Tuesday,
October 10
Wednesday, October 11
Thursday, October 12
Friday, October 13
Rump Session
|
|
Program
Time
|
Event
|
18:00 - 20:00
|
Registration and welcome drink at the conference hotel
|
Time
|
Event
|
|
Session
|
Authors
|
Title
|
8:00 -
|
Registration desk opens
|
9:00 - 9:10
|
Welcome to CHES 2006
|
9:10 - 10:25
|
Session 1: Side Channels I
Chair: Marc Joye
| Cedric Archambeau, Eric Peeters, Francois-Xavier Standaert, Jean-Jacques Quisquater | Template Attacks in Principal Subspaces |
Benedikt Gierlichs, Kerstin Lemke-Rust, Christof Paar | Templates vs. Stochastic Methods
|
Francois-Xavier Standaert, Eric Peeters, Cedric Archambeau, Jean-Jacques Quisquater | Towards Security Limits of Side-Channel Attacks
|
10:25 - 10:45
|
Coffee break
|
10:45 - 11:10
|
Session 2: Low Resources
Chair: Elena Trichina
| Deukjo Hong, Jaechul Sung, Seokhie Hong, Jongin Lim, Sangjin Lee, Bon-Seok Koo, Changhoon Lee, Donghoon Chang, Jesang Lee, Kitae Jeong, Hyun Kim, Jongsung Kim, Seongtaek Chee | HIGHT: A New Block Cipher Suitable for Low-Resource Device |
11:10 - 12:00
|
Invited Talk I Chair: Mitsuru Matsui
|
Kazumaro Aoki NTT
|
Integer Factoring utilizing PC Cluster
|
12:00 - 13:20
|
Lunch
|
13:20 - 14:35
|
Session 3: Hardware Attacks and Countermeasures I
Chair: Pierre-Alain Fouque
| Sergei Skorobogatov | Optically Enhanced Position-Locked Power Analysis |
Stefan Mangard, Kai Schramm | Pinpointing the Side-Channel Leakage of Masked AES Hardware Implementations |
Amir Moradi, Mohammad T. Manzuri Shalmani, Mahmoud Salmasizadeh | A Generalized Method of Differential Fault Attack Against AES Cryptosystem |
14:35 - 15:25
|
Session 4: Special Purpose Hardware
Chair: Tetsuya Izu
| Sandeep Kumar, Christof Paar, Jan Pelzl, Gerd Pfeiffer, Manfred Schimmler | Breaking Ciphers with COPACOBANA - A Cost-Optimized Parallel Code Breaker |
Kris Gaj, Soonhak Kwon, Patrick Baier, Paul Kohlbrenner, Hoang Le, Mohammed Khaleeluddin, Ramakrishna Bachimanchi | Implementing the Elliptic Curve Method of Factoring in Reconfigurable Hardware |
15:25 - 15:45
|
Coffee break
|
15:45 - 17:00
|
Session 5: Efficient Algorithms for Embedded Processors
Chair: Berk Sunar
| Michael Scott, Neil Costigan, Wesam Abdulwahab | Implementing Cryptographic Pairings on Smartcards |
Toru Akishita, Masanobu Katagi, Izuru Kitamura | SPA-resistant Scalar Multiplication on Hyperelliptic Curve Cryptosystems Combining Divisor Decomposition Technique and Joint Regular Form |
Marc Joye, Pascal Paillier | Fast Generation of Prime Numbers on Portable Devices: An Update |
18:20 - 20:20
|
Banquet
|
20:20 - 22:00
|
Rump Session -- Chair: Christof Paar
|
Time
|
Event
|
|
Session
|
Authors
|
Title
|
8:30 -
|
Registration desk opens
|
9:00 - 10:40
|
Session 6: Side Channels II
Chair: Erkay Savas
| Thanh-Ha Le, Jessy Clediere, Cecile Canovas, Bruno Robisson, Christine Serviere, Jean-Louis Lacoume | A proposition for Correlation Power Analysis enhancement |
Naofumi Homma, Sei Nagashima, Yuichi Imai, Takafumi Aoki, Akashi Satoh | High-Resolution Side-Channel Attack Using Phase-Based Waveform Matching
|
Joseph Bonneau, Ilya Mironov | Cache-Collision Timing Attacks Against AES
|
Emmanuel Prouff, Christophe Giraud, Sebastien Aumonier | Provably Secure S-Box Implementation Based on Fourier Transform
|
10:40 - 11:10
