Tag: aes

Jun 23

BoxCryptor | On-the-fly Encryption for cloud storage

BoxCryptor encrypts your files using the AES-256 standard. This makes your data secure – no matter which cloud storage provider you use.

via BoxCryptor | On-the-fly Encryption for cloud storage.

Jun 11

CALL FOR PAPERS: IEEE-AESS Conference in Europe about Space and Satellite Communications : Security and Privacy Special Track

=================================
CALL FOR PAPERS
Security and Privacy Special Track
IEEE-AESS Conference in Europe about Space and Satellite Communications (ESTEL)
Rome, Italy, October 2-5, 2012
http://estel-sec.dti.unimi.it/
=================================
The special track on Security and Privacy of the ESTEL Conference aims at providing a
forum for discussing security and privacy issues that need to be investigated for
providing advanced services, architectures, and technologies for space and satellite
applications.  In this context, it is of utmost importance to ensure proper protection to
such complex systems, or systems-of-systems, to ensure security, privacy, and availability
of the infrastructure as well as of resources and information it provides and
manages. These aspects concern both the specific satellite application and infrastructure
as well as the base stations and land data servers and communications that serve them,
touching then the different areas with ICT.  The problem is far from trivial, due to the
criticality and the social impact of the applications and services relying on this global
infrastructure, as well as the complexity given by the co-existence and co-operation of,
possibly heterogeneous, component systems. Topics of interest include, but are not limited
to:
– Access Control
– Applied Cryptography for Space Applications
– Authentication
– Biometrics Security and Privacy
– Critical Infrastructure Protection
– Data Integrity
– Data Protection
– Database Security and Privacy
– Digital Forensics
– Digital Rights Management
– Ethical and Legal Implications of Security and Privacy
– Formal Methods for Security
– Homeland Security
– Human Factors and Human Behaviour Recognition Techniques
– Identification, Authentication and Non-repudiation
– Identity Management
– Information Hiding
– Information Systems Auditing
– Insider Threats and Countermeasures
– Intellectual Property Protection
– Intrusion Detection & Prevention
– Management of Computing Security
– Organizational Security Policies
– Peer-to-Peer Security
– Privacy
– Privacy Enhancing Technologies
– Reliability and Dependability
– Risk Assessment
– Satellite-based Disaster Recovery
– Satellite Network Security
– Secure Cloud Computing
– Secure Software Development Methodologies
– Security Protocols
– Security and Privacy in Mobile Systems
– Security and Privacy in Complex Systems
– Security and Privacy in IT Outsourcing
– Security and Privacy in Location-based Services
– Security and Privacy in Pervasive/Ubiquitous Computing
– Security and Privacy in Satellite Surveillance
– Security and Privacy in Web Services
– Security and Privacy Policies
– Security Area Control
– Security Deployment
– Security Engineering
– Security for Grid Computing
– Security in Distributed Systems
– Security Information Systems Architecture and Design and Security Patterns
– Security in e-Healthcare
– Security Issues of Satellite Communications
– Security Management
– Security Metrics and Measurement
– Security Requirements (Threats, Vulnerabilities, Risk, Formal Methods, etc.)
– Security Verification and Validation
– Sensor and Mobile Ad Hoc Network Security
– Service and Systems Design and QoS Network Security
– Software Security
– Trust Management and Reputation Systems
– Ubiquitous Computing Security
– Wireless Network Security
SUBMISSION INSTRUCTIONS
Submitted papers must not substantially overlap papers that have been published or that are
simultaneously submitted to a journal or a conference with proceedings. Submitted papers
must be formatted according to the IEEE Conference proceedings format, available at
http://www.ieee.org/publications_standards/publications/authors/authors_journals.html.
Submissions should be at most 6 pages. Submissions are to be made to the submission
web site at https://www.easychair.org/conferences/?conf=estelsec2012. Only pdf files will be
accepted. Submissions not meeting these guidelines risk rejection without consideration of their
merits. Papers must be received by the deadline of July 20, 2012 (11:59 p.m. American Samoa time).
All accepted papers will be published in the conference proceedings. Authors of accepted papers
must guarantee that their papers will be presented at the conference. A one-day registration
option will be made available to special session attendees.
IMPORTANT DATES
Paper submission due: July 20, 2012 (11:59 p.m. American Samoa time)
Notification to authors: August 25, 2012
Camera ready due: September 5, 2012
SPECIAL TRACK PROGRAM CHAIR
Pierangela Samarati
Universita’ degli Studi di Milano, Italy
PROGRAM COMMITTEE
tba
This call for papers and additional information about the conference
can be found at http://estel-sec.dti.unimi.it/

