Accepted Papers

  • Kernel Discriminant Analysis for Information Extraction in the Presence of Masking
    • Eleonora Cagli Univ. Grenoble Alpes, CEA, LETI, Sorbonne Universités, France
    • Cécile Dumas Univ. Grenoble Alpes, CEA, LETI, France
    • Emmanuel Prouff SAFRAN Identity & Security, Sorbonne Universités, France
  • Defeating Embedded Cryptographic Protocols by combining Second-Order with Brute Force
    • Benoit Feix UL Transaction Security, France
    • Andjy Ricart UL Transaction Security, UK
    • Benjamin Timon UL Transaction Security, UK
    • Lucille Tordella UL Transaction Security, UK
  • Side-Channel Analysis of the TUAK Algorithm used for Authentication and Key Agreement in 3G/4G Networks
    • Houssem Maghrebi SAFRAN Identity & Security, France
    • Julien Bringer SAFRAN Identity & Security, France
  • Reverse engineering Flash EEPROM memories using Scanning Electron Microscopy
    • Franck Courbon University of Cambridge, UK
    • Sergei Skorobogatov University of Cambridge, UK
    • Christopher Woods Quo Vadis Labs, UK
  • SpecTre: A Tiny Side-Channel Resistant Speck Core for FPGAs
    • Cong Chen Worcester Polytechnic Institute, US
    • Mehmet Sinan İnci Worcester Polytechnic Institute, US
    • Mostafa Taha Assiut University, Egypt
    • Thomas Eisenbarth Worcester Polytechnic Institute, US
  • Concealing Secrets in Embedded Processors Designs
    • Hannes Gross TU Graz, Austria
    • Manuel Jelinek TU Graz, Austria
    • Stefan Mangard TU Graz, Austria
    • Thomas Unterluggauer TU Graz, Austria
    • Mario Werner TU Graz, Austria
  • The Hell Forgery, Self Modifying Codes Shoot again
    • Abdelhak Mesbah University Mhamed Bougara of Boumerdes, Algeria
    • Leo Reynaud University of Limoges, France
    • Jean-Louis Lanet INRIA-RBA, LHS-PEC, France
    • Mohamed Mezghiche University Mhamed Bougara of Boumerdes, Algeria
  • Logical Attacks on Secured Containers of the Java Card Platform
    • Sergei Volokitin Riscure B.V., the Netherlands
    • Erik Poll Radboud University Nijmegen, the Netherlands
  • Single-Trace Side-Channel Attacks on Scalar Multiplications with Precomputations
    • Kimmo Järvinen Aalto University, Finland
    • Josep Balasch KU Leuven, Belgium
  • A Compact and Exception-Free Ladder for All Short Weierstrass Elliptic Curves
    • Ruggero Susella STMicroelectronics, Italy
    • Sofia Montrasio Università degli Studi di Milano, Italy
  • Inner Product Masking for Bitslice Ciphers and Security Order Amplification for Linear Leakages
    • Weijia Wang Shanghai Jiao Tong University, China
    • François-Xavier Standaert UCL Crypto Group, Belgium
    • Yu Yu Shanghai Jiao Tong University, China
    • Sihang Pu Shanghai Jiao Tong University, China
    • Liu Junrong Shanghai Jiao Tong University, China
    • Zheng Guo Shanghai Jiao Tong University, China
    • Dawu Gu Shanghai Jiao Tong University, China
  • Squeezing Polynomial Masking in Tower Fields
    • Fabrizio De Santis TU München, Germany
    • Tobias Bauer TU München, Germany
    • Georg Sigl TU München / Fraunhofer Institute AISEC, Germany
  • PRNGs for Masking Applications and Their Mapping to Evolvable Hardware
    • Stjepan Picek KU Leuven ESAT/COSIC and iMinds, Belgium
    • Bohan Yang KU Leuven ESAT/COSIC and iMinds, Belgium
    • Vladimir Rozic KU Leuven ESAT/COSIC and iMinds, Belgium
    • Jo Vliegen KU Leuven ESAT/COSIC and iMinds, Belgium
    • Jori Winderickx KU Leuven ESAT/COSIC and iMinds, Belgium
    • Thomas De Cnudde KU Leuven ESAT/COSIC and iMinds, Belgium
    • Nele Mentens KU Leuven ESAT/COSIC and iMinds, Belgium
  • Automated Detection of Instruction Cache Leaks in RSA Software Implementations
    • Andreas Zankl Fraunhofer AISEC, Germany
    • Johann Heyszl Fraunhofer AISEC, Germany
    • Georg Sigl TU München, Germany
  • An Analysis of the Learning Parity with Noise Assumptions Against Fault Attacks
    • Francesco Berti Université Catholique de Louvain, Belgium
    • François-Xavier Standaert Université Catholique de Louvain, Belgium

Important Dates

15 Jan. 2017Final version
07-09 Nov. 2016Conference
07 Oct. 2016Pre-proceeding version
08 Sept. 2016Notification
15 July 2016Submission deadline

News

Mar. 2017Proceedings are freely available online (for 4 weeks) on springer.com
04 Oct. 2016Final program is online.
03 Oct. 2016Early-bird deadline has been extended to Oct. 5th.
02 Oct. 2016List of accepted papers is online.
27 Sept. 2016Call for Participation is online.
15 Sept. 2016Preliminary program is online.
16 Aug. 2016Registration is now open.
12 Aug. 2016LightCrypto will be collocated with CARDIS the 09-10th of November.
02 May 2016Website is online.

Organised by:

 

EURECOM