Call for Papers

Download as   PDF | PS | TXT

Registration Form

Download as   PDF | DOC

Important Dates

Submission Deadline:2010/11/29
Author Notification:2011/01/05
Final Version Due:2011/01/31
Workshop commences:2011/02/24

Follow COSADE 2011 on

Supported by:


Local Organisation


Wednesday, 23th February 2011


Registration & Reception

Thursday, 24th February 2011



09:00 Registration
09:45 Welcome, Opening Remarks
10:00Session I: New Methods and Modelling I
 Talk #1 Julien Doget, Emmanuel Prouff, Matthieu Rivain and François-Xavier Standaert Univariate Side Channel Attacks and Leakage Modeling
Talk #2Sylvain Guilley, Houssem Maghrebi, Youssef Souissi, Laurent Sauvage and Jean-Luc DangerQuantifying the Quality of Side Channel Acquisitions
Talk #3Liran Lerman, Gianluca Bontempi and Olivier Markowitch Side Channel Attack: an Approach based on Machine Learning
11:15Session II: Electromagnetic Side Channel Analysis
Talk #4Edgar Mateos and Catherine Gebotys Side Channel Analysis using Giant Magneto-Resistive (GMR) Sensors
Talk #5Mario Kirschbaum and Joern-Marc SchmidtLearning from Electromagnetic Emanations - A Case Study for iMDPL
12:05 Lunch
13:00Invited TalkÇetin Kaya Koç
Istanbul Sehir University,
Istanbul, Turkey &
University of California Santa Barbara
Santa Barbara, USA
New Arithmetic for Cryptography and Coding with DFT over Finite Fields and Rings
14:00Session III: Power Analysis
Talk #6:Francesco Regazzoni, Yi Wang and François-Xavier StandaertFPGA Implementations of the AES Masked Against Power Analysis Attacks
Talk #7:Olivier Meynard, Sylvain Guilley, Denis Réal and Jean-Luc DangerTime Samples Correlation Attack
Talk #8:Philippe Hoogvorst, Guillaume Duc and Jean-Luc DangerSoftware Implementation of Dual-Rail Representation
Talk #9:Shiqian WANG, Thanh-Ha LE and Maël BerthierWhen CPA and MIA go Hand in Hand
15:40 Coffee Break
16:05Session IV: New Methods and Modeling II
Talk #10:Gabriel Hospodar, Elke De Mulder, Benedikt Gierlichs, Ingrid Verbauwhede and Joos VandewalleLeast Squares Support Vector Machines for Side-Channel Analysis
Talk #11:Markus DichtlA New Method of Black Box Power Analysis and a Fast Algorithm for Optimal Key Search
16:55Special Session: DPA Contest
Special Session Telecom ParisTech, FranceDPA Contest v2
Final Debriefing
AIST and Tohoku University, Japan

DPA Contest V3 and SASEBO-W for DPA Contest V4

Hotel CheckIn / Transfer
Social Event
Calla, Damstadtium
Friday, 25th February 2011



09:00Session IV: Timing Attack I
Talk #12:Sebastian Schinzel An Efficient Mitigation Method for Timing Side Channels on the Web
Talk #13:Alexander Lux and Artem StarostinA Tool for Static Detection of Timing Channels in Java
09:50Coffee Break
10:20Session V: Algebraic Side Channel Attacks and Fault Analysis
Talk #14:Christopher Goyet, Jean-Charles Faugère and Guenael RenaultAnalysis of the Algebraic Side Channel Attack
Talk #15:Mohamed Saied Emam Mohamed, Stanislav Bulygin and Johannes BuchmannImproved Differential Fault Analysis of Trivium
Talk #16:Falko StrenzkeMessage-aimed Side Channel and Fault Attacks against Public Key Cryptosystems with homomorphic Properties
Talk #17:Sho Endo, Naofumi Homma, Takeshi Sugawara, Takafumi Aoki and Akashi SatohAn On-Chip Glitchy-Clock Generator and its Application to Safe-Error Attack
12:00 Lunch
Invited Talk François-Xavier Standaert,
Universite catholique de Louvain, Belgium
Leakage-Resilient Cryptography: a Practical Overview 
14:00Session VI: Timing Attacks II
Talk #18:Falko StrenzkeDecryption Oracle Attacks against unauthenticated Encryption based on Tag-Length-Value Decoding
Talk #19:Roberto M. Avanzi, Simon Hoerder, Dan Page and Michael TunstallSide-Channel Attacks on the McEliece and Niederreiter Public-Key Cryptosystems
14:50 Coffee Break
15:15Session VII: Cache Analysis
Talk #20:Endre Bangerter, David Gullasch and Stephan KrennCache Games - Bringing Access Based Cache Attacks on AES to Practice
Talk #21:Jean-François Gallais and Ilya KizhvatovError-Tolerance in Trace-Driven Cache Collision Attacks
Talk #22:Billy Brumley and Nicola Tuveri Cache-Timing Attacks and Shared Contexts
16:30 Closing Remarks, Goodbye