May 15

Mobisec 2012 : The 4th International Conference on Security and Privacy in Mobile Information and Communication Systems

When Jun 25, 2012 – Jun 26, 2012
Where Frankfurt, Germany
Submission Deadline May 25, 2012
Notification Due May 31, 2012
Final Version Due Jul 7, 2012

Mobisec 2012 : The 4th International Conference on Security and Privacy in Mobile Information and Communication Systems.

The 4th International Conference on Security and Privacy in Mobile
Information and Communication Systems Mobisec 2012,
Mövenpick Hotel Frankfurt City, Frankfurt, Germany
25 – 26 June 2012
http://mobisec.org/2012
============================================================================

CALL FOR POSTERS

KEYNOTE SPEAKERS
================
Kim Cameron, Distinguished Engineer and Chief Architect, Microsoft
Prof. Dr. Kai Rannenberg, Deutsche Telekom Chair of Mobile Business&
Multilateral Security, Goethe University Frankfurt
Amardeo Sarma, Deputy General Manager, NEC Laboratories

SCOPE
=====
The poster session will provide a forum for researchers to show their
work and obtain constructive feedback on their ongoing research. While
the poster need not describe completed work, it should report on
research for which at least preliminary results are available.

At least one of the authors of the poster must register for the
conference for the poster to be included as part of the poster session.
Authors of accepted poster proposals will have a chance to present the
poster to interested attendees during a special poster session at the
conference.

The abstracts of accepted posters will be posted on the conference
website and will appear in the conference proceedings.

TOPICS
======
Topics of interest include, but are not limited to, the following focus
areas:

Privacy and Security in Emerging Mobile Applications and Services:

* Privacy-respecting Authentication
* Mobile Identity Management
* Mobile Wallets, Mobile Payments
* Location-based Services and Mobile Sensing

Smartphone Security and Privacy:

* Advanced Security Mechanisms
* Virtualisation Solutions
* Rogue Mobile Application Detection and Protection
* Forensic Analysis

Machine-to-Machine Secure Communication:

* Device Identities and Authentication
* Remote Integrity Validation and Remediation
* Remote Management and Provisioning
* Machine-to-Machine Application Layer Security
* Secure Elements and Trusted Environments

Important Dates
===============
Submission Date : May. 25, 2012
Notification of acceptance: May. 31, 2012
Camera Ready submission : Jun. 7, 2012
Conference dates : June 25-26, 2012

SUBMISSION INSTRUCTIONS
=======================

Please submit your abstracts to the TCP chairs at the Email:
posters2012@mobisec.org in PDF format. Optionally, besides the abstract,
submissions may also include an electronic copy of the poster to be
presented at the conference.

