| Monday, August 11 | ||||
| Time | Event | |||
|---|---|---|---|---|
| Session | Authors | Title | ||
| 08:00 - 17:30 | Registration | |||
| 10:00 - 17:30 | Exhibit of Cryptographic Hardware | |||
| 09:00 - 09:15 | Welcome | |||
| 09:15 - 10:30 | Session 1: Side Channel Attacks I Chair: Josh Jaffe |
Jean-Sébastien Coron, Christophe Giraud, Emmanuel Prouff, Matthieu Rivain | Attack and Improvement of a Secure S-box Calculation Based on the Fourier Transform. | |
| Naofumi Homma, Atsushi Miyamoto, Takafumi Aoki, Akashi Satoh, Adi Shamir | Collision-based Power Analysis of Modular Exponentiation Using Chosen-message Pairs. | |||
| Andrey Bogdanov | Multiple-Differential Side-Channel Collision Attacks on AES. | |||
| 10:30 - 11:00 | Coffee Break | |||
| 11:00 - 12:15 | Session 2: Public Key Cryptography: Implementations Chair: Lejla Batina |
Andrey Bogdanov, Thomas Eisenbarth, Andy Rupp, Christopher Wolf | Time-Area Optimized Public-Key Engines: MQ-Cryptosystems as Replacement for Elliptic Curves? | |
| Tim Güneysu, Christof Paar | Ultra High Performance ECC over NIST Primes on Commercial FPGAs. | |||
| Robert Szerwinski, Tim Güneysu | Exploiting the Power of GPUs for Asymmetric Cryptography. | |||
| 12:15 - 13:45 | Lunch (Buffet) | |||
| 13:45 - 15:00 | Session 3: Fault Analysis Countermeasures Chair: J-P Seifert |
Akashi Satoh, Takeshi Sugawara, Naofumi Homma, Takafumi Aoki | High-performance Concurrent Error Detection Scheme for AES Hardware. | |
| Mehran Mozaffari-Kermani, Arash Reyhani-Masoleh | A Lightweight Concurrent Fault Detection Scheme for the AES S-boxes Using Normal Basis. | |||
| David Vigilant | RSA with CRT: A New Cost-Effective Solution to Thwart Fault Attacks. | |||
| 15:00 - 15:30 | Coffee Break | |||
| 15:30 - 16:45 | Session 4: Randomness for Cryptography Chair: Marc Joye |
Wolfgang Killmann, Werner Schindler | A Design for a Physical RNG with Robust Entropy Estimators. | |
| Ihor Vasyltsov, Eduard Hambardzumyan, Young-Sik Kim, Bohdan Karpinskyy | Fast Digital TRNG based on Metastable Ring Oscillator. | |||
| Christoph Boesch, Jorge Guajardo, Ahmad-Reza Sadeghi, Jamshid Shokrollahi, Pim Tuyls | Efficient Helper Data Key Extractor on FPGAs. | |||
| 19:00 - 20:00 | Reception in the National Museum of Women in the Arts (NMWA) Gallery is open for viewing. | |||
| 20:00 - 23:00 | CHES Banquet Dinner in NWMA
| |||
| Tuesday, August 12 | |||
| Time | Event | ||
|---|---|---|---|
| Session | Authors | Title | |
| 09:00 - 18:00 | Registration | ||
| 10:00 - 17:00 | Exhibit of Cryptographic Hardware | ||
| 08:00 - 13:00 | Tour of the National Cryptologic Museum in Fort Meade Tour 1: leaving Hotel at 08:00 - returning 11:00 (lunch on your own) Tour 2: leaving Hotel at 09:00 - returning 12:00 (lunch on your own) Tour 3: leaving Hotel at 10:00 - returning 13:00 (lunch box in the museum) Tour 4: leaving Hotel at 10:30 - returning 14:00 (lunch box in the museum) | ||
| 13:00 - 14:00 | Poster Session Chair: Patrick Schaumont |
||
