| Wednesday, August 11th | |
| Time | Event |
|---|---|
| 5:00 pm - 10:00 pm; | Evening Registration and Reception at Salisbury Lounge |
| Shuttle Service will be provided between WPI and the Crowne Plaza Hotel every half an hour | |
| Thursday, August 12th | |||
| Time | Event | ||
|---|---|---|---|
| 7:00 am - 8:45 am | Registration at Salisbury Lounge | ||
| Continental Breakfast | |||
| Shuttle Service will be provided between WPI and the Crowne Plaza Hotel every half an hour | |||
| 8:45 am - 9:15 am | Welcome by Ed Parrish (President, WPI) | ||
| Introductory remarks by Cetin Koc and Christof Paar | |||
| Session | Authors | Talk's Title | |
| 9:15 am - 9:55 am | Invited Talk | Brian Snow, National Security Agency, USA |
We Need Assurance |
| 9:55 am - 10:35 am | Cryptoanalytical Hardware | A. Shamir | Factoring large numbers with the TWINKLE device |
| I. Hamer and P. Chow | DES cracking on the Transmogrifier 2a | ||
| 10:35 am - 11:00 am | break | ||
| 11:00 am - 12:00 pm | Hardware Architectures | W.P. Choi and L.M. Cheng | Modeling the crypto-processor from design to synthesis |
| D.C. Wilcox, L.G. Pierson, P.J. Robertson, E.L. Witzke, and K. Gass | A DES ASIC suitable for network encryption at 10 Gbps and beyond | ||
| E. Hong, J.-H. Chung, and C.H. Lim | Hardware design and performance estimation of the 128-bit block cipher CRYPTON | ||
| 12:00 pm - 12:40 pm | Smart Cards and Embedded Systems | K. Itoh, M. Takenaka, N. Torii, S. Temma, and Y. Kurihara | Fast implementation of public-key cryptography on a DSP TMS320C6201 |
| P.J. Lee, E.J. Lee, and Y.D. Kim | How to implement cost-effective and secure public key cryptosystems | ||
| 12:40 pm - 1:55 pm | lunch break | ||
| 1:55 pm - 2:35 pm | Invited Talk | Colin D. Walter, Computation Department - UMIST, U.K. | An Overview of Montgomery's Multiplication Technique: How to make it Smaller and Faster |
| 2:35 pm - 3:15pm | Arithmetic Algorithms I | A.F. Tenca and C.K. Koc | A scalable architecture for Montgomery multiplication |
| T. Horvath | Arithmetic design for permutation groups | ||
| 3:15 pm - 3:40 pm | break | ||
| 3:40 pm - 4:20 pm | Arithmetic Algorithms I (Continued) | J.H. Silverman. | Fast multiplication in finite fields GF(2n) |
| B. Kaliski and M. Liskov | Efficient finite field basis conversion involving dual bases | ||
| 4:20 pm - 5:20 pm | Power Attacks I | T.S. Messerges, E.A. Dabbish, and R.H. Sloan | Power analysis attacks of modular exponentiation in smartcards |
| L. Goubin and J. Patarin | DES and differential power analysis | ||
| P. Fahn and P. Pearson | IPA: A new class of power attacks | ||
| 5:30 pm - 6:30 pm | Hospitality Bar (Wine and Beer) at Higgins House | ||
| 6:30 pm - 9:00 pm | CHES Banquet on the WPI Campus, sponsored by Technical Communications Corporation, MA | ||
| 9:00 pm - 10:00 pm | Shuttle Service between WPI and the Crowne Plaza will be provided | ||
| Friday, August 13th | |||
| Time | Event | ||
|---|---|---|---|
| 7:00 am - 8:45 am | Registration at Salisbury Lounge | ||
| Continental Breakfast | |||
| Shuttle Service will be provided between WPI and the Crowne Plaza Hotel every half an hour | |||
| Session | Authors | Talk's Title | |
| 8:45 am - 9:25 am | Invited Talk | Eberhard von Faber, Debis IT Security Services, Germany | Security Evaluation Schemes for the Public and Private Market with a Focus on Smart Card Systems |
| 9:25 am - 10:05 am | True Random Number Generators | V. Bagini and M. Bucci | A design of reliable true random number generator for cryptographic applications |
| D. Maher and B. Rance | Random number generators founded on signal and information theory | ||
| 10:05 am - 10:30 am | break | ||
| 10:30 am - 11:30 am | Cryptographic Algorithms on FPGAs | R.R. Taylor and S.C. Goldstein | A high-performance flexible architecture for cryptography |
| E. Mosanya, C. Teuscher, H.F. Restrepo,P. Galley, and E. Sanchez | CryptoBooster: A reconfigurable and modular cryptographic coprocessor | ||
| L. Gao, S. Shrivastava, and G.E. Sobelman | Elliptic curve scalar multiplier design using FPGAs | ||
| 11:30 am - 12:10 pm | Arithmetic Algorithms II | H. Wu, M.A. Hasan, and I.F. Blake. | Highly regular architectures for finite field computation using redundant basis |
| H. Wu | Low complexity bit-parallel finite field arithmetic using polynomial basis | ||
| 12:10 pm - 1:25 pm | lunch break | ||
| 1:25 pm - 2:05 pm | Power Attacks II | J.-S. Coron | Resistance against differential power analysis attacks for elliptic curve cryptosystems |
| H. Handschuh, P. Paillier, and J. Stern | Probing attacks on tamper-resistant devices | ||
| 2:05 pm - 2:25 pm | Elliptic Curve Implementations | J. Lopez and R. Dahab | Fast multiplication on elliptic curves over GF(2m) without precomputation |
| 2:25 pm - 2:50 pm | break | ||
| 2:50 pm - 3:10 pm | Elliptic Curve Implementations | Y. Han, and P.-C. Tan | Direct computation for elliptic curve cryptosystems |
| 3:10 pm - 3:50 pm | New Cryptographic Schemes and Modes of Operation | M. Hartmann, S. Paulus, and T. Takagi | NICE - New Ideal Coset Encryption - |
| O. Jung and C. Ruland | Encryption with statistical self-synchronization in synchronous broadband networks | ||
| 3:50 pm - 4:50 pm | Shuttle Service between WPI and the Crowne Plaza will be provided | ||