(in PDF format; in PostScript format )
For the first time, there were Beste Paper Awards at CHES 2004. We congratulate the authors of the following two contributions:
| Tuesday, August 10 | |
| Time | Event |
|---|---|
| 18:00-20:00 | Registration at Conference Hotel and Welcome Reception (wine and cheese) |
| Wednesday, August 11 | |||
| Time | Event | ||
|---|---|---|---|
| 7:00 - ... | Registration continues | ||
| 8:30 - 8:45 | Welcome to CHES 2004 | ||
| Session | Authors | Talk'sTitle | |
| 8:45 - 10:00 | Session 1: Side Channels I |
Jason Waddle, David Wagner | Towards Efficient Second-Order Power Analysis |
| Eric Brier, Christophe Clavier, Francis Olivier | Correlation Power Analysis with a Leakage Model | ||
| François-Xavier Standaert, Siddika Berna Örs, Bart Preneel | Power Analysis of an FPGA | ||
| 10:00 - 10:30 | Coffee break | ||
| 10:30 - 11:30 | Invited Talk | Neil Gershenfeld The Center for Bits and Atoms, MIT |
Physical Information Security |
| 11:30 - 12:45 | Session 2: Modular Multiplication |
Laszlo Hars | Long Modular Multiplication for Cryptographic Applications |
| Jean-Claude Bajard, Laurent Imbert, Pierre-Yvan Liardet, Yannick Teglia | Leak Resistant Arithmetic | ||
| Soonhak Kwon, Kris Gaj, Chang Hoon Kim, Chun Pyo Hong | Efficient Linear Array for Multiplication in GF(2m) Using a Normal Basis for Elliptic Curve Cryptography | ||
| 12:45 - 14:15 | Lunch | ||
| 14:15 - 15:30 | Session 3: Low Ressources I |
Erdinc Öztürk, Berk Sunar, Erkay Savaş | Low Power Elliptic Curve Cryptography Using Scaled Modular Arithmetic |
| Harald Aigner, Holger Bock, Markus Hütter, Johannes Wolkerstorfer | A Low-cost ECC Coprocessor for Smartcards | ||
| Nils Gura, Arun Patel, Arvinderpal Wander, Hans Eberle, Sheueling Chang Shantz | Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs | ||
| 15:30 - 16:00 | Coffee break | ||
| 16:00 - 16:50 | Session 4: Implementation Aspects |
Johann Großschädl, Erkay Savaş | Instruction Set Extensions for Fast Arithmetic in Finite Fields GF (p) and GF(2 m) |
| Roberto Maria Avanzi | Aspects of Hyperelliptic Curves over Large Prime Fields in Software Implementations | ||
| 18:30 - 22:00 | Cruise Dinner (from Boston harbour) | ||
| Thursday, August 12 | |||
| Time | Event | ||
|---|---|---|---|
| Session | Authors | Talk's Title | |
| 08:30 - 9:20 | Session 5: Collision Attacks |
Kai Schramm, Gregor Leander, Patrick Felke, Christof Paar | A Collision-Attack on AES |
| Hervé Ledig, Frédéric Muller, Frédéric Valette | Enhancing Collision Attacks | ||
| 9:20 - 10:10 | Session 6: Side-Channels II |
Colin D. Walter | Simple Power Analysis of Unified Code for ECC Double and Add |
| Kerstin Lemke, Kai Schramm, Christof Paar | DPA on n-bit sized Boolean and Arithmetic Operations and its Application to IDEA, RC6 and the HMAC-Construction | ||
| 10:10 - 10:40 | Coffee Break | ||
| 10:40 - 11:30 | Session 6: Side-Channels II (cont'd) |
Loren D. Olson | Side-Channel Attacks in ECC: A General Technique for Varying the Parametrization of the Elliptic Curve |
| Olaf Neiße, Jürgen Pulkus | Switching Blindings | ||
| 11:30 - 12:20 | Session 7: Fault Attacks |
Jonathan J. Hoch, Adi Shamir | Fault Analysis of Stream Ciphers |
| Ludger Hemme | A Differential Fault Attack Against Early Rounds of (Triple-)DES | ||
| 12:20 - 14:00 | Lunch | ||
| 14:00 - 14:50 | Session 8: Hardware Implementation I |
Holger Bock, Marco Bucci, Raimondo Luzzi | An Offset-compensated Oscillator-based Random Bit Source for Security Applications |
| Danil Sokolov, Julian Murphy, Alex Bystrov, Alex Yakovlev | Improving the Security of Dual-Rail Circuits | ||
| 14:50 - 15:50 | Invited Talk | Isaac Chuang Medialab, MIT |
Quantum Cryptography |
| 15:50 - 16:20 | Coffee Break | ||
| 16:20 - 18:00 | Session 9: Side-Channels III |
Yasuyuki Sakai, Kouichi Sakurai | A New Attack with Side Channel Leakage during Exponent Recoding Computations |
| Pierre-Alain Fouque, Frédéric Muller, Guillaume Poupard, Frédéric Valette | Defeating Countermeasures Based on Randomized BSD Representations | ||
| Pradeep Kumar Mishra | Pipelined Computation of Scalar Multiplication in Elliptic Curve Cryptosystems | ||
| Hideyo Mamiya, Atsuko Miyaji, Hiroaki Morimoto | Efficient Countermeasures against RPA, DPA, and SPA | ||
| 19:00 - 20:30 | Dinner (hotel) | ||
| 20:30 | Rump Session | ||
| Friday, August 13 | |||
| Time | Event | ||
|---|---|---|---|
| Session | Authors | Talk's Title | |
| 09:00 - 10:00 | Invited Talk | Paul Kocher Cryptographic Research |
From Proof to Practice: Real - World Cryptography |
| 10:00 - 10:30 | Coffee break | ||
| 10:30 - 11:20 | Session 10: Low Ressources II |
Martin Feldhofer, Sandra Dominikus, Johannes Wolkerstorfer | Strong Authentication for RFID Systems using the AES Algorithm |
| Bo-Yin Yang, Jiun-Ming Chen, Yen-Hung Chen | TTS: High-Speed Signatures on a Low-Cost Smart Card | ||
| 11:20 - 12:10 | Session 11: Hardware Implementation II |
Eric Peeters, Michaël Nève, Mathieu Ciet | XTR Implementation in Reconfigurable Hardware |
| Nikhil Joshi, Kaijie Wu, Ramesh Karri | Concurrent Error Detection Schemes for Involution Ciphers | ||
| 12:10 - 13:40 | Lunch | ||
| 13:40 - 14:55 | Session 12: Authentication and Signatures |
Marc Girault, David Lefranc | Public Key Authentification with one (on-line) Single Addition |
| Peter J. Leadbitter, Dan Page, Nigel P. Smart | Attacking DSA under a Repeated Bits Assumption | ||
| Benoît Chevallier-Mames, David Naccache, Pascal Paillier, David Pointcheval | How to Disembed a Program? | ||
| 14:55 - 15:00 | Best Paper Award(s) and Concluding Remarks | ||
Note: Regular presentations are 25 minutes long including questions.