| Monday, August 29 | |||
| Time | Event | ||
|---|---|---|---|
| 18:00-20:00 | Registration at the Conference Hotel | ||
| 19:00-21:00 | Welcome Reception (wine, sandwich and canapés) | ||
| Tuesday, August 30 | |||
| Time | Event | ||
|---|---|---|---|
| Session | Authors | Talk's Title | |
| 8:00 - ... | Registration desk reopens | ||
| 8:20 - 9:00 | Tea, Coffee and Danish | ||
| 9:00 - 9:15 | Welcome to CHES 2005 | ||
| 9:15 - 10:30 | Session 1: Side Channels I |
William Dupuy, Sébastien Kunz-Jacques | Resistance of Randomized Projective Coordinates Against Power Analysis |
| Dakshi Agrawal, Josyula R Rao, Pankaj Rohatgi, Kai Schramm | Templates as Master Keys | ||
| Werner Schindler, Kerstin Lemke, Christof Paar | A Stochastic Model for Differential Side Channel Cryptanalysis | ||
| 10:30 - 11:00 | Coffee break | ||
| 11:00 - 12:00 | Invited Talk | Ross Anderson University of Cambridge |
What Identity Systems Can and Cannot Do |
| 12:00- 12:50 | Session 2: Arithmetic for Cryptanalysis |
Jean-Sébastien Coron, David Lefranc, Guillaume Poupard | a new baby-step giant-step algorithm and some applications to cryptanalysis |
| P.J. Green, R. Noad, N.P. Smart | Further Hidden Markov Model Cryptanalysis | ||
| 12:50 - 14:00 | Buffet lunch in hotel quadrangle | ||
| 14:00 - 15:15 | Session 3: Low Resources |
Johann Großschädl, Roberto M. Avanzi, Erkay Savaş, Stefan Tillich | Energy-Efficient Software Implementation of Long Integer Modular Arithmetic |
| Katsuyuki Okeya, Tsuyoshi Takagi, Camille Vuillaume | Short-Memory Scalar Multiplication on Koblitz Curves | ||
| David Hwang, Lejla Batina, Alireza Hodjat, Bart Preneel, Ingrid Verbauwhede | Hardware/Software Co-design for Hyperelliptic Curve Cryptography (HECC) on the 8051 microprocessor | ||
| 15:15 - 15:45 | Coffee break | ||
| 15:45 - 17:00 | Session 4: Special Purpose Hardware |
Jens Franke, Thorsten Kleinjung, Christof Paar, Jan Pelzl, Christine Priplata, Colin Stahlke | SHARK - A Realizable Special Hardware Sieving Device for Factoring 1024-bit Integers |
| Willi Geiselmann, Adi Shamir, Rainer Steinwandt, Eran Tromer | Scalable Hardware for Sparse Systems of Linear Equations, with Applications to Integer Factorization | ||
| Marco Bucci, Raimondo Luzzi | Design of Testable Random Bit Generators | ||
| 19:00 - 20:30 | Dinner in Hotel's George Suite | ||
| 21:00 - 22:30 | Rump Session | ||
| Wednesday, August 31 | |||
| Time | Event | ||
|---|---|---|---|
| Session | Authors | Talk's Title | |
| 8:30 - ... | Registration desk opens | ||
| 8:20 - 9:00 | Tea, Coffee and Danish | ||
| 09:00 - 10:15 | Session 5: Hardware Attacks and Countermeasures I |
Stefan Mangard, Norbert Pramstaller, Elisabeth Oswald | Successfully Attacking Masked AES Hardware Implementations |
| Thomas Popp, Stefan Mangard | Masked Dual-Rail Pre-Charge Logic: DPA-Resistance without Routing Constraints | ||
| Wieland Fischer, Berndt M. Gammel | Masking at Gate Level in the Presence of Glitches | ||
| 10:15 - 10:45 | Coffee Break | ||
| 10:45 - 12:25 | Session 6: Arithmetic for Cryptography |
