schedule
Proceedings are now available
Directly from Springer
| Monday 7th | |
|---|---|
| 11:00 am - 2:00 pm | Registration |
| 12:00 pm - 2:00 pm | Lunch |
| 2:00 pm - 2:15 pm | Opening Remarks |
| 2:15 pm - 3:15 pm (Session Chair: Aurélien Francillon) | Invited Talk: Three Views on IoT Security |
| 3:15 pm - 3:45 pm | Coffee Break |
| 3:45 pm - 5:15 pm Session 1 Side Channel Analysis (Session Chair: François-Xavier Standaert) | Kernel Discriminant Analysis for Information Extraction in the Presence of Masking |
| Defeating Embedded Cryptographic Protocols by combining Second-Order with Brute Force | |
| Side-Channel Analysis of the TUAK Algorithm used for Authentication and Key Agreement in 3G/4G Networks | |
| 5:15 pm - 7:30 pm | |
| 7:30 pm - 8:30 pm | Welcome Reception |
| Tuesday 8th | |
| 9:00 am - 10:30 am Session 2 Hardware (Session Chair: Begül Bilgin) | Reverse engineering Flash EEPROM memories using Scanning Electron Microscopy |
| SpecTre: A Tiny Side-Channel Resistant Speck Core for FPGAs | |
| Concealing Secrets in Embedded Processors Designs | |
| 10:30 am - 11:00 am | Coffee Break |
| 11:00 am - 12:00 pm (Session Chair: Kerstin Lemke-Rust) | Invited Talk: Security outside the black-box model: Challenges and Countermeasures |
| 12:00 pm - 1:30 pm | Lunch |
| 1:30 pm - 2:30 pm Session 3 Java Card (Session Chair: Guillaume Bouffard) | The Hell Forgery, Self Modifying Codes Shoot again |
| Logical Attacks on Secured Containers of the Java Card Platform | |
| 2:30 pm - 3:00 pm | Coffee Break |
| 3:00 pm - 4:00 pm (Session Chair: Michael Tunstall) | Invited Talk: Breaking automotive remote keyless entry systems, or: Why your car is not a safe box. |
| 4:00 am - 5:00 am Session 4 Scalar Multiplication (Session Chair: Pierre-Yvan Liardet) | Single-Trace Side-Channel Attacks on Scalar Multiplications with Precomputations |
| A Compact and Exception-Free Ladder for All Short Weierstrass Elliptic Curves | |
| 5:00 pm - 5:20 pm | |
| 5:20 pm - 7:00 pm | Historic Visit of Cannes and Le Suquet |
| 7:30 pm - 10:00 pm | Conference Dinner at Le Caveau 30 |
| Wednesday 9th | |
| 9:00 am - 10:30 pm Session 5 Masking (Session Chair: Emmanuel Prouff) | Inner Product Masking for Bitslice Ciphers and Security Order Amplification for Linear Leakages |
| Squeezing Polynomial Masking in Tower Fields | |
| PRNGs for Masking Applications and Their Mapping to Evolvable Hardware | |
| 10:30 am - 11:00 am | Coffee Break |
| 11:00 am - 12:00 pm Session 6 Cache Attacks & Fault Attacks (Session Chair: Benedikt Gierlichs) | Automated Detection of Instruction Cache Leaks in RSA Software Implementations |
| An Analysis of the Learning Parity with Noise Assumptions Against Fault Attacks | |
| 12:00 pm - 2:00 pm | Closing Remarks & Lunch |
LightCrypto
Wednesday afternoon and Thursday is dedicated to the co-located event LightCrypto. You can register here.
Important Dates
| 15 Jan. 2017 | Final version |
News
| Mar. 2017 | Proceedings are freely available online (for 4 weeks) on springer.com |
| 04 Oct. 2016 | Final program is online. |
| 03 Oct. 2016 | Early-bird deadline has been extended to Oct. 5th. |
| 02 Oct. 2016 | List of accepted papers is online. |
| 27 Sept. 2016 | Call for Participation is online. |
| 15 Sept. 2016 | Preliminary program is online. |
| 16 Aug. 2016 | Registration is now open. |
| 12 Aug. 2016 | LightCrypto will be collocated with CARDIS the 09-10th of November. |
| 02 May 2016 | Website is online. |
Organised by:
Tweets by CardisConf







