Tolga Acar, Microsoft Research, USA
Selecting and Deploying Elliptic Curves in Security Protocols. PDF
Abstract: The development and adoption of a cryptographic standard is a delicate endeavor with competing and conflicting actors, which becomes only harder with integration into security protocols some yet undefined. This talk looks at the use of Elliptic Curves (EC) in a sliver of pervasive security protocols. We cover NIST-defined ECs, impact of new information made available in the past couple of years, and current attempts to alleviate sometimes unsubstantiated yet valid concerns over these curves. This talk also presents an elliptic curve selection algorithm and its analysis from a performance and security perspective including rigid parameter generation, constant-time implementation, and exception-free scalar multiplication.

Guido Marco Bertoni, ST Microelectronics, Italy
Permutation-based encryption for lightweight applications.
In the recent years we have seen a rapid development of cryptographic primitives based on permutations. The talk gives an overview on how you can easily build hash functions, stream ciphers, PRNGs, authenticated encryption and other constructions starting from a fixed-width permutation. This flexibility can be particular useful in resource-constrained applications, basically a single primitive can satisfy all the security needs typically requested to symmetric key primitives. Finally there will be the introduction of Ketje, a lightweight authenticated encryption developed in collaboration with Joan Daemen, Michael Peeters, Gilles Van Assche and Ronny Van Keer.

Johann Heyszl, Hardware Security, Fraunhofer AISEC, Germany
High-Resolution Magnetic Field Side-Channels and their Affect on Cryptographic Implementations.
The last years have again seen many new developments in the field of side-channel analysis. Partly, new insights are driven by side-channel measurement equipment which becomes increasingly sophisticated due to the fact that respective devices are readily available to academics, as well as to industry and potential attackers. This talk discusses the impact of available high-resolution measurement equipment to measure magnetic fields on implementations of cryptographic algorithms. The progress in this segment of side-channel analysis affects different kinds of cryptographic implementations including light-weight implementations of elliptic curve cryptography, symmetric cryptographic algorithms, physical unclonable functions as well as new attempts to achieve leakage resilience for block ciphers by special constructions.