| Tuesday, August 13th | |||
| Time | Event | ||
|---|---|---|---|
| 8:30 - 8:45 | Welcome | ||
| Session | Authors | Talk's Title | |
| 8:45 - 9:10 | Invited Talk | Jean-Jacques Quisquater (UCL, BE) | CHES: Past Present and Future |
| 9:10 - 10:25 | Session 1: Attack Strategies | S. Skorobogatov and R. Anderson (U Cambridge, UK) | Optical Fault Induction Attacks |
| S. Chari, J.R. Rao, and P. Rohatgi (IBM, US) | Template Attacks | ||
| D. Agrawal, B. Archambeault, J.R. Rao, and P. Rohatgi (IBM, US) | The EM Side-channel(s) | ||
| 10:25 - 10:45 | Break | ||
| 10:45 - 12:00 | Session 2: Finite Field and Modular Arithmetic I | S. Gueron (University of Haifa, IL, and Discretix Technologies, IL) | Enhanced Montgomery Multiplication |
| R. Lórencz (CTU in Prague, CZ) | New Algorithm for Classical Modular Inverse | ||
| W. Fischer and J.-P. Seifert (Infineon, DE) | Increasing the bitlength of crypto-coprocessors via smart hardware/software codesign | ||
| 12:00 - 13:20 | Lunch | ||
| 13:20 - 15:00 | Session 3: Elliptic Curve Cryptography I | E. Oswald (TU-Graz, AT) | Enhancing Simple Power-Analysis Attacks on Elliptic Curve Cryptosystems |
| E. Trichina (Gemplus, IT) and A. Bellezza (University of Rome "La Sapienza", IT) | Implementation of Elliptic curve cryptography with built-in counter measures against side channel attacks | ||
| C. Gebotys and R. Gebotys (U Waterloo, CA) | Secure Elliptic Curve Implementations: An analysis of resistance to power-attacks in a DSP processor core | ||
| K. Itoh, T. Izu, and M. Takenaka (Fujitsu, JP) | Address-bit Differential Power Analysis on Cryptographic Schemes OK-ECDH and OK-ECDSA | ||
| 15:00 - 15:20 | Break | ||
| 15:20 - 17:25 | Session 4: AES and AES Candidates | A. K. Lutz, J. Treichler, F.K. Gurkaynak, H. Kaeslin, G. Basler, A. Erni, S. Reichmuth, P. Rommens, S. Oetiker, and W. Fichtner (ETH, CH) | 2Gbit/s Hardware Realizations of RIJNDAEL and SERPENT: A comparative analysis |
| G. Bertoni, L. Breveglieri (Politecnico di Milano, IT), P. Fragneto (STMicroelectronics, IT), M. Macchetti, and S. Marchesin (ALARI, University of Italian Switzerland, Lugano, CH) | Efficient Software Implementation of AES on 32-bits Platforms | ||
| S. Morioka and A. Satoh (IBM, JP) | An Optimized S-Box Circuit Architecture for Low Power AES Design | ||
| E. Trichina, D. De Seta, and L. Germani (Gemplus, IT) | Simplified adaptive multiplicative masking for AES and its secure implementation | ||
| J. Dj. Golic (Gemplus, IT) and C. Tymen (Gemplus, FR) | Multiplicative masking and power analysis of AES | ||
| 17:25 - 17:50 | Session 5: Tamper Resistance | A. Huang (MIT, US) | Keeping Secrets in Hardware: the Microsoft X-BOX Case Study |
| 17:50 | Adjourn | ||
| Wednesday, August 14th | |||
| Time | Event | ||
|---|---|---|---|
| Session | Authors | Talk's Title | |
| 08:45 - 10:00 | Session 6: RSA Implementation | B. den Boer (TNO TPD, NL), K. Lemke, and G. Wicke (T-Systems, DE) | A DPA Attack Against the Modular Reduction within a CRT Implementation of RSA |
| V. Klima and T. Rosa (ICZ, CZ) | Further Results and Considerations on Side Channel Attacks on RSA | ||
| C. Aumueller, P. Bier, W. Fischer, P. Hofreiter, and J.-P. Seifert (Infineon, DE) | Fault attacks on RSA with CRT: Concrete Results and Practical Countermeasures | ||
| 10:00 - 10:20 | Break | ||
| 10:20 - 12:00 | Session 7: Finite Field and Modular Arithmetic II | C.D. Walter (Comodo, UK) | Some Security Aspects of the Mist Randomized Exponentiation Algorithm |
