Program
Wednesday 6 March
19:00 - 22:00 Welcome Coktail/dinner at Hotel National des InvalidesThursday 7 March
Conference at Télécom ParisTech
9:45 10:00 | Welcome, Opening Remarks |
10:00 10:50 |
Session 1: Exploiting New Side ChannelSession chair: Benoit Feix
Differential Photonic Emission Analysis
Electromagnetic Glitch on the AES Round Counter
|
10:50 11:15 | coffee break |
11:15 12:30 | session 2: Fault Analysis AttackSession chair: Alexandre Berzatti
Defeating with Fault Injection a Combined Attack Resistant Exponentiation
Fault Attacks on Projective-to-Affine Coordinates Conversion
Improved Algebraic Fault Analysis: A Case Study on Piccolo and Applications to Other Lightweight Block Ciphers |
12:30 14:00 | lunch |
14:00 15:00 | Session 3: Invited TalkSession chair: Jean-Luc Danger
Elisabeth Oswald Do we need a theory for side channel attacks?Presentation here |
15:00 15:30 | coffee break |
15:30 16:20 |
session 4: Recommandations and CountermeasuresSession chair: Benedikt Gierlichs
Updated Recommandations for Blinded Exponentiation v.s. Single Trace Analysis
On 3-share Threshold Implementations for 4-bit S-boxes |
16:20 17:50 |
Session 5a: short presentationsSession chair: Sylvain Guilley
Discussion on the Model of Laser-Induced Faults in SRAM Memory Cells
Read/Write Signals Reconstruction Using Side Channel Analysis for Reverse Engineering
Using GPU in Side Channel Analysis.
On the way to secure random number generation
A New Non-Profiled Cache Timing-Template Attack on AES
Academic vs. industrial perspective on SCA, and an industrial innovation |
19:30 23:00 | Social Event: Dinner and cruise on "bateau mouche"How to get to the "bateau mouche" |
Friday 8 March
Conference at Télécom ParisTech
9:00 10:50 |
Session 5b: short presentations + DPA V4 contestSession chair: Thomas Roche
DPA contest V4: specification and planning
Cost effective techniques for chip delayering and in-situ depackaging
A New Profiled Side-Channel Attack on AES by Exploiting the Incomplete Avalanche Effect
Software Countermeasures Against dpa Attacks: Comparing Masking and Dual-Rail with Precharge Logic
Efficient acquisition technique of side-channel information using event-model simulation
Attacking Smartphone Privacy Using Local Covert Channels
From physical stresses to timing constraints violation
Differential Power Analysis of an AES Software Implementation on ARM926EJ - Simulated versus Experimental |
10:50 11:15 | coffee break |
11:15 12:30 | session 6: Analysis and Attack ImprovementsSession chair: Werner Schindler
Collision-Correlation Attack against some 1st-order Boolean Masking Schemes in the Context of Secure Devices
Exploring the Relations Between Fault Sensitivity and Power Consumption
Improved Side Channel Attacks on Pairing Based Cryptography |
12:30 14:00 | lunch |
14:00 15:00 | Session 7: Invited TalkSession chair: Emmanuel Prouff
Gilles Van Assche
Implementation aspects of KECCAKPresentation here |
15:00 15:30 | coffee break |
15:30 16:45 | Session 8: New Side Channel AttacksSession chair: Christophe Clavier
Chosen-IV Correlation Power Analysis on KCipher-2 and a Countermeasure
Semi-Supervised Template Attack
Cache-Access Pattern Attack on Disaligned AES T-Tables |
16:45 17:00 | Closing Remarks, GoodBye |