..

Call for Papers

Download as   PDF | PS | TXT



Important Dates

Submission Deadline:2011/12/12
Submission extended:2011/12/16
Author Notification:2012/02/14
Final Version Due:2011/02/28
Workshop commences:2012/05/03 - 2012/05/04

Follow COSADE 2012 on


Supported by:




Contact

Local Organisation
cosade2012{at}cased.de

Program

Wednesday, 2nd May 2012

18:00
-
20:00

Registration & Reception

Thursday, 3rd May 2012
  Session

Authors

Title

09:00 Registration
09:45 Welcome, Opening Remarks
10:00Session I: Practical Side-Channel Analysis
Talk #1: Michael Hutter, Mario Kirschbaum, Thomas Plos, Jörn-Marc Schmidt, Stefan Mangard Exploiting the Difference of Side-Channel Leakages
Talk #2: Thomas Korak, Thomas Plos, Michael Hutter Attacking an AES-enabled NFC Tag - Implications from Design to a Real-World Scenario
10:50Coffee Break
11:20Session II: Work in Progress I
WIP Talk #1: Rajesh Velegalati, Jens-Peter Kaps Introducing FOBOS: Flexible Open-source BOard for Side-channel analysis
WIP Talk #2: Marek Repka, Lubos Gaspar, Pavol Zajac, Viktor Fischer Hamming Distance Power Model Analysis of AES at Architecture Level
11:50Lunch
13:00Invited Talk I Viktor Fischer
Université de Saint-Etienne
A Close Look at Security in Random Number Generators Design
14:00Session III: Secure Design
Talk #3: Wei He, Eduardo de la Torre, Teresa Riesgo An Interleaved EPE-Immune PA-DPL Structure for Resisting Concentrated EM Side Channel Attacks on FPGA Implementation
Talk #4: Shohreh Sharif Mansouri, Elena Dubrova An Architectural Countermeasure Against Power Analysis Attacks for FSR-Based Stream Ciphers
Talk #5: Jean-Sébastien Coron, Christophe Giraud, Emmanuel Prouff, Soline Renner, Matthieu Rivain, Praveen Kumar Vadnala Conversion of Security Proofs from One Model to Another: A New Issue
15:15Coffee Break
15:45Session IV: Side-Channel Attacks on RSA
Talk #6: Sven Bauer Attacking Exponent Blinding in RSA without CRT
Talk #7: Jean Da Rolt, Amitabh Das, Giorgio Di Natale, Marie-Lise Flottes, Bruno Rouzeyre, Ingrid Verbauwhede A New Scan Attack on RSA in Presence of Industrial Countermeasures
Talk #8: Camille Vuillaume, Takashi Endo, Paul Wooderson RSA Key Generation: New Attacks
17:00Special Session I

DPA contest v3 (Results) and DPA contest v4 (Announcement)
19:15 Departure to the Social Event
19:30
Social Event
Orangerie, Darmstadt
Friday, 4th May 2012
9:00Session V: Fault Attacks
Talk #9: Philipp Jovanovic, Martin Kreuzer, Ilia Polian A Fault Attack on the LED Block Cipher
Talk #10: Liang Zhao, Takashi Nishide, Kouichi Sakurai Differential Fault Analysis of Full LBlock
Talk #11: Pierre Bayon, Lilia Bossuet, Alain Aubert, Victor Fischer, François Poucheret, Bruno Robisson, Philippe Maurine Contactless Electromagnetic Active Attack on Ring Oscillator Based True Random Number Generator
10:15Coffee Break
10:45Special Session II

Eloi Sanfelix Gonzalez: Using Multi-Area Diode Lasers and Developing EM FI Tools
11:25Session VI: Work in Progress II
WIP Talk #3: Thomas Feller On the Side-Channel Properties of A Modern Lattice-Based Encryption Scheme
WIP Talk #4: Nicolas Veyrat-Charvillon and BenoÎt Gérard and Mathieu Renauld and François-Xavier Standaert An Efficient Implementation of the Key Enumeration Algorithm
11:55Lunch
13:10Invited Talk II Mathias Wagner
NXP Semiconductors
700+ Attacks Published on Smart Cards: The Need for a Systematic Counter Strategy
14:10Session VII: Side-Channel Attacks on ECC
Talk #12: Cédric Murdica, Sylvain Guilley, Jean-Luc Danger, Philippe Hoogvorst, David Naccache Same Values Power Analysis Using Special Points on Elliptic Curves
Talk #13: Alexander Krüger The Schindler-Itoh-Attack in Case of Partial Information Leakage
15:00Coffee Break
15:30Session VIII: Different Methods in Side-Channel Analysis
Talk #14: Michael Zohner, Marc Stöttinger, Michael Kasper Butterfly-Attack on Skein's Modular Addition
Talk #15: Xinjie Zhao, Fan Zhang, Shize Guo, Tao Wang, Zhijie Shi, Huiying Liu, Keke Ji MDASCA: An Enhanced Algebraic Side-Channel Attack for Error Tolerance and New Leakage Model Exploitation
Talk #16: Annelie Heuser, Michael Zohner Intelligent Machine Homicide: Breaking Cryptographic Devices using Support Vector Machines
16:45Announcement of COSADE 2013
16:50 Closing Remarks, Goodbye