Posters and Tutorials
Download the call for posters and tutorials in pdf format.
Call for Posters
The annual CHES conference highlights new results in the design and analysis of cryptographic hardware and software implementations. CHES provides a valuable connection between the research and cryptographic engineering communities and attracts participants from industry, academia, and government organizations. Proposals for a poster presentation at CHES 2017 should be submitted to firstname.lastname@example.org.
Submissions on topics of broad interest to the CHES community are welcome and the submission deadline has been extended to August 31, 2017, 23:59 PDT. Poster submissions must provide the following information as a single-page pdf:
- Poster title
- Author list, indicating a contact author (with name, affiliation, phone and email address)
- Abstract (up to 500 words)
Receipt of the submission will be acknowledged after the submission deadline. Notification of acceptance will be by September 7, 2017. Accepted posters must be displayed in standard A0 format and at least one author for each poster must be available for discussion during the poster session at CHES 2017. For more information please contact Oscar Reparaz (poster session chair) at email@example.com.
TutorialsOn Monday, September 25, there are two tutorials:
Tim Güneysu: Post-Quantum Cryptography for Embedded Systems
Most of our currently used public-key cryptosystems (e.g., RSA or Elliptic Curve Cryptography) rely on the hardness of factorization or a variant of the discrete logarithm problem as trapdoor function. However, it is well-known that all those cryptosystems are broken as soon as sufficiently large quantum computers will become available. In particular for applications with the requirement for long-term security, it is essential to identify and realize viable replacements. In this context this talk highlights the challenges and latest achievements in the field of post-quantum cryptography in the context of embedded systems. This tutorial will put special emphasis on lattice-based and code-based cryptography but will also cover some aspects of hash-based cryptography.
Colin O'Flynn: Side Channel Live!
Side Channel Live! is a rapid-fire interactive tutorial using real hardware in the loop. Setup as a combination of a tutorial, capture the flag event, and hackathon it relies on your interaction to succeed. Side Channel Live! offers the chance for everyone to hone their skills on real devices, and hopefully learn a new trick or two. A short introduction to power analysis will be presented, followed by information on the trace data format (This is based on the CHES 2016 CTF, and will be documented before the event to save time by allowing participants to prepare any interface code they wish). A number of power traces will then be made available, ranging from basic unprotected implementations to hardware implementations and more. Participants can then attempt to break the devices - successful participants will have a chance to share a trick or two that they used on these devices. Hardware will also be setup if participants wish to generate new power traces: for example, testing a new masking implementation, or seeing the effect of adding noise or jitter to the power traces. Come equipped with a laptop if you plan to participate - ideally with Python installed, but traces will be readable in MATLAB and other languages. Side Channel Live! aims to bring together the large collective knowledge of CHES attendees in a hands-on environment, and informally exchange ideas and experiences in a manner that will expose more students, researchers, and engineers to side channel power analysis and what it can achieve.