) |
FOAM: Searching for Hardware-Optimal SPN Structures and Components with a Fair Comparison | |||
10:15 - 10:45 | Coffee Break Capri Room |
|||
10:45 - 12:25 | Session 9: PUFs Chair: D.-G. Han |
Jeroen Delvaux (ESAT/COSIC, KU Leuven), Dawu Gu (Shanghai Jiao Tong University), Dries Schellekens (ESAT/COSIC, KU Leuven), and Ingrid Verbauwhede (ESAT/COSIC, KU Leuven) |
Secure Lightweight Entity Authentication with Strong PUFs: Mission Impossible? | |
Ulrich Rührmair (TU München), Xiaolin Xu (UMass Amherst), Jan Sölter (FU Berlin), Ahmed Mahmoud (TU München), Mehrdad Majzoobi (Rice University), Farinaz Koushanfar (Rice University), and Wayne Burleson (UMass Amherst) |
Efficient Power and Timing Side Channels for Physical Unclonable Functions | |||
Shahin Tajik, Enrico Dietz, Sven Frohmann, Dmitry Nedospasov, Jean-Pierre Seifert, Clemens Helfmeier, Christian Boit, and Helmar Dittrich (Technische Universität Berlin) | Physical Characterization of Arbiter PUFs | |||
Daniel E. Holcomb and Kevin Fu (University of Michigan) | Bitline PUF: Building Native Challenge-Response PUF Capability into Any SRAM | |||
12:25 - 13:30 | Lunch | |||
13:30 - 14:20 | Session 10: RNGs and SCA Issues in Hardware Chair: Wieland Fischer |
Viktor Fischer (Hubert Curien Laboratory, University of Lyon) and David Lubicz (DGA-Maîtrise de l'information, Université de Rennes 1) |
Embedded Evaluation of Randomness in Oscillator Based Elementary TRNG | |
Yuan Ma, Jingqiang Lin, Tianyu Chen, Changwei Xu, Zongbin Liu, and Jiwu Jing (Chinese Academy of Sciences) | Entropy Evaluation for Oscillator-Based True Random Number Generators | |||
14:20 - 14:25 | Pause | |||
14:25 - 15:40 | Session 10: RNGs and SCA Issues in Hardware (continues) Chair: Wieland Fischer |
Amir Moradi (HGI, Ruhr University Bochum) | Side-Channel Leakage through Static Power — Should We Care about in Practice? | |
Andrew J. Leiserson, Mark E. Marson, and Megan A. Wachs (Cryptography Research, Inc.) | Gate-Level Masking Under a Path-Based Leakage Metric | |||
Amir Moradi (HGI, Ruhr University Bochum) and Vincent Immler (Fraunhofer Institute AISEC, Munich) |
Early Propagation and Imbalanced Routing, How to Diminish in FPGAs | |||
15:40 - 15:50 | Close |