Call for Papers

Download as   PDF | PS | TXT

Registration Form

Download as   PDF | DOC

Important Dates

Submission Deadline:2010/11/29
Author Notification:2011/01/05
Final Version Due:2011/01/31
Workshop commences:2011/02/24

Follow COSADE 2011 on

Supported by:


Local Organisation

Accepted Papers

  1. Side-Channel Attacks on the McEliece and Niederreiter Public-Key Cryptosystems
    Roberto M. Avanzi, Ruhr-University Bochum, Germany
    Simon Hoerder, Dan Page and Michael Tunstall, University of Bristol, United Kingdom
  2. Cache Games - Bringing Access Based Cache Attacks on AES to Practice
    Endre Bangerter, David Gullasch and Stephan Krenn
    Bern University of Applied Sciences, Switzerland
  3. Cache-Timing Attacks and Shared Contexts
    Billy Brumley and Nicola Tuveri
    Aalto University School of Science and Technology, Finland
  4. A New Method of Black Box Power Analysis and a Fast Algorithm for Optimal Key Search
    Markus Dichtl
    Siemens AG, Germany
  5. Univariate Side Channel Attacks and Leakage Modeling
    Julien Doget, Oberthur Technologies and Université Paris, France & Université Catholique de Louvain-La-Neuve, Belgium
    Emmanuel Prouff, Oberthur Technologies, France   
    Matthieu Rivain, CryptoExperts, France
    François-Xavier Standaert, Université Catholique de Louvain-La-Neuve, Belgium   
  6. An On-Chip Glitchy-Clock Generator and its Application to Safe-Error Attack
    Sho Endo, Naofumi Homma, Takeshi Sugawara and Takafumi Aoki, Graduate School of Information Sciences, Tohoku University, Japan
    Akashi Satoh. National Institute of Advanced Industrial Science and Technology, Japan
  7. Error-Tolerance in Trace-Driven Cache Collision Attacks
    Jean-François Gallais and Ilya Kizhvatov
    University of Luxembourg, Luxembourg
  8. Algebraic Side Channel Analysis
    Christopher Goyet, Thales, France
    Jean-Charles Faugère and Guenael Renault, Inria Salsa, France
  9. Quantifying the Quality of Side Channel Acquisitions   
    Sylvain Guilley, Houssem Maghrebi, Youssef Souissi,
    Laurent Sauvage and Jean-Luc Danger
    Telecom ParisTech, France
  10. Software Implementation of Dual-Rail Representation
    Philippe Hoogvorst, Guillaume Duc and Jean-Luc Danger
    Telecom ParisTech, France
  11. Least Squares Support Vector Machines for Side-Channel Analysis
    Gabriel Hospodar, Elke De Mulder, Benedikt Gierlichs, Ingrid Verbauwhede and Joos Vandewalle 
    COSIC-ESAT-SCD-Katholieke Universiteit Leuven & IBBT, Belgium
  12. Learning from Electromagnetic Emanations - A Case Study for iMDPL
    Mario Kirschbaum and Joern-Marc Schmidt
    IAIK TU Graz, Austria   
  13. Side Channel Attack: an Approach based on Machine Learning
    Liran Lerman, Gianluca Bontempi and Olivier Markowitch
    Université libre de Bruxelles (ULB), Belgium   
  14. A Tool for Static Detection of Timing Channels in Java
    Alexander Lux and Artem Starostin
    CASED & Darmstadt University of Technology, Germany
  15. Side Channel Analysis using Giant Magneto-Resistive (GMR) Sensors
    Edgar Mateos and Catherine Gebotys
    University of Waterloo, Canada   
  16. Time Samples Correlation Attack   
    Olivier Meynard, Telecom-ParisTech & DGA/CELAR, France   
    Denis Réal, DGA/MI, France
    Sylvain Guilley and Jean-Luc Danger, Telecom ParisTech, France
  17. Improved Differential Fault Analysis of Trivium
    Mohamed Saied Emam Mohamed, Stanislav Bulygin and Johannes Buchmann
    CASED & Darmstadt University of Technology, Germany
  18. FPGA Implementations of the AES Masked Against Power Analysis Attacks
    Francesco Regazzoni, UCL Crypto Group, Belgium and ALaRI, Switzerland
    Yi Wang, Embedded System and Networking Laboratory, HuNan University, China
    François-Xavier Standaert, UC Louvain, Belgium
  19. An Efficient Mitigation Method for Timing Side Channels on the Web   
    Sebastian Schinzel
    Virtualforge & University of Mannheim, Germany
  20. Decryption Oracle Attacks against unauthenticated Encryption based on Tag-Length-Value Decoding
    Falko Strenzke
    FlexSecure GmbH, Germany   
  21. Message-aimed Side Channel and Fault Attacks against Public Key Cryptosystems with homomorphic Properties
    Falko Strenzke
    FlexSecure GmbH, Germany
  22. When CPA and MIA go Hand in Hand
    Shiqian WANG, Thanh-Ha LE and Maël Berthier
    Morpho, France