On behalf of the program and organizing committees, it is a great pleasure to welcome you to the Second Workshop on Cryptography and Security in Computing Systems (CS2 2015). The CS2 meeting is a co-located event with HiPEAC 2015 in Amsterdam, Netherlands, January 19, 2015.
Proceeding Downloads
Evaluation Tools for Multivariate Side-Channel Analysis
The goal of side-channel evaluation is to estimate the vulnerability of an implementation against the most powerful attacks. In this paper, we present a closed equation for the success rate computation in a profiling-based side-channel analysis ...
A new Definition and Classification of Physical Unclonable Functions
A new definition of "Physical Unclonable Functions" (PUFs), the first one that fully captures its intuitive idea among experts, is presented. A PUF is an information-storage system with a security mechanism that is
1. meant to impede the duplication of ...
Pipelined SHA-3 Implementations on FPGA: Architecture and Performance Analysis
Efficient and high-throughput designs of hash functions will be in great demand in the next few years, given that every IPv6 data packet is expected to be handled with some kind of security features.
In this paper, pipelined implementations of the new ...
Stretching the limits of Programmable Embedded Devices for Public-key Cryptography
In this work, the efficiency of embedded devices when operating as cryptographic accelerators is assessed, exploiting both multithreading and Single Instruction Multiple Data (SIMD) parallelism. The latency of a single modular multiplication is reduced, ...
Evidence of an information leakage between logically independent blocks
- Lo�c Zussa,
- Ingrid Exurville,
- Jean-Max Dutertre,
- Jean-Baptiste Rigaud,
- Bruno Robisson,
- Assia Tria,
- Jessy Clédière
In this paper we study the information leakage that may exist, due to electrical coupling, between logically independent blocks of a secure circuit as a new attack path to retrieve secret information. First, an aes-128 has been implemented on a fpga ...
On Continuous After-the-Fact Leakage-Resilient Key Exchange
Recently, the Continuous After-the-Fact Leakage (CAFL) security model has been introduced for two-party authenticated key exchange (AKE) protocols. In the CAFL model, an adversary can adaptively request arbitrary leakage of long-term secrets even after ...
Interest of MIA in frequency domain?
Mutual Information Analysis (MIA) has a main advantage over Pearson's correlation Analysis (CPA): its ability in detecting any kind of leakage within traces. However, it remains rarely used and less popular than CPA; probably because of two reasons. The ...
Placement Security Analysis for Side-Channel Resistant Dual-Rail Scheme in FPGA
Physical implementations have significant impacts to the security level of hardware cryptography, mainly due to the fact that the bottom-layer logic fundamentals typically act as the exploitable SCA leakage sources. As a widely studied countermeasure ...
Fault and Power Analysis Attack Resistant RNS based Edwards Curve Point Multiplication
In this paper, a road-map toward Fault (FA) and Power Analysis Attack (PA) resistance is proposed that combines the Edwards Curves innate PA resistance and a base point randomization Montgomery Power Ladder point multiplication (PM) algorithm, capable ...