CHES

IACR

Conference on Cryptographic Hardware and Embedded Systems 2016 (CHES 2016)

Santa Barbara, CA
Wednesday, August 17th - Friday, August 19th,2016

[Tuesday, 8/16] [Wednesday, 8/17] [Thursday, 8/18] [Friday, 8/19]

Program

Presentation videos are available on YouTube.

Tuesday, August 16th
University Center Flying A Room
TimeEvent
 SessionAuthorsTitle
Tutorial Registration
University Center Corwin Pavilion Lobby
9:00 - 10:30 CHES Tutorial 1 Victor Lomné,
(ANSSI)
Common Criteria Certification of a Smartcard: A Technical Overview
10:30 - 10:50Coffee Break
University Center Flying A Room
10:50 - 12:20 CHES Tutorial 1 Victor Lomné,
(ANSSI)
Common Criteria Certification of a Smartcard: A Technical Overview
12:20 - 14:00Lunch Break
De La Guerra Dining Commons
14:00 - 15:30 CHES Tutorial 2 Yuval Yarom,
(The University of Adelaide)
Micro-Architectural Side-Channel Attacks
15:30 - 15:50Coffee Break
University Center Flying A Room
15:50 - 17:20 CHES Tutorial 2 Yuval Yarom,
(The University of Adelaide)
Micro-Architectural Side-Channel Attacks
17:30 - 20:00CHES Registration
University Center Corwin Pavilion Lobby
18:00 - 23:00Crypto Rump Session
University Center Lagoon Plaza and Corwin Pavilion
In order to attend Crypto Rump Session, the CHES participants should arrive UCSB before or on 6pm.

Wednesday, August 17th
Campbell Hall
TimeEvent
 SessionAuthorsTitle
8:00 - Registration
University Center Corwin Pavilion Lobby
8:30 - 9:00Continental Breakfast
Campbell Hall
09:00 - 09:20 Opening Remarks
9:20 - 11:00 Session 1
Side-Channel Attacks

Chair: Helena Handschuh
Margaux Dugardin; Jean-Luc Danger; Sylvain Guilley; Zakaria Najm; Olivier Rioul Correlated Extra-Reductions Defeat Blinded Regular Exponentiation
Alberto Battistello; Jean-Sébastien Coron; Emmanuel Prouff; Rina Zeitoun Horizontal Side-Channel Attacks and Countermeasures on the ISW Masking Scheme
François Durvaux; François-Xavier Standaert; Santos Merino Del Pozo Towards Easy Leakage Certification
Romain Poussier; François-Xavier Standaert; Vincent Grosso Simple Key Enumeration (and Rank Estimation) using Histograms: an Integrated Approach
11:00 - 11:30Coffee Break
CAMPBELL HALL PATIO
11:30 - 12:30 Joint invited talk with CRYPTO
Chair: Benedikt Gierlichs
Paul Kocher,
(Cryptography Research, a Division of Rambus)
Obvious in Hindsight: From Side Channel Attacks to the Security Challenges Ahead
12:30 - 14:15Lunch Break
De La Guerra Dining Commons
14:15 - 15:05 Session 2:
Automotive Security

Chair: Marc Stöttinger
Shalabh Jain; Jorge Guajardo Physical Layer Group Key Agreement for Automotive Controller Area Networks
Stefan Nürnberger; Christian Rossow vatiCAN: Vetted, Authenticated CAN Bus
15:05 - 15:35Coffee Break
CAMPBELL HALL PATIO
15:35 - 16:25 Session 3:
Invasive Attacks

Chair: Georg Becker
Yang Xie; Ankur Srivastava Mitigating SAT Attack on Logic Locking
Heiko Lohrke; Shahin Tajik; Christian Boit; Jean-Pierre Seifert No Place to Hide: Contactless Probing of Secret Data on FPGAs
16:25 - 16:45Break
16:45 - 17:45IACR Membership Meeting
18:30 - 20:00Dinner
Anacapa Ocean Lawn

Thursday, August 18nd
in Campbell Hall
TimeEvent
 SessionAuthorsTitle
8:00 - Registration
University Center Corwin Pavilion Lobby
8:30 - 9:00Continental Breakfast
Campbell Hall
9:00 - 9:50 Session 4:
Side Channel Countermeasures I

Chair: Michael Hutter
Vincent Grosso; Tim Güneysu; Gregor Leander; Amir Moradi; Tobias Schneider Strong 8-bit Sboxes with Efficient Masking in Hardware
Thomas De Cnudde; Oscar Reparaz; Begül Bilgin; Svetla Nikova; Ventzislav Nikov; Vincent Rijmen Masking AES with d+1 Shares in Hardware
9:50 - 10:40 Session 5:
New Directions

