2022年06月28日
CHES2020 首次线上虚拟会议在9月18日圆满结束,纽创信安得到CHES组委会的授权许可,把线上会议的72个视频上传到B站,将5天的会议精华浓缩在一方天地,方便业界同仁观看。
视频在这里观看
https://space.bilibili.com/556358812
(点击阅读原文也能进入B站纽创信安空间)
CHES2020 5天会议议程供您参考
Mon 14 Sep,2020
Session 1: New Designs
Fixslicing: A New GIFT Representation: Fast Constant-Time Implementations of GIFT and GIFT-COFB on ARM Cortex-M
Alexandre Adomnicai Zakaria Najm Thomas Peyrin
Lightweight Authenticated Encryption Mode of Operation for Tweakable Block Ciphers
Yusuke Naito Takeshi Sugawara
TEDT, a Leakage-Resist AEAD Mode for High Physical Security Applications
Francesco Berti Chun Guo Olivier Pereira Thomas Peters François-Xavier Standaert
Improving the Performance of the Picnic Signature Scheme
Daniel Kales Greg Zaverucha
Secure Distance Measurement: From Protecting Car Locks to Securing Contact Tracing and Navigation
Srdjan Capkun
Session 2: Reverse Engineering
Dismantling DST80-based Immobiliser Systems
Lennert Wouters Jan Van den Herrewegen Flavio D. Garcia David Oswald Benedikt Gierlichs Bart Preneel
DANA Universal Dataflow Analysis for Gate-Level Netlist Reverse Engineering
Nils Albartus Max Hoffmann Sebastian Temme Leonid Azriel Christof Paar
CAS-Lock: A Security-Corruptibility Trade-off Resilient Logic Locking Scheme
Bicky Shakya Xiaolin Xu Mark Tehranipoor Domenic Forte
Tue 15 Sep,2020
Session 3: SCA of Symmetric-Key Schemes
Cache vs. Key-Dependency: Side Channeling an Implementation of Pilsung
Daniel Genkin Romain Poussier Rui Qi Sim Yuval Yarom Yuanjing Zhao
SITM: See-In-The-Middle Side-Channel Assisted Middle Round Differential Cryptanalysis on SPN Block Ciphers
Shivam Bhasin Jakub Breier Xiaolu Hou Dirmanto Jap Romain Poussier Siang Meng Sim
Investigating Profiled Side-Channel Attacks Against the DES Key Schedule
Johann Heyszl Katja Miller Florian Unterstein Marc Schink Alexander Wagner Horst Gieser Sven Freud Tobias DammDominik Klein Dennis Kügler
Single-Trace Attacks on Keccak
Matthias J. Kannwischer Peter Pessl Robert Primas
Understanding Screaming Channels: From a Detailed Analysis to Improved Attacks
Giovanni Camurati Aurélien Francillon François-Xavier Standaert
Recovering the CTR_DRBG state in 256 traces
Lauren De Meyer
Session 4: ECC and Isogenies
A Compact and Scalable Hardware/Software Co-design of SIKE
Pedro Maat C. Massolino Patrick Longa Joost Renes Lejla Batina
Minerva: The curse of ECDSA nonces Systematic analysis of lattice attacks on noisy leakage of bit-length of ECDSA nonces (Best Paper)
Jan Jancar Vladimir Sedlacek Petr Svenda Marek Sys
When one vulnerable primitive turns viral: Novel single-trace attacks on ECDSA and RSA
Alejandro Cabrera Aldaya Billy Bob Brumley
From A to Z: Projective coordinates leakage in the wild
Alejandro Cabrera Aldaya Cesar Pereida García Billy Bob Brumley
Faster Montgomery and double-add ladders for short Weierstrass curves
Mike Hamburg
Session 5: SCA Theory and Evaluation
Efficient and Private Computations with Code-Based Masking
Weijia Wang Pierrick Méaux Gaëtan Cassiers François-Xavier Standaert
Side-Channel Countermeasures’ Dissection and the Limits of Closed Source Security Evaluations
Olivier Bronchain François-Xavier Standaert
A Fast and Accurate Guessing Entropy Estimation Algorithm for Full-key Recovery
Ziyue Zhang A. Adam Ding Yunsi Fei
Modeling Soft Analytical Side-Channel Attacks from a Coding Theory Viewpoint
Qian Guo Vincent Grosso François-Xavier Standaert Olivier Bronchain
On the spectral features of robust probing security
Maria Chiara Molteni Vittorio Zaccaria
Unrolled Cryptography on Silicon: A Physical Security Analysis
Thorben Moos
Wed 16 Sep, 2020
Session 6: PUFs and White-Box Cryptography
Splitting the Interpose PUF: A Novel Modeling Attack Strategy
Nils Wisiol Christopher Mühl Niklas Pirnay Phuong Ha Nguyen Marian Margraf Jean-Pierre Seifert Marten van DijkUlrich Rührmair
Defeating State-of-the-Art White-Box Countermeasures with Advanced Gray-Box Attacks
Louis Goubin Matthieu Rivain Junwei Wang
On the Security Goals of White-Box Cryptography
Estuardo Alpirez Bock Alessandro Amadori Chris Brzuska Wil Michiels
Rejection Sampling Schemes for Extracting Uniform Distribution from Biased PUFs
Rei Ueno Kohei Kazumori Naofumi Homma
Session 7: Hardware Implementations
CPAmap: On the Complexity of Secure FPGA Virtualization, Multi-Tenancy, and Physical Design
Jonas Krautter Dennis Gnad Mehdi Tahoori
ISA Extensions for Finite Field Arithmetic: Accelerating Kyber and NewHope on RISC-V
Erdem Alkim Hülya Evkan Norman Lahr Ruben Niederhagen Richard Petr
