..

Call for Papers

Download as   PDF | PS | TXT



Important Dates

Submission Deadline:2011/12/12
Submission extended:2011/12/16
Author Notification:2012/02/14
Final Version Due:2011/02/28
Workshop commences:2012/05/03 - 2012/05/04

Follow COSADE 2012 on


Supported by:




Contact

Local Organisation
cosade2012{at}cased.de

Presentations

The presentations of COSADE 2012 can download here. In order to restrict the access to participants of COSADE 2012, we have encrypted the presentations. Each participant will receive an eMail, containing the corresponding password.

COSADE 2012

Side-channel analysis (SCA) and implementation attacks have become an important field of research at universities and in the industry. In order to enhance the resistance of cryptographic and security critical implementations within the design phase, constructive attacks and analyzing techniques may serve as a quality metric to optimize the design- and development process. This workshop provides an international platform for researchers, academics, and industry participants to present their work and their current research topics. It is an excellent opportunity to meet experts and to initiate new collaborations and information exchange at a professional level. The workshop will feature both invited presentations and contributed talks.

The topics of COSADE 2012 include but are not limited to:

Side-Channel Analysis and Implementation Attacks:

  • Constructive side-channel analysis and implementation attacks in general
  • Profiled and non-profiled methods for constructive side-channel analysis
  • Non-invasive, semi-Invasive and invasive implementation attacks
  • Power attacks and electromagnetic analysis
  • Advanced stochastic methods in SCA, especially in power- and electromagnetic analysis
  • Stochastic approach in power analysis
  • Leakage models and security models for side-channel analysis in the presence and absence of countermeasures
  • Advanced methods for Differential Power Analysis and Mutual Information Analysis
  • Algebraic side-channel analysis and combination of implementation attacks with algebraic cryptanalysis
  • Side-channel analysis under black-box assumptions
  • Side-channel analysis and implementation attacks on cyber physical systems and embedded devices
  • Timing-analysis, cache-attacks and micro-architectural analysis
  • Side-channel analysis in cloud and virtualization contexts

Cryptographic Engineering, Secure Design and Side-channel Evaluation:

  • Cryptographic engineering and secure design methods in general
  • Leakage resilience, tamper resistance and fault tolerance by design
  • Interaction between side-channel analysis and secure design
  • Evaluation methodologies for side-channel resistant designs, acquisition and analysis
  • Advanced techniques for physical side-channel measurement, side-channel acquisition and preprocessing
  • Verification methods for side-channel analysis and fault analysis
  • Side-channel aware and tamper-resistant design criteria and design techniques
  • Countermeasures against implementation attacks at algorithmic-, logic-, register transfer- and physical level
  • Secure designs and countermeasures for FPGAs, HW/SW Codesign-architectures and SoC
  • Fault injection and fault tolerance tools for reconfigurable hardware and SoC
  • Decapsulation and preparation techniques
  • Evaluation platforms and tools for testing of side-channel characteristics
  • Side-channel based reverse engineering
  • New and emerging methods and applications for constructive side channel analysis and secure design
 
Contributions

Prospective authors are invited to submit full papers with max. 15 pages. All submitted contributions will be peer reviewed by experts in the field. In order to ensure blind review, the submissions should not contain the author's name or affiliation.

 

Workshop Proceedings

The proceedings will be published in the Springer LNCS series. In order to be included in the proceedings, the authors of accepted papers must guarantee that their paper will be presented at the conference. In addition, the Journal of Cryptographic Engineering will be publishing selected papers.

  



Work in Progress Session (WiP)

COSADE 2012 also comprises a special session "Work in progress". The Work-in-Progress (WiP) session will be dedicated to new, on-going research in constrictive side channel analysis and secure design. Applicants should submit extended abstracts (4-6 pages) by March 13, 2012. The manuscript should also follow the LNCS default author instructions.

 

Important Dates:
  • Submission deadline: December 12, 2011
  • Submission extended: December, 16, 2011
  • Notification to authors: February 14, 2012
  • Final version due: February 28, 2012
  • Submission deadline "WiP": March 13, 2012
  • Notification to authors "WiP": April 1, 2012
Location:

Darmstadtium – science & congress center
Schlossgraben 1, 64283 Darmstadt