CHES

IACR

Workshop on Cryptographic Hardware and Embedded Systems 2013 (CHES 2013)

Santa Barbara, California, USA
Tuesday August 20th - Friday August 23rd 2013

The program can be downloaded in PDF format.

[Tuesday, 8/20] [Wednesday, 8/21] [Thursday, 8/22] [Friday, 8/23]

Program

Tuesday, August 20th
University Center Flying A Room
TimeEvent
 SessionAuthorsTitle
10:00 - 13:00 CHES Tutorial 1 Emmanuel Prouff,
(French Network and Information Security Agency)
Title: "Side-channel Attacks and Dedicated Countermeasures"
Goal: present the state of the art attacks and countermeasures for software implementations of block ciphers, with a special focus on AES. (Abstract)
14:30 - 17:30 CHES Tutorial 2 Colin O'Flynn,
(Dalhousie University)
Title: "Power Analysis using Low-Cost Hardware: Lab Setup & Simple Targets"
Goal: The objective of this tutorial is to introduce the participant to setting up a power analysis laboratory with very low-cost hardware. (Abstract)
18:00 - 20:30CHES Reception and Registration
Manzanita Village

Wednesday, August 21st
University Center Corwin Pavilion
TimeEvent
 SessionAuthorsTitle
08:00 - 15:45Registration
Corwin Lobby
08:50 - 09:00 Opening Remarks
9:00 - 10:40 Session 1
Side-Channel Attacks

Chair: Matthieu Rivain
Amir Moradi and
Oliver Mischke (Horst Görtz Institute for IT Security, Ruhr Universität Bochum, Germany)
On the Simplicity of Converting Leakages from Multivariate to Univariate - Case Study of a Glitch-Resistant Masking Scheme
Adrian Thillard,
Emmanuel Prouff and
Thomas Roche (ANSSI, France).
Success through confidence: Evaluating the effectiveness of a side-channel attack
Carolyn Whitnall and
Elisabeth Oswald (University of Bristol, Department of Computer Science)
Profiling DPA: Efficacy and efficiency trade-offs
Yasser Shoukry,
Paul Martin,
Paulo Tabuada,
Mani Srivastava (UC Los Angeles)
Noninvasive Spoofing Attacks For Anti-lock Braking Systems
10:40 - 11:10Joint Coffee Break with CRYPTO 2013
Campbell Hall
11:10 - 12:10 Joint invited talk with Crypto 2013.
Chair: Juan Garay
Adam Langley,
(Google)
Why the web still runs on RC4
12:10 - 14:00Lunch
14:00 - 15:15 Session 2:
PUF

Chair: Tim Güneysu
Roel Maes (Intrinsic-ID) An Accurate Probabilistic Reliability Model for Silicon PUFs
Mudit Bhargava and
Ken Mai (Carnegie Mellon University)
A High Reliability PUF Using Hot Carrier Injection Based Response Reinforcement
Yossef Oren (Tel-Aviv University, Israel),
Ahmad-Reza Sadeghi (TU Darmstadt/CASED, Germany) and
Christian Wachsmann (Intel CRI-SC at TU Darmstadt, Germany)
On the Effectiveness of the Remanence Decay Side-Channel to Clone Memory-based PUFs
15:15 - 15:35Coffee Break
15:35 - 16:25 Session 3:
Lightweight cryptography

Chair: Ahmad-Reza Sadeghi
Peter Pessl and
Michael Hutter (Institut for Applied Information Processing and Communications (IAIK), Graz University of Technology, Austria)
Pushing The Limits of SHA-3 Hardware Implementations to Fit on RFID
Begul Bilgin (KU Leuven, Belgium, iMinds, Belgium, University of Twente, The Netherlands),
Andrey Bogdanov (Technical University of Denmark, Denmark),
Miroslav Knezevic (NXP Semiconductors, Belgium),
Florian Mendel (Graz University of Technology, Austria),
Qingju Wang (KU Leuven, Belgium, iMinds, Belgium, Shanghai Jiao Tong University, China)
FIDES: Lightweight Authenticated Cipher with Side-Channel Resistance for Constrained Hardware
16:40 - 17:40IACR Membership Meeting
18:00 - 20:30Catered BBQ
Santa Rosa Courtyard

Thursday, August 22nd
University Center Corwin Pavilion
TimeEvent
 SessionAuthorsTitle
08:00 - 15:15Registration
Corwin Lobby
9:00 - 10:40 Session 4:
Hardware implementations and fault attacks

Chair: Lejla Batina
Takeshi Sugawara (Mitsubishi Electric Corporation),
Daisuke Suzuki (Mitsubishi Electric Corporation),
Minoru Saeki (Mitsubishi Electric Corporation),
Mitsuru Shiozaki (Ritsumeikan University),
Takeshi Fujino (Ritsumeikan University)
On Measurable Side-Channel Leaks inside ASIC Design Primitives
Abdelkarim Cherkaoui (Laboratoire Hubert Curien, Saint-Etienne, France),
Viktor Fischer (Laboratoire Hubert Curien, Saint-Etienne, France),
Alain Aubert (Laboratoire Hubert Curien, Saint-Etienne, France) and
Laurent Fesquet (Laboratoire TIMA, Grenoble, France)
A Very High Speed True Random Number Generator with Entropy Assessment
Georg T. Becker (University of Massachusetts Amherst, USA),
Francesco Regazzoni (TU Delft, Netherlands and ALaRI - University of Lugano, Switzerland),
Christof Paar (Horst Görtz Institute for IT-Security, Ruhr-Universität Bochum, Germany and University of Massachusetts Amherst, USA) and
Wayne P. Burleson (University of Massachusetts Amherst, USA)
Stealthy Dopant-Level Hardware Trojans
Subhadeep Banik and
Subhamoy Maitra (Applied Statistics Unit, Indian Statistical Institute, India)
A Differential Fault Attack on MICKEY 2.0
10:40 - 11:10Coffee Break & Poster Session
11:10 - 12:10 Invited Talk
John Kelsey
(NIST)
The Future of SHA-3
12:10 - 14:00Lunch
14:00 - 15:40 Session 5:
Efficient and secure implementations