Steering Committee
==================
* Imrich Chlamtac (Chair), President, CREATE-NET Research Consortium,
Trento, Italy
* Ramjee Prasad, Aalborg University, Denmark
* Andreas U. Schmidt, Director, Novalyst IT AG, Karben, Germany

Organising Committee
====================
General Chair / General Co-Chairs:
* Neeli R. Prasad, Aalborg University, Denmark
* Andreas U. Schmidt, Novalyst IT AG, Karben, Germany

TPC Chair/TPC Co-Chairs:
* Ioannis Krontiris, Goethe University Frankfurt, Germany
* Giovanni Russello, University of Auckland, New Zealand

– Publication Chair: Shiguo Lian, France Telecom R&D, Beijing, China
– Publicity Chair(s): Mauro Conti, University of Padua, Italy; Rasmus
Hjorth Nielsen, CTIF, Princeton, USA
– Workshops Chair(s): Vincent Naessens, KaHo Sint-Lieven, Gent, Belgium
– Panels Chair:Dirk Kröselberg, Siemens CERT, Munich, Germany
– Web Chair: Andreas Leicher, Novalyst IT AG, Karben, Germany
– Conference Coordinator: Justina Senkus, EAI/ICST Trento, Italy

ABOUT EAI
The European Alliance for Innovation is a dynamic eco-system for
fostering ICT enabled innovation to improve European competitiveness and
to benefit society. EAI uses open e-platforms to inspire grassroots
collaboration among all relevant actors, from organizations to
individuals, to stimulate community driven innovation to its
institutional and individual members worldwide. Through EAI,
organizations find ideas and talent, and individual innovators find
organizations for their ingenuity and craft. Join the innovation
community at www.eai.eu

Jan 10

SIXTH WORKSHOP IN INFORMATION SECURITY THEORY AND PRACTICE (WISTP 2012)

SIXTH WORKSHOP IN INFORMATION SECURITY THEORY AND PRACTICE (WISTP 2012)
Security and Trust in Computing Systems and Ambient Intelligence Ecosystem
June 19-22, 2012, London, UK – http://www.wistp.org/

WISTP 2012 BACKGROUND AND GOALS
Future ICT technologies, like the concepts of Ambient Intelligence and 
Internet of Things provide a vision of the Information Society where 
the emphasis is on surrounding people by intelligent interactive 
interfaces and objects and on environments that are capable of 
recognising and reacting to the presence of different individuals 
in a seamless, unobtrusive and invisible manner. 
The success of future ICT technologies, some of which are set as 
priorities by the European Union, will depend on how secure they 
will be made, how privacy and individuals' rights will be protected 
and how individuals will come to trust the intelligent world that 
will surround them and through which they will move. 
WISTP 2012 aims to address the security and privacy issues that are 
increasingly exposed by mobile and wireless communications and related 
services, along with evaluating their impact on business, 
individuals, and the society.

The workshop seeks submissions from academia and industry presenting 
novel research on all theoretical and practical aspects of security 
and privacy of mobile and smart devices, as well as experimental studies 
of fielded systems based on wireless communication, the application 
of security technology, the implementation of systems, and lessons learned. 
We encourage submissions from other communities such as law, 
business and policy that present these communities' perspectives on 
technological issues. Topics of interest include, but are not limited to: 

* Security, Privacy and Trust in the Internet of Things
* Security and Trustworthiness in mobile and wireless networks
 including Mobile ad hoc networks, RFID systems, 
 Wireless sensor networks and Vehicular networks  
* Security, Privacy and Trust in Smart Environments
* Security, Privacy and Trust in Social Networks and Social Worlds
* Trustworthy life-logging
* Security, Privacy and Trust in e-Government and Mobile Commerce
 including Biometrics and national ID cards 
* Human behaviour and psychological aspects of security
 including User centric security and privacy
* Lightweight cryptography
* Privacy enhancing technologies (PETs)
* Mobile code security
* Mobile devices security
* Smart card security
* Embedded systems security
* Security models and architectures
 including Security and privacy policies, 
 Authentication and Access Control, and Security protocols

IMPORTANT DATES
Paper Submission due: January 31, 2012  *firm deadline*
Notification to authors: February 24, 2012
Author registration: March 18, 2012
Camera-ready due: March 18, 2012

