SPRINGER
LNCS

sponsored by

GOLDEN SPONSORS
ANSSI
Cryptography research
Secure-IC
Riscure

SILVER SPONSORS
RFI Global
INVIA
SERMA
Technicolor

TWITTER

Program

Wednesday 6 March

19:00 - 22:00 Welcome Coktail/dinner at Hotel National des Invalides

Thursday 7 March

Conference at Télécom ParisTech

9:45
10:00

Welcome, Opening Remarks

10:00
10:50

Session 1: Exploiting New Side Channel

Session chair: Benoit Feix

Differential Photonic Emission Analysis
Juliane Krämer (Security in Telecommunications, Technische Universität Berlin, Germany), Dmitry Nedospasov (Security in Telecommunications, Technische Universität Berlin, Germany), Alexander Schlösser (Institute of Optics, Technische Universität Berlin), Jean-Pierre Seifert (Security in Telecommunications, Technische Universität Berlin).

Electromagnetic Glitch on the AES Round Counter
Amine Dehbaoui (CEA-LETI), Amir-Pasha Mirbaha (École nationale supérieure des Mines de Saint-Étienne), Nicolas Moro (CEA-LETI), Jean-Max Dutertre (École nationale supérieure des Mines de Saint-Étienne) and Assia Tria (CEA-LETI).

10:50
11:15

coffee break

11:15
12:30

session 2: Fault Analysis Attack

Session chair: Alexandre Berzatti

Defeating with Fault Injection a Combined Attack Resistant Exponentiation
Benoît Feix (XLIM, Limoges University / Inside Secure, France), Alexandre Venelli (Inside Secure, France).

Fault Attacks on Projective-to-Affine Coordinates Conversion
Diana Maimut (École Normale Supérieure), Cédric Murdica (Secure-IC, Télécom ParisTech), David Naccache (Ecole Normale Supérieure), Mehdi Tibouchi (NTT Secure Platform Laboratories).

Improved Algebraic Fault Analysis: A Case Study on Piccolo and Applications to Other Lightweight Block Ciphers
Fan Zhang (University of Connecticut, USA), Xinjie Zhao (Ordnance Engineering College, China, and The Institute of North Electronic Equipment), Shize Guo (The Institute of North Electronic Equipment, China), Tao Wang (Ordnance Engineering College, China), Zhijie Shi (University of Connecticut, USA)

12:30
14:00

lunch

14:00
15:00

Session 3: Invited Talk

Session chair: Jean-Luc Danger

Elisabeth Oswald

Do we need a theory for side channel attacks?

Presentation here
15:00
15:30

coffee break

15:30
16:20

session 4: Recommandations and Countermeasures

Session chair: Benedikt Gierlichs

Updated Recommandations for Blinded Exponentiation v.s. Single Trace Analysis
Christophe Clavier (XLIM, Limoges University, France) and Benoit Feix (XLIM, Limoges University / Inside Secure, France)

On 3-share Threshold Implementations for 4-bit S-boxes
Sebastian Kutzner (Laboratory of Physical Analysis & Cryptographic Engineering (PACE), Temasek Laboratories @ NTU), Phuong Ha Nguyen (Nanyang Technological University, Singapore), Axel Poschmann (Nanyang Technological University, Singapore) and Huaxiong Wang (Nanyang Technological University, Singapore).

16:20
17:50

Session 5a: short presentations

Session chair: Sylvain Guilley

Discussion on the Model of Laser-Induced Faults in SRAM Memory Cells
C. Roscian (ENSMSE, France), A. Sarafianos (ENSMSE and STMicroelectronics, France), JM Dutertre (ENSMSE, France), A. Tria (ENSMSE et CEA LETI, France), M. Lisart (STMicroelectronics, France)

Read/Write Signals Reconstruction Using Side Channel Analysis for Reverse Engineering
Damien Marion and Antoine Wurcker (University of Limoges, France)

Using GPU in Side Channel Analysis.
Yannis Linge (CEA-LETI and  Université de Grenoble, France)

On the way to secure random number generation
Haddad Patrick (ST Microelectronics, France)

A New Non-Profiled Cache Timing-Template Attack on AES
Fan Zhang (University of Connecticut, USA), Xinjie Zhao (Ordnance Engineering College and Institute of North Electronic Equipment, China), Shize Guo (Institute of North Electronic Equipment, China), Tao Wang (Ordnance Engineering College, China) and Zhijie Shi (University of Connecticut, USA)

Academic vs. industrial perspective on SCA, and an industrial innovation
Ilya Kizhvatov and Marc Witteman (Riscure, Netherlands)