| 14:00 - 15:15 | Session 5: Side Channel Attacks II Chair: Elena Trichina |
Pierre-Alain Fouque, Denis Réal, Frédéric Valette, Mhamed Drissi | The Carry Leakage on the Randomized Exponent Countermeasure. |
| Colin D. Walter | Recovering Secret Keys from Weak Side Channel Traces of Differing Lengths. | ||
| Stefan Tillich, Christoph Herbst | Attacking State-of-the-Art Software Countermeasures - A Case Study for AES. | ||
| 15:15 - 15:45 | Coffee Break | ||
| 15:45 - 16:45 | Invited Talk I Chair: Pankaj Rohatgi |
Ernie Brickell Intel Corporation |
A Vision for Platform Security [Abstract] |
| 16:45 - 18:00 | Session 6: Cryptographic Primitives and Cryptanalysis Chair: Dan Bernstein, Pankaj Rohatgi |
Daniel J. Bernstein, Tanja Lange, Reza Rezaeian Farashahi | Binary Edwards Curves. |
| Timo Gendrullis, Martin Novotny, Andy Rupp | A Real-World Attack Breaking A5/1 within Hours. | ||
| Andrey Bogdanov, Gregor Leander, Christof Paar, Axel Poschmann, Matt J.B. Robshaw, Yannick Seurin | Hash Functions and RFID Tags: Mind The Gap. | ||
| 19:15 - 21:00 | Panel Discussion and Dinner
Chair: David Hwang | ||
| 21:00 - 21:30 | Poster Session & Exhibit of Cryptographic Hardware Chair: Patrick Schaumont | ||
| 21:30 - 23:00 | Rump Session and Dessert Chair: Patrick Schaumont | ||
| Wednesday, August 13 | |||
| Time | Event | ||
|---|---|---|---|
| Session | Authors | Title | |
| 08:30 - 16:30 | Registration | ||
| 10:00 - 15:30 | Exhibit of Cryptographic Hardware | ||
| 09:00 - 10:15 | Session 7: Efficient Cryptographic Implementations Chair: Akashi Satoh |
Arash Reyhani-Masoleh | A New Bit-Serial Architecture for Field Multiplication Using Polynomial Bases. |
| Dai Yamamoto, Jun Yajima, Kouichi Itoh | A Very Compact Hardware Implementation of the MISTY1 Block Cipher. | ||
| Philipp Grabher, Johann Großschädl, Dan Page | Light-Weight Instruction Set Extensions for Bit-Sliced Cryptography. | ||
| 10:15 - 10:45 | Coffee Break | ||
| 10:45 - 11:45 | Invited Talk II Chair: Elisabeth Oswald |
Adi Shamir The Weizmann Institute of Science |
RSA - Past, Present, Future [Abstract] |
| 11:45 - 13:15 | Lunch (Buffet) | ||
| 13:15 - 14:30 | Session 8: Fault Analysis Chair: Christophe Clavier |
Nele Mentens, Benedikt Gierlichs, Ingrid Verbauwhede | Power and Fault Analysis Resistance in Hardware through Dynamic Reconfiguration. |
| Michael Hutter, Jörn-Marc Schmidt, Thomas Plos | RFID and its Vulnerability to Faults. | ||
| Alexandre Berzati, Cecile Canovas, Louis Goubin | Perturbating RSA Public Keys: an Improved Attack. | ||
| 14:30 - 15:00 | Coffee Break | ||
| 15:00 - 16:15 | Session 9: Side Channel Analysis and Defense Techniques Chair: Stephan Mangard |
Karthik Baddam, Mark Zwolinski | Divided Backend Duplication Methodology for Balanced Dual Rail Routing. |
| F.-X. Standaert, C. Archambeau | Using Subspace-Based Template Attacks to Compare and Combine Power and Electromagnetic Information Leakages. | ||
| Benedikt Gierlichs, Lejla Batina, Pim Tuyls, Bart Preneel | Mutual Information Analysis. | ||
| 16:15 - 16:30 | Good Bye | ||