CHES

IACR

Workshop on Cryptographic Hardware and Embedded Systems (CHES '99)

Worcester Polytechnic Institute
Worcester, Massachusetts, USA
Thursday August 12th - Friday 13th, 1999

[Wednesday, August 11] [Thursday, August 12] [Friday, August 13]

Program

Wednesday, August 11th
TimeEvent
5:00 pm - 10:00 pm; Evening Registration and Reception at Salisbury Lounge
Shuttle Service will be provided between WPI and the Crowne Plaza Hotel every half an hour

Thursday, August 12th
TimeEvent
7:00 am - 8:45 am Registration at Salisbury Lounge
Continental Breakfast
Shuttle Service will be provided between WPI and the Crowne Plaza Hotel every half an hour
8:45 am - 9:15 am Welcome by Ed Parrish (President, WPI)
Introductory remarks by Cetin Koc and Christof Paar
 SessionAuthorsTalk's Title
9:15 am - 9:55 am Invited Talk Brian Snow,
National Security Agency, USA
We Need Assurance
9:55 am - 10:35 am Cryptoanalytical Hardware A. Shamir Factoring large numbers with the TWINKLE device
I. Hamer and P. Chow DES cracking on the Transmogrifier 2a
10:35 am - 11:00 ambreak
11:00 am - 12:00 pm Hardware Architectures W.P. Choi and L.M. Cheng Modeling the crypto-processor from design to synthesis
D.C. Wilcox, L.G. Pierson, P.J. Robertson, E.L. Witzke, and K. Gass A DES ASIC suitable for network encryption at 10 Gbps and beyond
E. Hong, J.-H. Chung, and C.H. Lim Hardware design and performance estimation of the 128-bit block cipher CRYPTON
12:00 pm - 12:40 pm Smart Cards and Embedded Systems K. Itoh, M. Takenaka, N. Torii, S. Temma, and Y. Kurihara Fast implementation of public-key cryptography on a DSP TMS320C6201
P.J. Lee, E.J. Lee, and Y.D. Kim How to implement cost-effective and secure public key cryptosystems
12:40 pm - 1:55 pmlunch break
1:55 pm - 2:35 pm Invited Talk Colin D. Walter, Computation Department - UMIST, U.K. An Overview of Montgomery's Multiplication Technique: How to make it Smaller and Faster
2:35 pm - 3:15pm Arithmetic Algorithms I A.F. Tenca and C.K. Koc A scalable architecture for Montgomery multiplication
T. Horvath Arithmetic design for permutation groups
3:15 pm - 3:40 pmbreak
3:40 pm - 4:20 pm Arithmetic Algorithms I (Continued) J.H. Silverman. Fast multiplication in finite fields GF(2n)
B. Kaliski and M. Liskov Efficient finite field basis conversion involving dual bases
4:20 pm - 5:20 pm Power Attacks I T.S. Messerges, E.A. Dabbish, and R.H. Sloan Power analysis attacks of modular exponentiation in smartcards
L. Goubin and J. Patarin DES and differential power analysis
P. Fahn and P. Pearson IPA: A new class of power attacks
5:30 pm - 6:30 pm Hospitality Bar (Wine and Beer) at Higgins House
6:30 pm - 9:00 pm CHES Banquet on the WPI Campus, sponsored by Technical Communications Corporation, MA
9:00 pm - 10:00 pm Shuttle Service between WPI and the Crowne Plaza will be provided

Friday, August 13th
TimeEvent
7:00 am - 8:45 am Registration at Salisbury Lounge
Continental Breakfast
Shuttle Service will be provided between WPI and the Crowne Plaza Hotel every half an hour
 SessionAuthorsTalk's Title
8:45 am - 9:25 am Invited Talk Eberhard von Faber, Debis IT Security Services, Germany Security Evaluation Schemes for the Public and Private Market with a Focus on Smart Card Systems
9:25 am - 10:05 am True Random Number Generators V. Bagini and M. Bucci A design of reliable true random number generator for cryptographic applications
D. Maher and B. Rance Random number generators founded on signal and information theory
10:05 am - 10:30 ambreak
10:30 am - 11:30 am Cryptographic Algorithms on FPGAs R.R. Taylor and S.C. Goldstein A high-performance flexible architecture for cryptography
E. Mosanya, C. Teuscher, H.F. Restrepo,P. Galley, and E. Sanchez CryptoBooster: A reconfigurable and modular cryptographic coprocessor
L. Gao, S. Shrivastava, and G.E. Sobelman Elliptic curve scalar multiplier design using FPGAs
11:30 am - 12:10 pm Arithmetic Algorithms II H. Wu, M.A. Hasan, and I.F. Blake. Highly regular architectures for finite field computation using redundant basis
H. Wu Low complexity bit-parallel finite field arithmetic using polynomial basis
12:10 pm - 1:25 pmlunch break
1:25 pm - 2:05 pm Power Attacks II J.-S. Coron Resistance against differential power analysis attacks for elliptic curve cryptosystems
H. Handschuh, P. Paillier, and J. Stern Probing attacks on tamper-resistant devices
2:05 pm - 2:25 pm Elliptic Curve Implementations J. Lopez and R. Dahab Fast multiplication on elliptic curves over GF(2m) without precomputation
2:25 pm - 2:50 pmbreak
2:50 pm - 3:10 pm Elliptic Curve Implementations Y. Han, and P.-C. Tan Direct computation for elliptic curve cryptosystems
3:10 pm - 3:50 pm New Cryptographic Schemes and Modes of Operation M. Hartmann, S. Paulus, and T. Takagi NICE - New Ideal Coset Encryption -
O. Jung and C. Ruland Encryption with statistical self-synchronization in synchronous broadband networks
3:50 pm - 4:50 pm Shuttle Service between WPI and the Crowne Plaza will be provided

Notes: