AppliedCrypto 2016

54 views
Skip to first unread message

D. J. Bernstein

unread,
Aug 15, 2016, 3:49:56 AM8/15/16
to applied-cryptogr...@googlegroups.com
Unified CHES+Crypto schedule, not double-checked yet, with highly
preliminary sorting into applied/non-applied:

https://2016.applied.cr.yp.to/schedule.html

---Dan

D. J. Bernstein

unread,
Aug 15, 2016, 1:53:20 PM8/15/16
to applied-cryptogr...@googlegroups.com
I think I've checked all dates and locations against the Crypto schedule
now. One important correction: I had listed Kocher's joint Crypto/CHES
talk as Corwin, but it's actually in Campbell. Now checking against the
CHES schedule.

---Dan

D. J. Bernstein

unread,
Aug 15, 2016, 3:20:52 PM8/15/16
to applied-cryptogr...@googlegroups.com
Checked all dates, times, and locations now. Even if an error slipped
through somewhere, I'm pretty sure this has a lower error rate than the
official CHES+Crypto schedules.

FDTC is also happening tomorrow. In case an FDTC person would like to
contribute FDTC data today for me to post, here's what my database looks
like for CHES. The format is Y for applied, "16 tue" for the date, then
start and end times, then room code ("mcc" for FDTC), then description.

