Wednesday, August 16th
Thursday, August 17th
Friday, August 18th
|
|
Final Program
Time |
Event |
5:00 pm - 10:00 pm |
Evening Registration and Reception
at Atwater Kent Building, WPI |
Shuttle Service will be provided between WPI, the Crowne Plaza and the Courtyard Marriott |
Time |
Event |
7:00 am - 8:45 am |
Registration
at Atwater Kent Building, WPI |
Continental Breakfast |
Shuttle Service will be provided
between WPI, the Crowne Plaza and the Courtyard Marriott
|
8:45 am - 9:15 am |
Welcome by Jack Carney (Provost, WPI)
|
---|
Introductory remarks by Cetin Koc
and Christof Paar |
| Session
| Authors
| Talk's Title |
9:15 am - 9:55 am |
Invited Talk |
Alfred Menezes, University of Waterloo, Canada |
Elliptic curve cryptography in constrained environments. |
9:55 am - 10:55 am |
Implementation of Elliptic
Curve Cryptosystems |
S. Okada, N. Torii, K. Ito, and M. Takenaka. |
Implementation of elliptic curve
cryptographic coprocessor over GF(2^m) on FPGA. |
G. Orlando and C. Paar. |
A high-performance reconfigurable elliptic curve
processor for GF(2^m). |
J. W. Chung, S. G. Sim, and P. J. Lee. |
Fast implementation of elliptic curve
defined over GF(p^m) on CalmRISC with MAC2424 coprocessor. |
10:55 am - 11:15 am |
break |
11:15 am - 12:35 pm |
Power and Timing Analysis Attacks |
A. Shamir. |
Protecting smart
cards from passive power analysis with detached power supplies. |
R. Mayer-Sommer. |
Smartly analyzing the
simplicity and the power of simple power analysis on Smartcards. |
M. A. Hasan. |
Power analysis attacks and
algorithmic approaches to their countermeasures for Koblitz curve cryptosystems. |
W. Schindler. |
A timing attack against RSA with
the Chinese Remainder Theorem. |
12:35 pm - 2:00 pm |
lunch break |
2:00 pm - 3:20pm |
Hardware Implementation of Block Ciphers |
A. Dandalis, V. K. Prasanna, and J. D. P. Rolim. |
A comparative study of performance
of AES final candidates using FPGAs. |
C. Patterson. |
A dynamic FPGA
implementation of the Serpent Block Cipher. |
S. Trimberger, R. Pang, and A. Singh. |
A 12 Gbps DES
Encryptor/Decryptor core in an FPGA. |
H. Leitold, W. Mayerwieser, U. Payer, K. C. Posch, R. Posch, and J.
Wolkerstorfer. |
A 155 Mbps triple-DES
network encryptor. |
3:20 pm - 3:40 pm |
break |
3:40 pm - 5:00pm |
Hardware Architectures |
J. Goodman and A. Chandrakasan. |
An energy efficient
reconfigurable public-key cryptography processor architecture. |
J. Groszschaedl. |
High-Speed RSA Hardware based on Barret's Modular Reduction Method. |
C. Walter. |
Data integrity in
hardware for modular arithmetic. |
T. Kato, S. Ito, J. Anzai, and N. Matsuzaki. |
A design for modular
exponentiation coprocessor in mobile telecommunication terminals. |
6:00 pm - 9:00 pm |
CHES
Banquet |
7:00 pm - 9:00 pm |
Shuttle
Service will be provided between WPI, the Crowne Plaza and the Courtyard Marriott |
Time |
Event |
8:00 am - 9:00 am |
Registration
at Atwater Kent Building, WPI |
Continental
Breakfast |
Shuttle Service will be
provided between WPI, the Crowne Plaza and the Courtyard Marriott |
| Session
| Authors
| Talk's Title |
9:00 am - 9:40 am |
Invited Talk |
David Naccache, Gemplus, France. |
How to explain side channel leakage to your kids. |
9:40 am - 10:40 am |
Power Analysis Attacks |
J.-S. Coron and L. Goubin. |
On Boolean and arithmetic masking
against differential power analysis. |
T. S. Messerges. |
Using second-order
power analysis to attack DPA resistant software. |
C. Clavier, J.-S. Coron, and N. Dabbous. |
Differential power analysis in
the presence of hardware countermeasures. |
10:40 am -
11:00 am |
break |
11:00 am - 12:00 pm |
Arithmetic Architectures |
H. Wu. |
Montgomery multiplier and squarer in GF(2^m). |
E. Savas, A. F. Tenca, and C. K. Koc. |
A scalable and unified multiplier
architecture for finite fields GF(p) and GF(2^m). |
G. Hachez and J.-J. Quisquater. |
Montgomery exponentiation with no final subtraction: Improved results. |
12:00 pm -
1:30 pm |
lunch break |
1:30 pm - 2:10 pm |
Physical Security and Cryptanalysis |
S. H. Weingart. |
Physical security devices
for computer subsystems: A survey of attacks and defenses. |
T. Pornin and J. Stern. |
Software-Hardware Trade-offs: application to A5/1 Cryptanalysis. |
2:10 pm - 2:50 pm |
New Schemes and Algorithms |
J. Hoffstein and J. Silverman. |
MiniPASS: Authentication and digital
signatures in a constrained environment. |
M. Joye, P. Paillier, and S. Vaudenay. |
Efficient generation of prime numbers. |
2:50 pm -
3:00 pm |
Concluding Remarks |
2:30 pm - 4:30 pm |
Shuttle
Service will be provided between WPI, the Crowne Plaza and the Courtyard Marriott |
Notes:
- Invited talks are 40 min
- Regular presentations are 20 min long
- The Thursday program is from 8:45 am - 5:00 pm
- The Friday program is from 9:00 am - 3:00 pm
|