| M. Joye (Gemplus, FR) and S-M. Yen (Nat. Central U, TW) | The Montgomery Powering Ladder | ||
| K. Itoh, J. Yajima, M. Takenaka, and N. Torii (Fujitsu, JP) | DPA Countermeasures by improving the window method | ||
| M. Stam (TU Eindhoven, NL) and A.K. Lenstra (Citi, US) | Efficient subgroup exponentiation in quadratic and sixth degree extensions | ||
| 12:00 - 13:20 | Lunch | ||
| 13:20 - 15:25 | Session 8: Elliptic Curve Cryptography II | E. Konstantinou, Y. Stamatiou, and C. Zaroliagis (U Patras, GR) | On the efficient generation of elliptic curves over prime fields |
| N. Gura, S. Chang Shantz, H. Eberle (Sun Microsystems, US), D. Finchelstein (U Waterloo, CA), S. Gupta, V. Gupta, and D. Stebila (Sun Microsystems, US) | An End-to-End Systems Approach to Elliptic Curve Cryptography | ||
| R. Schroeppel, C. Beaver, R. Gonzales, R. Miller, and T. Draelos (Sandia, US) | A Low-Power Design for an Elliptic Curve Digital Signature Chip | ||
| M. Ernst, M. Jung, F. Madlener, S.A. Huss (TU Darmstadt, DE), and R. Bluemel (Cryptovision, DE) | A Reconfigurable System on Chip Implementation for Elliptic Curve Cryptography over GF(2^n) | ||
| N. Boston, T.C. Clancy, Y. Liow, and J.E. Webster (Urbana-Champaign, US) | Genus Two Hyperelliptic Curve Coprocessor | ||
| 15:25 - 15:45 | Break | ||
| 15:45 - 16:10 | Session 9: Random Number Generation | V. Fischer (U Jean Monnet, FR) and M. Drutarovsky (U Kosice, SL) | True Random Number Generator Embedded in Reconfigurable Hardware |
| 16:10 - 17:40 | Invited Panel | Werner Schindler (BSI, DE) (moderator), Randall J. Easter (NIST, US), Paul Timmel (NSA, US), and Thomas E. Tkacik (Motorola, US) |
Hardware Random Number Generation |
| 17:40 | Adjourn | ||
| Thursday, August 15th | |||
| Time | Event | ||
|---|---|---|---|
| Session | Authors | Talk's Title | |
| 08:35 - 09:35 | Invited Talk | Sanjay Sarma (MIT, US) | Radio Frequency Identification Systems |
| 09:35 - 09:55 | Break | ||
| 09:55 - 10:20 | Session 10: New Primitives | A. Klimov and A. Shamir (Weizmann, IL) | A New Class of Invertible Mappings |
| 10:20 - 12:00 | Session 11: Finite Field and Modular Arithmetic III | A. A-A. Gutub, A. F. Tenca, E. Savas, and C.K. Koc (Oregon State U, US) | Scalable and Unified Hardware to Compute Montgomery Inverse in GF(p) and GF(2^n) |
| J. Wolkerstorfer (TU-Graz, AT) | Dual-Field Arithmetic Unit for GF(p) and GF(2^m) | ||
| A. Reyhani-Masoleh and A. Hasan (U Waterloo, CA) | Error Detection in Polynomial Basis Multipliers over Binary Extension Fields | ||
| D. Page and N. Smart (U Bristol, UK) | Hardware implementation of finite fields of characteristic three | ||
| 12:00 - 13:20 | Lunch | ||
| 13:20 - 14:35 | Session 12: Elliptic Curve Cryptography III | M. Ciet, J-J. Quisquater, and F. Sica (UCL, BE) | Preventing Differential Analysis in GLV Elliptic Curve Scalar Multiplication |
| J.C. Ha (Korea Nazarene U, KR) and S.J. Moon (Kyungpook National U, KR) | Randomized Signed-Scalar Multiplication of ECC to Resist Power Attacks | ||
| K. Okeya (Hitachi, JP) and K. Sakurai (Kyushu University, JP) | Fast Multi-Scalar Multiplication Methods on Elliptic Curves with Precomputation Strategy using Montgomery Trick | ||
| 14:35 - 15:25 | Session 13: Hardware for Cryptanalysis | R. Clayton and M. Bond (U Cambridge, UK) | Experience Using a Low-Cost FPGA Design to Crack DES Keys |
| F-X. Standaert, G. Rouvroy, J-J. Quisquater, and J-D. Legat (UCL, BE) | A Time-Memory Tradeoff using Distinguished Points: New Analysis & FPGA Results | ||
| 15:25 | Adjourn | ||