---Dan


Y 16 tue 09:00 10:30 flying Tutorial: Lomné: "Common Criteria Certification of a Smartcard: A Technical Overview"
Y 16 tue 10:30 10:50 flying Coffee break. Probably better than the Crypto coffee break.
Y 16 tue 10:50 12:20 flying Tutorial: Lomné: "Common Criteria Certification of a Smartcard: A Technical Overview"
Y 16 tue 14:00 15:30 flying Tutorial: Yarom: "Micro-Architectural Side-Channel Attacks"
Y 16 tue 15:30 15:50 flying Coffee break
Y 16 tue 15:50 17:20 flying Tutorial: Yarom: "Micro-Architectural Side-Channel Attacks"
Y 16 tue 17:30 20:00 corwin Registration
Y 17 wed 08:30 09:00 campbell Breakfast
Y 17 wed 09:00 09:20 campbell Opening remarks
Y 17 wed 09:20 09:45 campbell Dugardin/Danger/Guilley/Najm/Rioul: "Correlated Extra-Reductions Defeat Blinded Regular Exponentiation"
Y 17 wed 09:45 10:10 campbell Battistello/Coron/Prouff/Zeitoun: "Horizontal Side-Channel Attacks and Countermeasures on the ISW Masking Scheme"
Y 17 wed 10:10 10:35 campbell Durvaux/Standaert/Del Pozo: "Towards Easy Leakage Certification"
Y 17 wed 10:35 11:00 campbell Poussier/Standaert/Grosso: "Simple Key Enumeration (and Rank Estimation) using Histograms: an Integrated Approach"
Y 17 wed 14:15 14:40 campbell Jain/Guajardo: "Physical Layer Group Key Agreement for Automotive Controller Area Networks"
Y 17 wed 14:40 15:05 campbell Nürnberger/Rossow: "vatiCAN: Vetted, Authenticated CAN Bus"
Y 17 wed 15:05 15:35 campbell Coffee break
Y 17 wed 15:35 16:00 campbell Xie/Srivastava: "Mitigating SAT Attack on Logic Locking"
Y 17 wed 16:00 16:25 campbell Lohrke/Tajik/Boit/Seifert: "No Place to Hide: Contactless Probing of Secret Data on FPGAs"
Y 17 wed 18:30 20:00 dorms Dinner in Anacapa/Santa Cruz Ocean Lawn
Y 18 thu 08:30 09:00 campbell Breakfast
Y 18 thu 09:00 09:25 campbell Grosso/Güneysu/Leander/Moradi/Schneider: "Strong 8-bit Sboxes with Efficient Masking in Hardware"
Y 18 thu 09:25 09:50 campbell De Cnudde/Reparaz/Bilgin/Nikova/Nikov/Rijmen: "Masking AES with d+1 Shares in Hardware"
Y 18 thu 09:50 10:15 campbell Bos/Hubain/Michiels/Teuwen: "Differential Computation Analysis: Hiding your White-Box Designs is Not Enough"
Y 18 thu 10:15 10:40 campbell Zonenberg/Yener: "Antikernel: A Decentralized Secure Hardware-Software Operating System Architecture"
Y 18 thu 10:40 11:15 campbell Coffee break
Y 18 thu 11:15 11:40 campbell Oliveira/López/Rodríguez-Henríquez: "Software implementation of Koblitz curves over quadratic fields"
Y 18 thu 11:40 12:05 campbell Chou: "QcBits: constant-time small-key code-based cryptography"
Y 18 thu 12:05 12:30 campbell Batina/Renes/Schwabe/Smith: "uKummer: efficient hyperelliptic signatures and key exchange on microcontrollers"
Y 18 thu 14:15 14:40 campbell Groot Bruinderink/Hülsing/Lange/Yarom: "Flush, Gauss, and Reload -- A Cache Attack on the BLISS Lattice-Based Signature Scheme"
Y 18 thu 14:40 15:05 campbell Yarom/Genkin/Heninger: "CacheBleed: A Timing Attack on OpenSSL Constant Time RSA"
Y 18 thu 15:05 15:30 campbell Inci/Gulmezoglu/Irazoqui/Eisenbarth/Sunar: "Cache Attacks Enable Bulk Key Recovery on the Cloud"
Y 18 thu 15:30 16:00 campbell Coffee break
Y 18 thu 16:00 16:25 campbell Ganji/Tajik/Faessler/Seifert: "Strong Machine Learning Attack against PUFs with No Mathematical Model"
Y 18 thu 16:25 16:50 campbell Delvaux/Gu/Verbauwhede/Hiller/Yu: "Efficient Fuzzy Extraction of PUF-Induced Secrets: Theory and Applications"
Y 18 thu 16:50 17:15 campbell Xiong/Schaller/Anagnostopoulos/Saleem/Gabmeyer/Katzenbeisser/Szefer: "Run-time Accessible DRAM PUFs in Commodity Devices"
Y 18 thu 18:00 22:15 biltmore Rump session and banquet (buses leave 18:00 in front of Anacapa)
Y 19 fri 08:30 09:00 campbell Breakfast
Y 19 fri 09:30 09:55 campbell Goudarzi/Rivain: "On the Multiplicative Complexity of Boolean Functions and Bitsliced Higher-Order Masking"
Y 19 fri 09:55 10:20 campbell Pulkus/Vivek: "Reducing the Number of Non-linear Multiplications in Masking Schemes"
Y 19 fri 10:20 10:45 campbell Coron/Greuet/Prouff/Zeitoun: "Faster Evaluation of SBoxes via Common Shares"
Y 19 fri 10:45 11:15 campbell Coffee break
Y 19 fri 11:15 11:40 campbell Järvinen/Miele/Azarderakhsh/Longa: "FourQ on FPGA: New Hardware Speed Records for Elliptic Curve Cryptography over Large Prime Characteristic Fields"
Y 19 fri 11:40 12:05 campbell Ueno/Morioka/Homma/Aoki: "A High Throughput/Gate AES Hardware Architecture by Compressing Encryption and Decryption Datapaths --- Toward Efficient CBC-Mode Implementation"
Y 19 fri 12:05 12:30 campbell Kammerstetter/Muellner/Kudera/Burian/Kastner: "Efficient High-Speed WPA2 Brute Force Attacks using Scalable Low-Cost FPGA Clustering"
Y 19 fri 12:30 14:15 campbell Lunch break at Campus Green (wherever that is)
Y 19 fri 14:15 15:15 campbell Panel discussion
Y 19 fri 15:15 15:45 campbell Coffee break
Y 19 fri 15:45 16:10 campbell Saha/Chowdhury: "EnCounter: On Breaking the Nonce Barrier in Differential Fault Analysis with a Case-Study on PAEQ"
Y 19 fri 16:10 16:35 campbell Bhattacharya/Mukhopadhyay: "Curious case of Rowhammer: Flipping Secret Exponent Bits using Timing Analysis"
Y 19 fri 16:35 17:00 campbell Ghandali/Becker/Holcomb/Paar: "A Design Methodology for Stealthy Parametric Trojans and Its Application to Bug Attacks"
Y 19 fri 17:00 17:10 campbell Concluding remarks
Reply all
Reply to author
Forward
0 new messages