Chair: Marc Witteman
CHES Best Paper 2016
Joppe W. Bos; Charles Hubain; Wil Michiels; Philippe Teuwen
Differential Computation Analysis: Hiding your White-Box Designs is Not Enough
Andrew D. Zonenberg; Bülent Yener Antikernel: A Decentralized Secure Hardware-Software Operating System Architecture
10:40 - 11:15Coffee Break
CAMPBELL HALL PATIO
11:15 - 12:30 Session 6:
Software Implementations

Chair: Daniel Bernstein
Thomaz Oliveira; Julio López; Francisco Rodríguez-Henríquez Software implementation of Koblitz curves over quadratic fields
Tung Chou QcBits: constant-time small-key code-based cryptography
Lejla Batina; Joost Renes; Peter Schwabe; Benjamin Smith uKummer: efficient hyperelliptic signatures and key exchange on microcontrollers
12:30 - 14:15Lunch Break
De La Guerra Dining Commons
14:15 - 15:30 Session 7:
Cache Attacks

Chair: Patrick Schaumont
Leon Groot Bruinderink; Andreas Hülsing; Tanja Lange; Yuval Yarom Flush, Gauss, and Reload -- A Cache Attack on the BLISS Lattice-Based Signature Scheme
Yuval Yarom; Daniel Genkin; Nadia Heninger CacheBleed: A Timing Attack on OpenSSL Constant Time RSA
Mehmet Sinan Inci; Berk Gulmezoglu; Gorka Irazoqui; Thomas Eisenbarth; Berk Sunar Cache Attacks Enable Bulk Key Recovery on the Cloud
15:30 - 16:00Coffee Break
CAMPBELL HALL PATIO
16:00 - 17:15 Session 8:
Physical Unclonable Functions

Chair: Roel Maes
Fatemeh Ganji; Shahin Tajik; Fabian Faessler; Jean-Pierre Seifert Strong Machine Learning Attack against PUFs with No Mathematical Model
Jeroen Delvaux; Dawu Gu; Ingrid Verbauwhede; Matthias Hiller; Meng-Day (Mandel) Yu Efficient Fuzzy Extraction of PUF-Induced Secrets: Theory and Applications
Wenjie Xiong; André Schaller; Nikolaos Anagnostopoulos; Muhammad Umair Saleem; Sebastian Gabmeyer; Stefan Katzenbeisser; Jakub Szefer Run-time Accessible DRAM PUFs in Commodity Devices
18:30 - 22:15Rump Session & Banquet
La Pacifica Ballroom, The Four Seasons Biltmore
Those staying on-campus: buses to banquet depart sharply at 6:00pm in front of the Anacapa Residence Hall

Friday, August 19th
in Campbell Hall
TimeEvent
 SessionAuthorsTitle
8:00 - Registration
University Center Corwin Pavilion Lobby
8:30 - 9:00Continental Breakfast
Campbell Hall
9:30 - 10:45 Session 9:
Side Channel Countermeasures II

Chair: François-Xavier Standaert
Dahmun Goudarzi; Matthieu Rivain On the Multiplicative Complexity of Boolean Functions and Bitsliced Higher-Order Masking
Jürgen Pulkus; Srinivas Vivek Reducing the Number of Non-linear Multiplications in Masking Schemes
Jean-Sebastien Coron; Aurelien Greuet; Emmanuel Prouff; Rina Zeitoun Faster Evaluation of SBoxes via Common Shares
10:45 - 11:15Coffee Break
CAMPBELL HALL PATIO
11:15 - 12:30 Session 10:
Hardware Implementations

Chair: Junfeng Fan
Kimmo Järvinen; Andrea Miele; Reza Azarderakhsh; Patrick Longa FourQ on FPGA: New Hardware Speed Records for Elliptic Curve Cryptography over Large Prime Characteristic Fields
Rei Ueno; Sumio Morioka; Naofumi Homma; Takafumi Aoki A High Throughput/Gate AES Hardware Architecture by Compressing Encryption and Decryption Datapaths --- Toward Efficient CBC-Mode Implementation
Markus Kammerstetter; Markus Muellner; Christian Kudera; Daniel Burian; Wolfgang Kastner Efficient High-Speed WPA2 Brute Force Attacks using Scalable Low-Cost FPGA Clustering
12:30 - 14:15Lunch Break
Campus Green
14:15 - 15:15 Chair: Axel Poschmann Panel Discussion
15:15 - 15:45Coffee Break
CAMPBELL HALL PATIO
15:45 - 17:00 Session 11:
Fault Attacks

Chair: Bart Preneel
Dhiman Saha; Dipanwita Roy Chowdhury EnCounter: On Breaking the Nonce Barrier in Differential Fault Analysis with a Case-Study on PAEQ
Sarani Bhattacharya; Debdeep Mukhopadhyay Curious case of Rowhammer: Flipping Secret Exponent Bits using Timing Analysis
Samaneh Ghandali; Georg T. Becker; Dan Holcomb; Christof Paar A Design Methodology for Stealthy Parametric Trojans and Its Application to Bug Attacks
17:00 - 17:10Concluding remarks