19:30
23:00

Social Event: Dinner and cruise on "bateau mouche"

How to get to the "bateau mouche"

Friday 8 March

Conference at Télécom ParisTech

9:00
10:50

Session 5b: short presentations + DPA V4 contest

Session chair: Thomas Roche

DPA contest V4: specification and planning
Guillaume Duc (Télécom ParisTech)

Cost effective techniques for chip delayering and in-situ depackaging
Philippe Loubet Moundi, Gemalto, France

A New Profiled Side-Channel Attack on AES by Exploiting the Incomplete Avalanche Effect
Xinjie Zhao (Ordnance Engineering College and Institute of North Electronic Equipment, China), Fan Zhang (University of Connecticut, USA), Shize Guo (Institute of North Electronic Equipment, China), Tao Wang (Ordnance Engineering College, China) and Zhijie Shi (University of Connecticut, USA)

Software Countermeasures Against dpa Attacks: Comparing Masking and Dual-Rail with Precharge Logic
Pablo Rauzy, Sylvain Guilley and Jean-Luc Danger (Telecom ParisTech, France)

Efficient acquisition technique of side-channel information using event-model simulation
Toshiya Asai and Masaya Yoshikawa (Meijo university, Japan)

Attacking Smartphone Privacy Using Local Covert Channels
J.-F. Lalande (Ensi de Bourges, LIFO, FRANCE) and S. Wendzel (Augsburg University of Applied Sciences, Germany)

From physical stresses to timing constraints violation
L.Zussa (ENSMSE, France), J. Clédierre (CEA LETI, France), JM Dutertre (ENSMSE, France), A. Tria (ENSMSE et CEA LETI, France)

Differential Power Analysis of an AES Software Implementation on ARM926EJ - Simulated versus Experimental
Ruggero Susela (STMicroelectronics , Italy)

10:50
11:15

coffee break

11:15
12:30

session 6: Analysis and Attack Improvements

Session chair: Werner Schindler

Collision-Correlation Attack against some 1st-order Boolean Masking Schemes in the Context of Secure Devices
Victor Lomne and Thomas Roche (ANSSI, France)

Exploring the Relations Between Fault Sensitivity and Power Consumption
Yang Li (The University of Electro-Communications, Japan), Sho Endo (Tohoku University, Japan), Nicolas Debande (Morpho and TELECOM ParisTech and Identity and Security Alliance, France), Naofumi Homma (Tohoku University, Japan), Takafumi Aoki (Tohoku University, Japan), Thanh-Ha Le (Morpho and Identity and Security Alliance, France), Jean-Luc Danger (TELECOM ParisTech and Identity and Security Alliance, France), Kazuo Ohta (The University of Electro-Communications, Japan) and Kazuo Sakiyama (The University of Electro-Communications, Japan)

Improved Side Channel Attacks on Pairing Based Cryptography
Johannes Blömer, Peter Günther and Gennadij Liske (University of Paderborn, Germany).

12:30
14:00

lunch

14:00
15:00

Session 7: Invited Talk

Session chair: Emmanuel Prouff

Gilles Van Assche

Implementation aspects of KECCAK

Presentation here
15:00
15:30

coffee break

15:30
16:45

Session 8: New Side Channel Attacks

Session chair: Christophe Clavier

Chosen-IV Correlation Power Analysis on KCipher-2 and a Countermeasure
Takafumi Hibiki (Tohoku University, Japan), Naofumi Homma (Tohoku University, Japan), Takafumi Aoki (Tohoku University, Japan), Yuto Nakano (KDDI R&D Laboratories Inc), Kazuhide Fukushima (KDDI R&D Laboratories Inc), Shinsaku Kiyomoto (KDDI R&D Laboratories Inc) and Yutaka Miyake (KDDI R&D Laboratories Inc).

Semi-Supervised Template Attack
Liran Lerman (Université Libre de Bruxelles), Stephane Fernandes Medeiros (Université Libre de Bruxelles), Nikita Veshchikov (Université Libre de Bruxelles), Cédric Meuter (Atos Worldline), Gianluca Bontempi (Université Libre de Bruxelles), Olivier Markowitch (Université Libre de Bruxelles).
Link to the video presentation

Cache-Access Pattern Attack on Disaligned AES T-Tables
Raphael Spreitzer and Thomas Plos (Institute for Applied Information Processing and Communications (IAIK), Graz University of Technology, Austria).

16:45
17:00

Closing Remarks, GoodBye


Organised by
TELECOM-ParisTech

Supported by
Institut MINES-TELECOM CNRS TU Darmstadt BSI