SUBMISSION INSTRUCTIONS
Submissions must not substantially overlap with papers that have been 
published or that are simultaneously submitted to a journal or 
conference/workshop with proceedings. Each submission should be 
at most 16 pages in total in the Springer's LNCS format 
(http://www.springer.com/computer/lncs?SGWID=0-164-6-793341-0). 
All submissions should be anonymous (i.e., no author names/affiliations 
and obvious citations). Submissions are to be made to the submission 
web site (http://www.wistp.org/submission-details/). 
Only PDF files will be accepted. Submissions not meeting these guidelines 
risk rejection without consideration of their merits. Accepted papers 
will be published by Springer in the Lecture Notes in Computer Science 
series (http://www.springeronline.com/lncs), and the proceedings will be 
available at the workshop. The camera-ready version of the accepted papers 
must follow Springer guidelines (a Latex source file will be required). 

If a submitted paper is mainly the work of a student author, this paper 
is eligible for the best student paper award. To participate in this 
selection process, please add the word "STUDENT" in the affiliation 
field in the submission form.

Authors of accepted papers must guarantee that their papers will be 
presented at the workshop. At least one author of each accepted paper 
is required to register with the workshop and present the paper. 
For authors presenting multiple papers, one normal registration 
is valid for up to two papers.

WISTP 2012 COMMITTEES AND CHAIRS
General Chairs 
* Konstantinos Markantonakis, ISG-SCC, Royal Holloway University of London, UK
* Gerhard Hancke, ISG, Royal Holloway University of London, UK
* Keith Mayes, ISG-SCC, Royal Holloway University of London, UK

Local Organizers
* Raja Naem Akram, ISG-SCC, Royal Holloway University of London, UK
* Lishoy Francis, ISG-SCC, Royal Holloway University of London, UK
* Emma Dobson, ISG, Royal Holloway University of London, UK

Workshop/Panel/Tutorial Chair
* Damien Sauveron, XLIM, University of Limoges, France

Publicity Chairs
* Sara Foresti, Universita' degli Studi di Milano, Italy
* Taeshik Shon, Ajou University, Korea
* to be extended

Program Chairs
* Ioannis Askoxylakis, FORTH-ICS, Greece
* Joachim Posegga, Institute of IT Security and Security Law, 
 University of Passau, Germany

Program Committee
* Lejla Batina, Radboud University Nijmegen, Netherlands
* Angelos Bilas, FORTH-ICS & University of Crete, Greece
* Levente Buttyan, Budapest University of Technology and Economics, Hungary
* Serge Chaumette, LaBRI & University of Bordeaux, France 
* Jorge Cueller, Siemens, Germany
* Josep Domingo-Ferrer, Universitat Rovira i Virgili, Catalan, Spain
* Jaap-Henk Hoepman, TNO and Radboud University Nijmegen, Netherlands
* Michael Huth, Imperial College London, UK
* Martin Johns, SAP Research,Germany
* Cagatay Karabat, TUBITAK BILGEM, Turkey
* Angelos Keromytis, Columbia University, USA
* Kwok Yan Lam, National University of Singapore, Singapore
* Peter Lipp, Technische Universitaet Graz, Austria
* Javier Lopez, University of Malaga, Spain
* Emmanuel Magkos, Ionian University, Greece 
* Mark Manulis, Technische Universitat Darmstadt, Germany
* Louis Marinos, European Network and Information Security Agency (ENISA), EU
* Fabio Martinelli, IIT-CNR, Italy
* Aikaterini Mitrokosta, EPFL, Switzerland 
* Jose Onieva, University of Malaga, Spain
* Gerardo Pelosi, University of Bergamo, Italy 
* Svetla Petkova-Nikova, Katholieke Universiteit Leuven, Belgium
* Henrich C. Pohls, University of Passau, Germany
* Ilia Polian, Univ. of Passau, Germany
* Axel Poschmann, National University of Singapore, Singapore
* Jean-Jacques Quisquater, DICE, Catholic University of Louvain, Belgium
* Bill Roscoe, Department of Computer Science, UK
* Kouichi Sakurai, Kyushu University, Japan
* Pierangela Samarati, Universita' degli Studi di Milano, Italy
* Christos Siaterlis, Joint Research Centre, EU 
* George Spanoudakis, City University of London, UK
* Theo Tryfonas, University of Bristol, UK
* Michael Tunstall, University of Bristol, UK
* Ingrid Verbauwhede, Katholieke Universiteit Leuven, Belgium
* Heung-Youl Youm, Soonchunhyang University, Korea
* to be extended

