back to the CryptArchi Home page
The program of the Workshop is updated as information comes
TUESDAY June 19th 2012 | |
---|---|
before 18.00 | Arrival and registration of participants in Saint-Etienne |
18.30 | Bus transport to the castle |
past 19.30 | Welcome dinner |
WEDNESDAY June 20th 2012 | |
---|---|
9.00 - 10.30 | Session I: Side-Channel Attacks S. Tiran, A. Dehbaoui, P. Maurine: Magnitude Squared Coherence based SCA J.L. Danger: Some results about the disctinction of Side-Channel Distinguishers based on distributions J. Francq, J.B. Rigaud, A. Wurcker: Side-Channel Analysis of the SHA-3 Finalists on SASEBO |
11.00 - 12.30 | Session II: Electromagnetic Attacks P. Bayon, L. Bossuet, A. Aubert, V. Fischer, F. Poucheret, B. Robisson, P. Maurine: Contactless Electromagnetic Active Attack on Ring Oscillator Based True Random Number Generator A. Dehbaoui, P. Maistri, P. Maurine, J.M. Dutertre: Countermeasures against EM Analysis P. Maurine, A. Dehbaoui, F. Poucheret, J.M. Dutertre, B. Robisson, A. Tria: On the use of the EM medium as a fault injection means |
12.45 - 14.00 | Lunch |
15.00 - 16.00 | Session III: Invited talk Francesco Regazzoni: Towards the Automatic Application of Countermeasures Against Physical Attacks |
16.30 - 18.00 | Session IV: SCA Countermeasures A. Moradi, O. Mischke: Glitch-free implementation of masking in modern FPGAs S. Bhasin: Optimal FPGA implementations a of very low-cost countermeasure based on Rotating S-Boxes Masking Countermeasure S. Guilley, C. Carlet, H. Maghrebi, J.L. Danger, E. Prouff: Leakage Squeezing -- Defeating Instantaneous (d+1)th-order Correlation Power Analysis with Strictly Less Than d Masks |
past 19.30 | Dinner |
THURSDAY June 21st 2012 | |
---|---|
9.00 - 10.30 | Session V: Secure Embedded Systems P. Cotret, G. Gogniat, J.P. Diguet, J. Crenne: Self-reconfigurable security-enhanced communications in FPGA-based MPSoCs S. Malipatlolla, T. Feller, S. Huss: Partially reconfigurable TPM Architectures as the Security Anchors of future Embedded IT Systems M.J. Sepulveda, G. Gogniat, W. Jiang, M.s Strum, R. Pires, C. Pedraza: NoC-based dynamic security implementation for Multi-application SoC |
11.00 - 12.30 | Session VI: Random Number Generators W. Schindler: Security Evaluation of RNGs - The Updated Evaluation Guidelines AIS 20 and AIS 31 A. Cherkaoui, V. Fischer, A Aubert, L. Fesquet: A New Robust True Random Numbers Generator Using Self-Timed Rings P. Haddad, F. Bernard, V. Fischer: On the Way to Monitor Random Number Generation |
12.45 - 14.00 | Lunch |
15.00 - 16.00 | Session VII: Invited talk Pierre-Louis Cayrel: Recent progress in code-based cryptography |
16.30 - 17.30 | Session VIII: Miscellaneous K. Gaj, J.P. Kaps, B. Y. Brewster, J. Pham, E. Homsirikamol, R. Velegalati: ATHENa 2.0 and ATHENa Database of Results J. Hlavac, M. Platonov, R. Lorencz: PUF on a simple microcontroller |
past 19.30 | Special dinner and concert: "fête de la musique" |
FRIDAY June 22nd 2012 | |
---|---|
8.00 - 9.00 | Breakfast |
10.00 - 12.00 | Visit of Lyon Old Town |
12.00 - 14.00 | Lunch |