We apologize for multiple mailings.
SHARCS -- Special-Purpose Hardware for Attacking Cryptographic Systems
April 03-04, 2006
The registration for SHARCS'06 is now open at: www.sharcs.org
Please note that the deadline for submitting an extended abstract ends
February 17, 2006.
SHARCS '06 is the second workshop dedicated to the challenging subject
special-purpose cryptanalytical machines. The first SHARCS workshop
place 2005 in Paris and attracted 120 participants from industry,
and government organization. In the upcoming workshop we intend to
more contributed talks and therefore encourage submissions to the areas
Much of the earlier work on special-purpose hardware was done on key
searches for symmetric-key algorithms, with a particular emphasis on
attacks against DES. More recently there has been interest in hardware
architectures for sieving methods for attacking the RSA scheme.
it seems that much work remains to be done including, for instance,
special purpose hardware crackers for:
* index calculus algorithms
* elliptic curve based schemes
* lattice based schemes
* specific block and stream ciphers
In addition to algorithmic issues, it is also the workshop's goal to
advances on implementational issues such as:
* optical devices for cryptanalysis
* analog computers for cryptanalysis
* FPGAs for cryptanalysis
* clusters of standard computers for cryptanalysis
* routing protocols and other low-level tools
The ultimate objective of SHARCS is to determine whether special
hardware poses a real threat for today's cryptographic algorithms, and
whether there are advantages over software-based attacks. Since this is
intrinsically interdisciplinary subject, it is hoped that the workshop
bring together researchers with different backgrounds for discussing
advancing this exciting field.
The workshop will consist of invited keynote presentations and some
contributed presentations. We welcome submissions of extended abstracts
(at least 3 pages.) We would like to stress that we do *not* aim at
receiving contributions on side channel attacks. Furthermore, at this
point we exclude quantum cryptologic devices. Theoretical papers
analyzing the feasibility and costs of attacks using specialized
are, however, very much welcomed.
For more information on the workshop visit: www.sharcs.org
The workshop is organized by ECRYPT, the European Network of Excellence
Cryptography (www.ecrypt.eu.org). The workshop is an activity of
VAMPIRE - Virtual Application and Implementation Research Lab,
There will be no formal proceedings, but a handout with abstracts will
provided to all participants. (This avoids submissions to SHARCS from
conflicting with submissions to forthcoming conferences with
February 17, 2006: submission of abstracts
March 06, 2006: notification of acceptance or rejection
March 20, 2006: revised version of accepted papers
April 03 & 04, 2006: SHARCS workshop
The submission should start with a title, a list of the authors
with their affiliations and a short abstract describing the content of
paper. This should be followed by an extended abstract of at least 3
at most 20 pages including appendices. The authors of accepted papers
guarantee to present their paper at the workshop.
To submit send your contribution to
no later than February 17, 2006, in ps or pdf format. You should
receive an acknowledgment of submission no later than one day
* Daniel J. Bernstein (Chicago)
* Tanja Lange (Copenhagen)
* Arjen Lenstra (Lausanne)
* Christof Paar (Bochum)
* Eran Tromer (Haifa)
- Prev by Date: Re: HMAC-MD5 shown not compromized by MD5 collisions
- Next by Date: Re: The strength of "post-encryption encryption"?
- Previous by thread: [complete newbie] data (not necessarily encrypted) integrity check...
- Next by thread: what encryption looks like this?