|
Coffee break
|
11:10 - 12:10
|
Invited Talk II Chair: Louis Goubin
|
Ari Juels RSA Labs
|
The Outer Limits of RFID Security
|
12:10 - 13:30
|
Lunch
|
13:30 - 14:45
|
Session 7: Hardware Attacks and Countermeasures II
Chair: Ingrid Verbauwhede
| Marco Bucci, Luca Giancane, Raimondo Luzzi, Alessandro Trifiletti | Three-Phase Dual-Rail Pre-Charge Logic |
Zhimin Chen, Yujie Zhou | Dual-Rail Random Switching Logic: A Countermeasure to Reduce Side Channel Leakage |
Daisuke Suzuki, Minoru Saeki | Security Evaluation of DPA Countermeasures Using Dual-Rail Pre-charge Logic Style |
14:45 - 15:15
|
Coffee break
|
15:15 - 16:30
|
Session 8: Efficient Hardware I
Chair: Akashi Satoh
| Stefan Tillich, Johann Grosschadl | Instruction Set Extensions for Efficient AES Implementation on 32-bit Processors |
Massoud Masoumi, Farshid Raissi, Mahmoud Ahmadian | NanoCMOS Molecular Realization of Rijndael |
Ricardo Chaves, Georgi Kuzmanov, Leonel Sousa, Stamatis Vassiliadis | Improving SHA-2 Hardware Implementations |
16:30 - 16:55
|
Session 9: Trusted Computing
Chair: Shiho Moriai
| Eric Simpson, Patrick Schaumont | Offline Hardware/Software Authentication for Reconfigurable Platforms |
18:20
|
Bus departure to excursion
|
19:15 - 21:30
|
Excursion in aquarium
|
21:40
|
Bus return to hotel
|
Time
|
Event
|
|
Session
|
Authors
|
Title
|
8:30 -
|
Registration desk opens
|
9:00 - 10:15
|
Session 10: Side Channels III
Chair: Katsuyuki Okeya
| Eric Brier, Benoit Chevallier-Mames, Mathieu Ciet, Christophe Clavier | Why One Should Also Secure RSA Public Key Elements |
Pierre-Alain Fouque, Sebastien Kunz-Jacques, Gwenaelle Martinet, Frederic Muller, Frederic Valette | Power Attack on Small RSA Public Exponent
|
Douglas Stebila, Nicolas Theriault | Unified Point Addition Formulae and Side-Channel Attacks
|
10:15 - 10:45
|
Coffee break
|
10:45 - 12:00
|
Session 11: Hardware Attacks and Countermeasures III
Chair: Frederic Valette
| Pim Tuyls, Geert-Jan Schrijen, Boris Skoric, Jan van Geloven, Nynke Verhaegh, Rob Wolters | Read-Proof Hardware from Protective Coatings |
Fraidy Bouesse, Gilles Sicard, Marc Renaudin | Path Swapping Method to Improve DPA resistance of Quasi Delay Insensitive Asynchronous circuits
|
Konrad Kulikowski, Alexander Smirnov, Alexander Taubin | Automated Design of Cryptographic Devices Resistant to Multiple Side-Channel Attacks
|
12:00 - 13:20
|
Lunch
|
13:20 - 14:20
|
Invited Talk III Chair: Tsutomu Matsumoto
|
Ahmad Sadeghi Ruhr University Bochum
|
Challenges for Trusted Computing
|
14:20 - 14:50
|
Coffee break
|
14:50 - 16:05
|
Session 12: Efficient Hardware II
Chair: Francois-Xavier Standaert
| Kazuo Sakiyama, Lejla Batina, Bart Preneel, Ingrid Verbauwhede | Superscalar Coprocessor for High-speed Curve-based Cryptography |
Manuel Koschuch, Joachim Lechner, Andreas Weitzer, Johann Grosschadl, Alexander Szekely, Stefan Tillich, Johannes Wolkerstorfer | Hardware/Software Co-Design of Elliptic Curve Cryptography on an 8051 Microcontroller |
V.S. Dimitrov, K. Jarvinen, M.J. Jacobson, Jr , W.F. Chan and Z. Huang | FPGA Implementation of Point Multiplication on Koblitz Curves Using Kleinian Integers |
16:05 - 16:10
|
Sayonara
|
Note: Regular presentations are 25 minutes long including Q&A.
Rump Session
Wednesday, October 11 -- Chair: Christof Paar
|
|