Marcelo E. Kaihara, Naofumi Takagi | Bipartite Modular Multiplication |
| Laszlo Hars | Fast Truncated Multiplication and its Applications in Cryptography | ||
| Martin Seysen | Using an RSA accelerator for modular inversion | ||
| David Cyganski, Berk Sunar | Comparison of Bit and Word Level Algorithms for Evaluating Unstructured Functions over Finite Rings | ||
| 12:25 - 14:00 | Buffet lunch in hotel quadrangle | ||
| 14:00 - 15:15 | Session 7: Side Channel II (EM) |
C.Gebotys, S.Ho, C.Tiu | EM Analysis of Rijndael and ECC on a Wireless Java-based PDA |
| Markus G. Kuhn | Security Limits for Compromising Emanations | ||
| Huiyun Li, Theodore Markettos,Simon Moore | Security Evaluation Against Electromagnetic Analysis at Design Time | ||
| 15:15 - 15:45 | Coffee break | ||
| 15:45 - 16:35 | Session 8: Side Channel III |
Marc Joye, Pascal Paillier, Berry Schoenmakers | On Second-Order Differential Power Analysis |
| Eric Peeters, François-Xavier Standaert, Nicolas Donckers,Jean-Jacques Quisquater | Improved Higher-Order Side-Channel Attacks with FPGA Experiments | ||
| 16:35 - 17:00 | Session 9: Trusted Computing |
Ulrich Kühn, Klaus Kursawe,Stefan Lucks, Ahmad-Reza Sadeghi,Christian Stüble | Secure Data Management in Trusted Computing |
| 17:00 - 17:15 | Break | ||
| 17:15 - 18:45 | Invited Talk | Thomas Wille Philips Semiconductors Inc |
Scurity of Identification Products: How to Manage |
| 19:30 - 23:00 | Banquet at the Royal Museum (name badge required) | ||
| Thursday, September 1 | |||
| Time | Event | ||
|---|---|---|---|
| Session | Authors | Talk's Title | |
| 8:30 - ... | Registration desk opens | ||
| 8:20 - 9:00 | Tea, Coffee and Danish | ||
| 09:00 - 10:00 | Invited Talk | Jim Ward Trusted Computing Group and IBM |
Trusted Computing in Embedded Systems |
| 10:00 - 10:50 | Session 10: Hardware Attacks and Countermeasures II |
Sergei Skorobogatov | Data Remanence in Flash Memory Devices |
| Kris Tiri, David Hwang, Alireza Hodjat, Bo-Cheng Lai, Shenglin Yang, Patrick Schaumont, Ingrid Verbauwhede | Prototype IC with WDDL and Differential Routing DPA Resistance Assessment | ||
| 10:50 - 11:20 | Coffee Break | ||
| 11:20 - 12:10 | Session 11: Hardware Attacks and Countermeasures III |
Daisuke Suzuki, Minoru Saeki, Tetsuya Ichikawa | DPA Leakage Models for CMOS Logic Circuits |
| Sylvain Guilley, Philippe Hoogvorst, Yves Mathieu, Renaud Pacalet | The "backend duplication" method | ||
| 12:10 - 13:30 | Buffet lunch in hotel quadrangle | ||
| 13:30 - 14:20 | Session 12: Efficient Hardware I |
P. Grabher, D. Page | Hardware Acceleration of the Tate Pairing in Characteristic Three |
| T. Kerins, W. P. Marnane, E. M. Popovici, P.S.L.M. Barreto | Efficient hardware for the Tate pairing calculation in characteristic three | ||
| 14:20 - 14:50 | Coffee Break | ||
| 14:50 - 15:40 | Session 13: Efficient Hardware II |
T. Good and M. Benaissa | AES on FPGA from the fastest to the smallest |
| D. Canright | A Very Compact S-box for AES | ||
| 15:40 - 16:00 | Best Paper Awards and Concluding Remarks | ||
Note: Regular presentations are 25 minutes long including questions.