CHES

IACR

Workshop on Cryptographic Hardware and Embedded Systems 2000 (CHES 2000)

Worcester Polytechnic Institute
Worcester, Massachusetts, USA
Thursday August 17th - Friday 18th, 2000

[Wednesday, August 16] [Thursday, August 17] [Friday, August 18]

Program

Wednesday, August 16th
TimeEvent
5:00 pm - 10:00 pm Evening Registration and Reception at Atwater Kent Building, WPI
Shuttle Service will be provided between WPI, the Crowne Plaza and the Courtyard Marriott

Thursday, August 17th
TimeEvent
7:00 am - 8:45 am Registration at Atwater Kent Building, WPI
Continental Breakfast
Shuttle Service will be provided between WPI, the Crowne Plaza and the Courtyard Marriott
8:45 am - 9:15 am Welcome by Jack Carney (Provost, WPI)
Introductory remarks by Cetin Koc and Christof Paar
 SessionAuthorsTalk's Title
9:15 am - 9:55 am Invited Talk Alfred Menezes, University of Waterloo, Canada Elliptic curve cryptography in constrained environments.
9:55 am - 10:55 am Implementation of Elliptic Curve Cryptosystems S. Okada, N. Torii, K. Ito, and M. Takenaka. Implementation of elliptic curve cryptographic coprocessor over GF(2^m) on FPGA.
G. Orlando and C. Paar. A high-performance reconfigurable elliptic curve processor for GF(2^m).
J. W. Chung, S. G. Sim, and P. J. Lee. Fast implementation of elliptic curve defined over GF(p^m) on CalmRISC with MAC2424 coprocessor.
10:55 am - 11:15 ambreak
11:15 am - 12:35 pm Power and Timing Analysis Attacks A. Shamir. Protecting smart cards from passive power analysis with detached power supplies.
R. Mayer-Sommer. Smartly analyzing the simplicity and the power of simple power analysis on Smartcards.
M. A. Hasan. Power analysis attacks and algorithmic approaches to their countermeasures for Koblitz curve cryptosystems.
W. Schindler. A timing attack against RSA with the Chinese Remainder Theorem.
12:35 pm - 2:00 pmlunch break
2:00 pm - 3:20pm Hardware Implementation of Block Ciphers A. Dandalis, V. K. Prasanna, and J. D. P. Rolim. A comparative study of performance of AES final candidates using FPGAs.
C. Patterson. A dynamic FPGA implementation of the Serpent Block Cipher.
S. Trimberger, R. Pang, and A. Singh. A 12 Gbps DES Encryptor/Decryptor core in an FPGA.
H. Leitold, W. Mayerwieser, U. Payer, K. C. Posch, R. Posch, and J. Wolkerstorfer. A 155 Mbps triple-DES network encryptor.
3:20 pm - 3:40 pmbreak
3:40 pm - 5:00pm Hardware Architectures J. Goodman and A. Chandrakasan. An energy efficient reconfigurable public-key cryptography processor architecture.
J. Groszschaedl. High-Speed RSA Hardware based on Barret's Modular Reduction Method.
C. Walter. Data integrity in hardware for modular arithmetic.
T. Kato, S. Ito, J. Anzai, and N. Matsuzaki. A design for modular exponentiation coprocessor in mobile telecommunication terminals.
6:00 pm - 9:00 pm CHES Banquet
7:00 pm - 9:00 pm Shuttle Service will be provided between WPI, the Crowne Plaza and the Courtyard Marriott

Friday, August 18th
TimeEvent
8:00 am - 9:00 am Registration at Atwater Kent Building, WPI
Continental Breakfast
Shuttle Service will be provided between WPI, the Crowne Plaza and the Courtyard Marriott
 SessionAuthorsTalk's Title
9:00 am - 9:40 am Invited Talk David Naccache, Gemplus, France. How to explain side channel leakage to your kids.
9:40 am - 10:40 am Power Analysis Attacks J.-S. Coron and L. Goubin. On Boolean and arithmetic masking against differential power analysis.
T. S. Messerges. Using second-order power analysis to attack DPA resistant software.
C. Clavier, J.-S. Coron, and N. Dabbous. Differential power analysis in the presence of hardware countermeasures.
10:40 am - 11:00 ambreak
11:00 am - 12:00 pm Arithmetic Architectures H. Wu. Montgomery multiplier and squarer in GF(2^m).
E. Savas, A. F. Tenca, and C. K. Koc. A scalable and unified multiplier architecture for finite fields GF(p) and GF(2^m).
G. Hachez and J.-J. Quisquater. Montgomery exponentiation with no final subtraction: Improved results.
12:00 pm - 1:30 pmlunch break
1:30 pm - 2:10 pm Physical Security and Cryptanalysis S. H. Weingart. Physical security devices for computer subsystems: A survey of attacks and defenses.
T. Pornin and J. Stern. Software-Hardware Trade-offs: application to A5/1 Cryptanalysis.
2:10 pm - 2:50 pm New Schemes and Algorithms J. Hoffstein and J. Silverman. MiniPASS: Authentication and digital signatures in a constrained environment.
M. Joye, P. Paillier, and S. Vaudenay. Efficient generation of prime numbers.
2:50 pm - 3:00 pm Concluding Remarks
2:30 pm - 4:30 pm Shuttle Service will be provided between WPI, the Crowne Plaza and the Courtyard Marriott

Notes: