Workshop on Fault Detection and Tolerance in Cryptography

Edinburgh, UK, 2-nd september 2005

Co-chairs: Luca Breveglieri, Israel Koren


h. 08.30-09.00          Registration

h. 09.00-10.25          Session 1: Cryptographic Systems and Fault Attacks Overview

h. 09.00-09.15          Welcome and Opening Remarks, Luca Breveglieri, Israel Koren, Politecnico di Milano, Milano; University of Massachusetts, Amherst, MA, USA

h. 09.15-10.00          On Fault Attacks and Trusted Computing, Jean Pierre Seifert, invited lecture

h. 10.00-10.25          Robust Codes for Fault Attack Resistant Cryptographic Hardware, Konrad Kulikowski, Mark Karpovsky, Alexander Taubin

h. 10.25-10.45          Break

h. 10.45-12.25          Session 2: Attack and Protection Methods of Secret and Public Key

h. 10.45-11.10          Round Reduction Using Faults, Michael Tunstall, Hamid Choukri

h. 11.10-11.35          Sign Change Fault Attacks On Elliptic Curve Cryptosystems, Martin Otto, Johannes Bloemer, Jean Pierre Seifert

h. 11.35-12.00          Robust Finite Field Arithmetic for Fault-Tolerant Public-Key Cryptography, Gunnar Gaubatz, Berk Sunar

h. 12.00-12.25          A Fault Attack on Pairing Based Cryptography, Daniel Page, Fre Vercauteren

h. 12.25-13.45          Lunch

h. 13.45-15.25          Session 3: Evaluation Models for Fault Attacks and Countermeasures

h. 13.45-14.10          Cryptographic Key Reliable Lifetimes: Bounding the Risk of Key Exposure in the Presence of Faults, Alfonso De Gregorio

h. 14.10-14.35          An Adversarial Model for Fault Analysis against Low-Cost Cryptographic Devices, Kerstin Lemke, Christof Paar

h. 14.35-15.00          Crypto BIST: A Built-In Self Test Architecture for Crypto Chips, Bo Yang, Ramesh Karri

h. 15.00-15.25          A Comparative Cost / Security Analysis of Fault Attack Countermeasures, Francois-Xavier Standaert, Tal Malkin, Moti Yung

h. 15.25-15.45          Break

h. 15.45-17.15          Session 4: Attack and Protection Methods for RSA

h. 15.45-16.05          Practical Fault Countermeasures for Chinese Remaindering Based RSA, Marc Joye, Mathieu Ciet

h. 16.05-16.25          Incorporating Error Detection in a RSA Architecture, Paolo Maistri, Luca Breveglieri, Israel Koren

h. 16.25-16.50          Fault-resistant RSA Implementation, Christophe Giraud

h. 16.50-17.10          Injection of Multiple Bit-Flips for Counter Measures Validation, Régis Leveugle, K. Hadjiat, A. Ammari

h. 17.10-17.15          Closing Remarks and Farewell