WISTP Steering Committee
* Claudio Ardagna, Universita' degli Studi di Milano, Italy
* Angelos Bilas, FORTH-ICS & University of Crete, Greece
* Konstantinos Markantonakis, ISG-SCC, Royal Holloway University of London, UK
* Jean-Jacques Quisquater, DICE, Catholic University of Louvain, Belgium
* Damien Sauveron, XLIM, University of Limoges, France
* Jianying Zhou, Institute for Infocomm Research, Singapore

SPONSOR
* IFIP WG 11.2 Pervasive Systems Security

For further inquiries, please contact Damien Sauveron at
damien.sauveron@unilim.fr


This call for papers and additional information about the conference 
can be found at http://www.wistp.org/

Program chairs can be contacted at wistp2012@ics.forth.gr

Nov 24

SIXTH WORKSHOP IN INFORMATION SECURITY THEORY AND PRACTICE (WISTP 2012)

*****************
CALL FOR PAPERS
*****************

SIXTH WORKSHOP IN INFORMATION SECURITY THEORY AND PRACTICE (WISTP 2012)
Security and Trust in Computing Systems and Ambient Intelligence Ecosystem
June 19-22, 2012, London, UK – http://www.wistp.org/

WISTP 2012 BACKGROUND AND GOALS
Future ICT technologies, like the concepts of Ambient Intelligence and 
Internet of Things provide a vision of the Information Society where 
the emphasis is on surrounding people by intelligent interactive 
interfaces and objects and on environments that are capable of 
recognising and reacting to the presence of different individuals 
in a seamless, unobtrusive and invisible manner. 
The success of future ICT technologies, some of which are set as 
priorities by the European Union, will depend on how secure they 
will be made, how privacy and individuals' rights will be protected 
and how individuals will come to trust the intelligent world that 
will surround them and through which they will move. 
WISTP 2012 aims to address the security and privacy issues that are 
increasingly exposed by mobile and wireless communications and related 
services, along with evaluating their impact on business, 
individuals, and the society.

The workshop seeks submissions from academia and industry presenting 
novel research on all theoretical and practical aspects of security 
and privacy of mobile and smart devices, as well as experimental studies 
of fielded systems based on wireless communication, the application 
of security technology, the implementation of systems, and lessons learned. 
We encourage submissions from other communities such as law, 
business and policy that present these communities' perspectives on 
technological issues. Topics of interest include, but are not limited to: 

* Security, Privacy and Trust in the Internet of Things
* Security and Trustworthiness in mobile and wireless networks
 including Mobile ad hoc networks, RFID systems, 
 Wireless sensor networks and Vehicular networks  
* Security, Privacy and Trust in Smart Environments
* Security, Privacy and Trust in Social Networks and Social Worlds
* Trustworthy life-logging
* Security, Privacy and Trust in e-Government and Mobile Commerce
 including Biometrics and national ID cards 
* Human behaviour and psychological aspects of security
 including User centric security and privacy
* Lightweight cryptography
* Privacy enhancing technologies (PETs)
* Mobile code security
* Mobile devices security
* Smart card security
* Embedded systems security
* Security models and architectures
 including Security and privacy policies, 
 Authentication and Access Control, and Security protocols

IMPORTANT DATES
Paper Submission due: January 31, 2011  *firm deadline*
Notification to authors: February 24, 2012
Author registration: March 18, 2012
Camera-ready due: March 18, 2012