Improved Heuristics for Short Linear Programs
Quan Quan Tan Thomas Peyrin
A Hybrid-CPU-FPGA-based Solution to the Recovery of Sha256crypt-hashed Passwords
Zhendong Zhang Peng Liu
Session 8: Machine Learning
Methodology for Efficient CNN Architectures in Profiling Attacks
Gabriel Zaid Lilian Bossuet Amaury Habrard Alexandre Venelli
Revisiting a Methodology for Efficient CNN Architectures in Profiling Attacks
Lennert Wouters Victor Arribas Benedikt Gierlichs Bart Preneel
A Novel Evaluation Metric for Deep Learning-Based Side Channel Analysis and Its Extended Application to Imbalanced Data
Jiajia Zhang Mengce Zheng Jiehui Nan Honggang Hu Nenghai Yu
A Comprehensive Study of Deep Learning for Side-Channel Analysis
Loïc Masure Cécile Dumas Emmanuel Prouff
Strength in Numbers: Improving Generalization with Ensembles in Machine Learning-based Profiled Side-channel Analysis
Guilherme Perin Łukasz Chmielewski Stjepan Picek
Plaintext: A Missing Feature for Enhancing the Power of Deep Learning in Side-Channel Analysis? Breaking multiple layers of side-channel countermeasures
Anh-Tuan Hoang Neil Hanley Maire O’Neill
Session 9: Lattice-Based Cryptography
Highly Efficient Architecture of NewHope-NIST on FPGA using Low-Complexity NTT/INTT
Neng Zhang Bohan Yang Chen Chen Shouyi Yin Shaojun Wei Leibo Liu
Parameterized Hardware Accelerators for Lattice-Based Cryptography and Their Application to the HW/SW Co-Design of qTESLA
Wen Wang Shanquan Tian Bernhard Jungk Nina Bindel Patrick Longa Jakub Szefer
Cortex-M4 optimizations for {R,M} LWE schemes
Erdem Alkim Yusuf Alper Bilgin Murat Cenk François Gérard
Time-memory trade-off in Toom-Cook multiplication: an application to module-lattice based cryptography
Jose Maria Bermudo Mera Angshuman Karmakar Ingrid Verbauwhede
High-speed Instruction-set Coprocessor for Lattice-based Key Encapsulation Mechanism: Saber in Hardware
Sujoy Sinha Roy Andrea Basso
RISQ-V: Tightly Coupled RISC-V Accelerators for Post-Quantum Cryptography
Tim Fritzmann Georg Sigl Johanna Sepúlveda
Theory of leakage – a look at the past two decades of research
Stefan Dziembowski
Fri 18 Sep,2020
Session 10: SCA Countermeasures
Second-Order Masked Lookup Table Compression Scheme
Annapurna Valiveti Srinivas Vivek
Low-Latency Hardware Masking with Application to AES
Pascal Sasdrich Begül Bilgin Michael Hutter Mark E. Marson
Share-slicing: Friend or Foe?
Si Gao Ben Marshall Dan Page Elisabeth Oswald
Remove Some Noise: On Pre-processing of Side-channel Measurements with Autoencoders
Lichao Wu Stjepan Picek
Retrofitting Leakage Resilient Authenticated Encryption to Microcontrollers
Florian Unterstein Marc Schink Thomas Schamberger Lars Tebelmann Manuel Ilg Johann Heyszl
FENL: an ISE to mitigate analogue micro-architectural leakage
Si Gao Ben Marshall Dan Page Thinh Pham
Session 11: SCA of Public-Key Schemes
Generic Side-channel attacks on CCA-secure lattice-based PKE and KEMs
Prasanna Ravi Sujoy Sinha Roy Anupam Chattopadhyay Shivam Bhasin
Bluethunder: A 2-level Directional Predictor Based Side-Channel Attack against SGX
Tianlin Huo Xiaoni Meng Wenhao Wang Chunliang Hao Pei Zhao Jian Zhai Mingshu Li
Strengthening Sequential Side-Channel Attacks Through Change Detection
Luca Frittoli Matteo Bocchi Silvia Mella Diego Carrera Beatrice Rossi Pasqualina Fragneto Ruggero Susella Giacomo Boracchi
The Long and Winding Path to Secure Implementation of GlobalPlatform SCP10
Daniel De Almeida Braga Pierre-Alain Fouque Mohamed Sabt
High-Speed Masking for Polynomial Comparison in Lattice-based KEMs
Florian Bache Clara Paglialonga Tobias Oder Tobias Schneider Tim Güneysu
Power Analysis on NTRU Prime
Wei-Lun Huang Jiun-Peng Chen Bo-Yin Yang
Session 12: Faults
JackHammer: Efficient Rowhammer on Heterogeneous FPGA-CPU Platforms
Zane Weissman Thore Tiemann Daniel Moghimi Evan Custodio Thomas Eisenbarth Berk Sunar
Protecting against Statistical Ineffective Fault Attacks
Joan Daemen Christoph Dobraunig Maria Eichsleder Hannes Gross Florian Mendel Robert Primas
FEDS: Comprehensive Fault Attack Exploitability Detection for Software Implementations of Block Ciphers
Keerthi K Indrani Roy Chester Rebeiro Aritra Hazra Swarup Bhunia
Persistent Fault Attack in Practice
Fan Zhang Yiran Zhang Huilong Jiang Xiang Zhu Shivam Bhasin Xinjie Zhao Zhe Liu Dawu Gu Kui Ren
CHES2021将由纽创信安连同清华大学和南京航空航天大学一起承办,这是20多年来在中国举办的首次会议,敬请关注。欢迎各位有赞助意向的产业界同仁及早联系,展位有限,先到先得。
Copyright 2018. Open Security Research, Inc. All rights reserved. 粤ICP备18045701号