Workshop on Applied Crypto & Hardware Security August 12-16, 2013
8:30-9:00 | Registration and Opening Remarks |
9:00-10:30 | Secret-Key Cryptographic Algorithms and Modes of Operation (Tolga Acar) |
10:30-11:00 | Coffee Break |
11:00-12:30 | Public-Key Cryptography Primitives and Finite Fields (Çetin Kaya Koç) |
12:30-1:30 | Lunch |
1:30-3:00 | Public-Key Cryptographic Algorithms and Protocols (Çetin Kaya Koç) |
3:00-3:30 | Coffee Break |
3:30-5:00 | Quantum Cryptography, Quantum Computation, and Post-Quantum Cryptography (Wim van Dam) |
9:00-10:30 | Hardware and Software Realizations of Public-Key Cryptography (Çetin Kaya Koç) |
10:30-11:00 | Coffee Break |
11:00-12:30 | Timing and Micro-architectural Attacks (Timothy Sherwood) |
12:30-1:30 | Lunch |
1:30-3:00 | Simple and Differential Power Analysis (Pankaj Rohatgi) |
3:00-3:30 | Coffee Break |
3:30-5:00 | Electromagnetic and Template Attacks (Pankaj Rohatgi) |
9:00-10:30 | Side-Channel Algorithmic Countermeasures (Pankaj Rohatgi) |
10:30-11:00 | Coffee Break |
11:00-12:30 | Hardware Design for Information-Flow Security (Ryan Kastner) |
12:30-1:30 | Lunch |
1:30-3:00 | Hardware Virtualization and Secure Boot (Timothy Sherwood) |
3:00-3:30 | Coffee Break |
3:30-5:00 | FPGA Security (Ryan Kastner) |
7:00-9:00 | Banquet Dinner in Santa Barbara |
9:00-10:30 | Memory Integrity (G. Edward Suh) |
10:30-11:00 | Coffee Break |
11:00-12:30 | Low-cost Randomness and Physical Fingerprinting (G. Edward Suh) |
12:30-1:30 | Lunch |
1:30-3:00 | Integration of Physically Unclonable Functions (Patrick Schaumont) |
3:00-3:30 | Coffee Break |
3:30-5:00 | Trojan Hardware (Simha Sethumadhavan) |
9:00-10:30 | Authentication in Embedded Systems (Patrick Schaumont) |
10:30-11:00 | Coffee Break |
11:00-12:30 | Fault-Based Attacks and Probing Attacks (Timothy Sherwood) |
12:30-1:30 | Lunch |
1:30-3:00 | Tools, Integration, and Lifecycle Threats (Simha Sethumadhavan) |
3:00-5:00 | Discussion and Panel with Wine and Cheese |