SUBMISSION INSTRUCTIONS
Submissions must not substantially overlap with papers that have been 
published or that are simultaneously submitted to a journal or 
conference/workshop with proceedings. Each submission should be 
at most 16 pages in total in the Springer's LNCS format 
(http://www.springer.com/computer/lncs?SGWID=0-164-6-793341-0). 
All submissions should be anonymous (i.e., no author names/affiliations 
and obvious citations). Submissions are to be made to the submission 
web site (http://www.wistp.org/submission-details/). 
Only PDF files will be accepted. Submissions not meeting these guidelines 
risk rejection without consideration of their merits. Accepted papers 
will be published by Springer in the Lecture Notes in Computer Science 
series (http://www.springeronline.com/lncs), and the proceedings will be 
available at the workshop. The camera-ready version of the accepted papers 
must follow Springer guidelines (a Latex source file will be required). 

If a submitted paper is mainly the work of a student author, this paper 
is eligible for the best student paper award. To participate in this 
selection process, please add the word "STUDENT" in the affiliation 
field in the submission form.

Authors of accepted papers must guarantee that their papers will be 
presented at the workshop. At least one author of each accepted paper 
is required to register with the workshop and present the paper. 
For authors presenting multiple papers, one normal registration 
is valid for up to two papers.

WISTP 2012 COMMITTEES AND CHAIRS
General Chairs 
* Konstantinos Markantonakis, ISG-SCC, Royal Holloway University of London, UK
* Gerhard Hancke, ISG, Royal Holloway University of London, UK
* Keith Mayes, ISG-SCC, Royal Holloway University of London, UK

Local Organizers
* Raja Naem Akram, ISG-SCC, Royal Holloway University of London, UK
* Lishoy Francis, ISG-SCC, Royal Holloway University of London, UK
* Emma Dobson, ISG, Royal Holloway University of London, UK

Workshop/Panel/Tutorial Chair
* Damien Sauveron, XLIM, University of Limoges, France

Publicity Chairs
* Sara Foresti, Universita' degli Studi di Milano, Italy
* Taeshik Shon, Ajou University, Korea
* to be extended

Program Chairs
* Ioannis Askoxylakis, FORTH-ICS, Greece
* Joachim Posegga, Institute of IT Security and Security Law, 
 University of Passau, Germany

Program Committee
* Lejla Batina, Radboud University Nijmegen, Netherlands
* Angelos Bilas, FORTH-ICS & University of Crete, Greece
* Levente Buttyan, Budapest University of Technology and Economics, Hungary
* Serge Chaumette, LaBRI & University of Bordeaux, France 
* Jorge Cueller, Siemens, Germany
* Josep Domingo-Ferrer, Universitat Rovira i Virgili, Catalan, Spain
* Jaap-Henk Hoepman, TNO and Radboud University Nijmegen, Netherlands
* Michael Huth, Imperial College London, UK
* Martin Johns, SAP Research,Germany
* Cagatay Karabat, TUBITAK BILGEM, Turkey
* Angelos Keromytis, Columbia University, USA
* Kwok Yan Lam, National University of Singapore, Singapore
* Peter Lipp, Technische Universitaet Graz, Austria
* Javier Lopez, University of Malaga, Spain
* Emmanuel Magkos, Ionian University, Greece 
* Mark Manulis, Technische Universitat Darmstadt, Germany
* Louis Marinos, European Network and Information Security Agency (ENISA), EU
* Fabio Martinelli, IIT-CNR, Italy
* Aikaterini Mitrokosta, EPFL, Switzerland 
* Jose Onieva, University of Malaga, Spain
* Gerardo Pelosi, University of Bergamo, Italy 
* Svetla Petkova-Nikova, Katholieke Universiteit Leuven, Belgium
* Henrich C. Pohls, University of Passau, Germany
* Ilia Polian, Univ. of Passau, Germany
* Axel Poschmann, National University of Singapore, Singapore
* Jean-Jacques Quisquater, DICE, Catholic University of Louvain, Belgium
* Bill Roscoe, Department of Computer Science, UK
* Kouichi Sakurai, Kyushu University, Japan
* Pierangela Samarati, Universita' degli Studi di Milano, Italy
* Christos Siaterlis, Joint Research Centre, EU 
* George Spanoudakis, City University of London, UK
* Theo Tryfonas, University of Bristol, UK
* Michael Tunstall, University of Bristol, UK
* Ingrid Verbauwhede, Katholieke Universiteit Leuven, Belgium
* Heung-Youl Youm, Soonchunhyang University, Korea
* to be extended