Chair: Bo-Yin Yang
Karim Bigou (INRIA Centre Rennes Bretagne Atlantique, IRISA, Université Rennes 1)
and Arnaud Tisserand (CNRS, IRISA, Université Rennes 1)
Improving Modular Inversion in RNS using the Plus-Minus Method
Daniel J. Bernstein (University of Illinois at Chicago and Technische Universiteit Eindhoven),
Tung Chou (Technische Universiteit Eindhoven) and
Peter Schwabe (Radboud University Nijmegen).
McBits: fast constant-time code-based cryptography
Stefan Heyse,
Ingo von Maurich,
Tim Güneysu (Horst Görtz Institute for IT-Security, Ruhr-Universität Bochum, Germany)
Smaller Keys for Code-based Cryptography: QC-MDPC McEliece Implementations on Embedded Devices
Ali Galip Bayrak (EPFL, Switzerland),
Francesco Regazzoni (TU Delft, Netherlands and ALaRI - University of Lugano, Switzerland),
David Novo (EPFL, Switzerland),
Paolo Ienne (EPFL, Switzerland)
Sleuth: Automated Verification of Software Power Analysis Countermeasures
15:40 - 16:10Coffee Break & Poster Session
18:00 - 22:00Reception and Rump Session
Chair: Christof Paar
Buses depart at 5:30 to Fess Parker DoubleTree

Friday, August 23rd
University Center Corwin Pavilion
TimeEvent
 SessionAuthorsTitle
08:00 - 15:45Registration
Corwin Lobby
9:00 - 10:40 Session 6:
ECC

Chair: Mehdi Tibouchi
Thomaz Oliveira (CINVESTAV-IPN, Mexico),
Julio Lopez (University of Campinas, Brazil),
Diego F. Aranha (University of Brasilia, Brazil) and
Francisco Rodriguez-Henriquez (CINVESTAV-IPN, Mexico)
Lambda coordinates for binary elliptic curves (Best Paper Award)
Joppe W. Bos (Microsoft Research),
Craig Costello (Microsoft Research),
Huseyin Hisil (Yasar University), and
Kristin Lauter (Microsoft Research)
High-Performance Scalar Multiplication using 8-Dimensional GLV/GLS Decomposition
Santosh Ghosh (Security Center of Excellence, Intel Corporation, OR, US),
Amit Kumar (Department of Electrical Engineering, IIT Kharagpur, WB, India),
Amitabh Das (COSIC, KU Leuven, Belgium),
Ingrid Verbauwhede (COSIC, KU Leuven, Belgium)
On the Implementation of Unified Arithmetic on Binary Huff Curves
Ronan Lashermes (CEA-Leti Minatec, Gardanne, France and UVSQ, Versailles, France) and
Jacques Fournier (CEA-Leti Minatec, Gardanne, France) and
Louis Goubin (UVSQ, Versailles, France)
Inverting the final exponentiation of Tate pairings on ordinary elliptic curves using faults
10:40 - 11:10Coffee Break
11:10 - 12:25 Session 7:
Masking

Chair: Emmanuel Prouff
Vincent Grosso,
François-Xavier Standaert and Sebastian Faust (UCL Crypto Group and EPFL, Switzerland)
Masking vs. Multiparty Computation: How Large is the Gap for AES?
Benoît Gérard,
Vincent Grosso,
Maria Naya-Plasencia and
François-Xavier Standaert (DGA and UCL Crypto Group and INRIA)
Block Ciphers that are Easier to Mask: How Far Can we Go?
Arnab Roy and
Srinivas Vivek (Université du Luxembourg)
Analysis and Improvement of the Generic Higher-Order Masking Scheme of FSE 2012
12:25 - 14:00Lunch
14:00 - 15:15 Session 8:
Side-channel Attacks and countermeasures

Chair: Francesco Regazzoni
Elke De Mulder (Cryptography Research),
Michael Hutter (Institute for Applied Information Processing and Communications (IAIK),
Graz University of Technology, Austria),
Mark E. Marson (Cryptography Research),
Peter Pearson (Cryptography Research)
Using Bleichenbacher's Solution to the Hidden Number Problem to Attack Nonce Leaks in 384-Bit ECDSA
Zhenqi Li,
Bin Zhang,
Junfeng Fan and
Ingrid Verbauwhede (Institute of Software, Chinese Academy of Sciences, State Key Laboratory of Information Security (SKLOIS), Institute of Information Engineering, Chinese Academy of Sciences, Katholieke Universiteit Leuven, ESAT SCD/COSIC)
A New Model for Error-Tolerant Side-Channel Cube Attacks
Michel Abdalla,
Sonia Belaïd and
Pierre-Alain Fouque (Ecole Normale Supérieure,
Thales Communications and Security, Rennes University)
Leakage-Resilient Symmetric Encryption via Re-keying
15:15 - 15:20Concluding remarks