--- begin forwarded text Date: Fri, 11 Aug 2000 08:48:43 -0400 (EDT) From: Christof Paar <[EMAIL PROTECTED]> To: CHES Workshop: ; Subject: Final Program CHES 2000 Sender: [EMAIL PROTECTED] Reply-To: Christof Paar <[EMAIL PROTECTED]> FINAL PROGRAM CHES 2000 ------------------------------------------------------- Workshop on Cryptographic Hardware and Embedded Systems Worcester Polytechnic Institute Worcester, Massachusetts, August 17-18, 2000 http://ece.wpi.edu/Research/crypt/ches ------------------------------------------------------- =============== WEDNESDAY, AUGUST 16th ============== 5:00 - 10:00 pm REGISTRATION AND RECEPTION Evening Registration and Reception at Atwater Kent Building, WPI (Shuttle Service will be provided between WPI, the Crowne Plaza Hotel and the Courtyard Marriott Hotel) =============== THURSDAY, AUGUST 17th =============== 7:00 - 8:45 am REGISTRATION AND CONTINENTAL BREAKFAST Registration at Atwater Kent Building, WPI Continental Breakfast (Shuttle Service will be provided between WPI, the Crowne Plaza Hotel and Courtyard Marriott) 8:45 - 9:15 am WELCOME Welcome by Jack Carney (Provost, WPI) Introductory remarks by Cetin Koc and Christof Paar 9:15 - 9:55 am INVITED TALK Alfred Menezes, University of Waterloo, Canada Elliptic curve cryptography in constrained environments. 9:55 - 10:55 am IMPLEMENTATION OF ELLIPTIC CURVE CRYPTOSYSTEMS S. Okada, N. Torii, K. Ito, and M. Takenaka. Implementation of elliptic curve cryptographic coprocessor over GF(2^m) on FPGA. G. Orlando and C. Paar. A high-performance reconfigurable elliptic curve processor for GF(2^m). J. W. Chung, S. G. Sim, and P. J. Lee. Fast implementation of elliptic curve defined over GF(p^m) on CalmRISC with MAC2424 coprocessor. 10:55 - 11:15 am BREAK 11:15 - 12:35 pm POWER AND TIMING ANALYSIS ATTACKS A. Shamir. Protecting smart cards from passive power analysis with detached power supplies. R. Mayer-Sommer. Smartly analyzing the simplicity and the power of simple power analysis on Smartcards. M. A. Hasan. Power analysis attacks and algorithmic approaches to their countermeasures for Koblitz curve cryptosystems. W. Schindler. A timing attack against RSA with the Chinese Remainder Theorem. 12:35 - 2:00 pm LUNCH BREAK 2:00 - 3:20 pm HARDWARE IMPLEMENTATION OF BLOCK CIPHERS A. Dandalis, V. K. Prasanna, and J. D. P. Rolim. A comparative study of performance of AES final candidates using FPGAs. C. Patterson. A dynamic FPGA implementation of the Serpent Block Cipher. S. Trimberger, R. Pang, and A. Singh. A 12 Gbps DES Encryptor/Decryptor core in an FPGA. H. Leitold, W. Mayerwieser, U. Payer, K. C. Posch, R. Posch, and J. Wolkerstorfer. A 155 Mbps triple-DES network encryptor. 3:20 - 3:40 pm BREAK 3:40 - 5:00 pm HARDWARE ARCHITECTURES J. Goodman and A. Chandrakasan. An energy efficient reconfigurable public-key cryptography processor architecture. J. Groszschaedl. High-Speed RSA Hardware based on Barret's Modular Reduction Method. C. Walter. Data integrity in hardware for modular arithmetic. T. Kato, S. Ito, J. Anzai, and N. Matsuzaki. A design for modular exponentiation coprocessor in mobile telecommunication terminals. 6:00 - 9:00 pm CHES BANQUET 7:00 - 9:00 pm Shuttle Service will be provided between WPI, the Crowne Plaza Hotel and Courtyard Marriott =============== FRIDAY, AUGUST 18TH ============== 8:00 - 9:00 am REGISTRATION AND CONTINENTAL BREAKFAST Registration at Atwater Kent Building, WPI Continental Breakfast (Shuttle Service will be provided between WPI, the Crowne Plaza Hotel and Courtyard Marriott) 9:00 - 9:40 am INVITED TALK David Naccache, Gemplus, France. How to explain side channel leakage to your kids. 9:40 - 10:40 am POWER ANALYSIS ATTACKS J.-S. Coron and L. Goubin. On Boolean and arithmetic masking against differential power analysis. T. S. Messerges. Using second-order power analysis to attack DPA resistant software. C. Clavier, J.-S. Coron, and N. Dabbous. Differential power analysis in the presence of hardware countermeasures. 10:40 - 11:00 am BREAK 11:00 - 12:00 pm ARITHMETIC ARCHITECTURES H. Wu. Montgomery multiplier and squarer in GF(2^m). E. Savas, A. F. Tenca, and C. K. Koc. A scalable and unified multiplier architecture for finite fields GF(p) and GF(2^m). G. Hachez and J.-J. Quisquater. Montgomery exponentiation with no final subtraction: Improved results. 12:00 - 1:30 pm LUNCH BREAK 1:30 - 2:10 pm PHYSICAL SECURITY AND CRYPTANLYSIS S. H. Weingart. Physical security devices for computer subsystems: A survey of attacks and defenses. T. Pornin and J. Stern. Software-Hardware Trade-offs: application to A5/1 Cryptanalysis. 2:10 - 2:50 pm NEW SCHEMES AND ALGORITHMS J. Hoffstein and J. Silverman. MiniPASS: Authentication and digital signatures in a constrained environment. M. Joye, P. Paillier, and S. Vaudenay. Efficient generation of prime numbers. 2:50 - 3:00 pm CONCLUDING REMARKS 2:30 - 4:30 pm Shuttle Service will be provided between WPI, the Crowne Plaza Hotel and Courtyard Marriott NOTES: - Invited talks are 40 min - Regular presentations are 20 min long - The Thursday program is from 8:45 am - 5:00 pm - The Friday program is from 9:00 am - 3:00 pm For help on using this list (especially unsubscribing), send a message to "[EMAIL PROTECTED]" with one line of text: "help". --- end forwarded text -- ----------------- R. A. Hettinga <mailto: [EMAIL PROTECTED]> The Internet Bearer Underwriting Corporation <http://www.ibuc.com/> 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'