WISTP Steering Committee
* Claudio Ardagna, Universita' degli Studi di Milano, Italy
* Angelos Bilas, FORTH-ICS & University of Crete, Greece
* Konstantinos Markantonakis, ISG-SCC, Royal Holloway University of London, UK
* Jean-Jacques Quisquater, DICE, Catholic University of Louvain, Belgium
* Damien Sauveron, XLIM, University of Limoges, France
* Jianying Zhou, Institute for Infocomm Research, Singapore

SPONSOR
* IFIP WG 11.2 Pervasive Systems Security

For further inquiries, please contact Damien Sauveron at
damien.sauveron@unilim.fr


This call for papers and additional information about the conference 
can be found at http://www.wistp.org/

Program chairs can be contacted at wistp2012@ics.forth.gr

Oct 21

UCL Crypto Group/BCRYPT: Tolerant Algebraic Side-Channel Analysis of AES

 

*Speaker:* Yossi Oren, Tel Aviv University (Israel)

*Title:* Tolerant Algebraic Side-Channel Analysis of AES

*Date:* Tuesday, October 25, 11:00

*Place:* room 207, Euler Building (near Maxwell Building) Avenue
Georges Lemaitre, 4-6 - 1348 Louvain-la-Neuve

*Abstract:* Classical power analysis attacks are difficult to mount when only a single power trace is available: the statistical methods that make DPA attacks so successful are not applicable since they require many (typically thousands) of traces. Recently it was suggested by Standaert et al. to use algebraic methods for the single-trace scenario, converting the key recovery problem into a Boolean satisfiability (SAT) problem, then using a SAT solver. However, this approach is extremely sensitive to noise (allowing an error rate of well under 1% at most), and the question of its practicality remained open.

In this work we show how a single-trace side-channel analysis problem can be transformed into a pseudo-Boolean optimization (PBOPT) problem, which takes errors into consideration.  We call our new attack methodology Tolerant Algebraic Side-Channel Analysis (TASCA).  We will describe the new methodology, its strengths and limitations, and finally show a full TASCA-based key-recovery attack on a microcontroller-based implementation of the Advanced Encryption Standard.



---------
For a map of Louvain-la-Neuve: http://www.dom.ucl.ac.be/info_plan.html
For a map of public parking lots: http://www.llnparking.be/

Oct 12

Journées Cryptographie et Sécurité de l’Information – 24 et 25 novembre 2011

 

===========================================================
 
                     Première annonce
 
  Journées Cryptographie et Sécurité de l'Information
 
                  24 et 25 novembre 2011
 
============================================================
 
La vocation de ces journées est de faciliter rencontres et
interactions entre professionnels, chercheurs et étudiants
(masters, doctorants) autour de conférences présentant
des problématiques d'actualité liées à la cryptographie et
à la sécurité de l'information.
 
Ces journées marquent 25 ans de formation et de recherche
sur ces thèmes à l'Université de Limoges.
 
Ce colloque est d'accès libre, sur inscription.
 
              —————————-
                  Conférences invitées
 
François Morain (Ecole Polytechnique)
 
  « 25 ans de cryptographie basée sur la théorie des
    nombres »
 
Pierre Paradinas (CNAM)
 
  « Cartes à puce et technologies de l'information
    25 ans : rétros(-pers-)pectives »
 
Anne Canteaut (INRIA)
 
  « De l'espérance de vie d'un algorithme symétrique
    (ou l'AES dix ans après) »
 
Carlos Aguilar Melchor (Université de Limoges)
 
  « Chiffrement homomorphe et exécution d'algorithmes sur
    des données chiffrées : avancées récentes »
 
Jean-Philippe Wary (Orange Labs)
 
  « La sécurité chez un opérateur:
    les nouvelles problématiques »
 
Yves Deswarte (CNRS-LAAS)
 
  « Identité, sécurité et vie privée »
 
Ministère de la Défense
 
  Titre à préciser
 
               —————————
Programme détaillé, résumés des conférences et inscription:
 
http://www.cryptis.fr/accueil-25-ans.html
 
Date limite d'inscription: 6 novembre 2011
 
Les exposés auront lieu sur le campus de la Borie de la
Faculté des Sciences et Techniques de l'Université de Limoges.
 
               —————————
                       Partenaires
 
* Pôle de compétitivité Elopsys
 
* Agence de Valorisation Economique et Culturelle du Limousin.
 
* Laboratoire XLIM (UMR CNRS 6172)
 
* Faculté des Sciences et Techniques de l'Université de Limoges
 
* Départements de Mathématiques et d'Informatique de la Faculté
des Sciences et Techniques de l'Université de Limoges
 
               —————————
                       Contacts
 
Organisateurs: Thierry Berger, Pierre Dusart, Philippe Gaborit,
             Jean-Louis Lanet, Marc Rybowicz
 
Contact organisateurs: jcl@unilim.fr
 
Secrétariat: Annie Nicolas annie.nicolas@unilim.fr
           05 55 45 73 23
============================================================

Aug 18

Biclique Cryptanalysis of the Full AES

http://research.microsoft.com/en-us/projects/cryptanalysis/aesbc.pdf

Mar 25

Best Ph.D. Thesis on Security and Trust Management

 

ERCIM STM WG 2011 Award for the

Best Ph.D. Thesis on Security and Trust Management

 

The European Research Consortium in Informatics and Mathematics (ERCIM – www.ercim.org) has a technical WG on Security and Trust Management (STM – www.iit.cnr.it/STM-WG) for performing a series of activities, as research projects, workshop/conference organization, dissemination of knowledge, for increasing the European research and development capabilities on security, trust and privacy.

 

One of the main goals of the WG is to promote the scientific growth of young researchers interested in the field of security and trust management. Thus, ERCIM STM WG established an award for the best Ph.D. thesis in this area in order to increase the visibility of the young researchers inside the ERCIM scientific community as well as in the larger European one.

 

The topics of interest include, but are not limited to:

·      rigorous semantics and computational models for security and trust;

·      security and trust management architectures, mechanisms and policies;

·      networked systems security;

·      privacy and anonymity;

·      identity management;

·      ICT for securing digital as well as physical assets;

·      cryptography.

 

Applications for the 2011 Award are open to all Ph.D. holders that defended their thesis during 2010 in any European University. Applications consisting of the Ph.D. Thesis (in PDF format), a short summary of the Thesis (mandatory in English) and at least two letters of support (one from a researcher of an ERCIM STM WG Institution) should be sent by May 8th 2011 to the WG Chair, Javier Lopez <jlm@lcc.uma.es>.

 

Theses will be evaluated by a Committee appointed from the European research community. The theses will be judged on the basis of scientific quality, originality, clarity of presentation, as well as potential impact of the results. The Committee members for the competition are:

 

·      Joris Claessens, Microsoft, Germany

·      Jorge Cuellar, Siemens, Germany

·      Javier Lopez, Univ. of Malaga, Spain

·      Fabio Martinelli, CNR, Italy

·      Vashek Matyas, Masaryk Univ., Czech Republic

·      Bart Preneel, KUL, Belgium

·      Alexander Pretschner, KIT, Germany

·      Ketil Stoelen, SINTEF, Norway

·      Edgar Weippl, SBA, Austria

 

The ceremony for the Award will be held during the 7th International Workshop on Security and Trust Management (STM 2011), 27-28 June 2011, in Copenhagen (Denmark).