BEGIN:VCALENDAR
VERSION:2.0
PRODID:IEEE vTools.Events//EN
CALSCALE:GREGORIAN
BEGIN:VTIMEZONE
TZID:Asia/Hong_Kong
BEGIN:STANDARD
DTSTART:19791021T023000
TZOFFSETFROM:+0900
TZOFFSETTO:+0800
TZNAME:HKT
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTAMP:20171229T053600Z
UID:3D66DCFC-4486-4034-B5BD-6E70AA7BF69A
DTSTART;TZID=Asia/Hong_Kong:20171018T100000
DTEND;TZID=Asia/Hong_Kong:20171018T113000
DESCRIPTION:Banking\, defence applications and cryptosystems often demand s
 ecurity features\, including cryptography\, tamper resistance\, stealth\, 
 and etc.\, by means of hardware approaches and/or software approaches to p
 revent data leakages. The hardware physical attacks or commonly known as s
 ide channel attacks have been employed to extract the secret keys of the e
 ncrypted algorithms implemented in hardware devices by analyzing their phy
 sical parameters such as power dissipation\, electromagnetic interference 
 and timing information. In this talk\, we shall provide an overview of the
  different cryptography algorithms. We will also present the side channel 
 attacks\, in particular the powerful Correlation Power Analysis (CPA) and 
 Correlation Electromagnetic Analysis (CEMA) with a leakage model can be us
 ed to reveal the secret keys of the cryptosystems. Several of the current-
 art attack techniques will be shared in this talk. Two main approaches of 
 countermeasure against CPA and CEMA attacks\, i.e. Hiding and Masking\, wh
 ich usually known as hardware approach and algorithmic (DSP) approach will
  also be discussed in this talk. We will also present several effective co
 untermeasure techniques based on these approaches to design a highly secur
 ed microchip.\n\nCo-sponsored by: City University of Hong Kong\n\nSpeaker(
 s): Prof Bah-Hwee Gwee\, \n\nDEPARTMENT OF ELECTRONIC ENGINEERING \, City 
 University of Hong Kong\, Hong Kong\, Guangdong\, China
LOCATION:DEPARTMENT OF ELECTRONIC ENGINEERING \, City University of Hong Ko
 ng\, Hong Kong\, Guangdong\, China
ORGANIZER:r.cheung@ieee.org
SEQUENCE:0
SUMMARY:Seminar on Secured Microchip Design to Countermeasure against Physi
 cal Hardware Attack
URL;VALUE=URI:https://events.vtools.ieee.org/m/156062
X-ALT-DESC:Description: &lt;br /&gt;&lt;p&gt;Banking\, defence applications and cryptos
 ystems often demand security features\, including cryptography\, tamper re
 sistance\, stealth\, and etc.\, by means of hardware approaches and/or sof
 tware approaches to prevent data leakages. The hardware physical attacks o
 r commonly known as side channel attacks have been employed to extract the
  secret keys of the encrypted algorithms implemented in hardware devices b
 y analyzing their physical parameters such as power dissipation\, electrom
 agnetic interference and timing information. In this talk\, we shall provi
 de an overview of the different cryptography algorithms. We will also pres
 ent the side channel attacks\, in particular the powerful Correlation Powe
 r Analysis (CPA) and Correlation Electromagnetic Analysis (CEMA) with a le
 akage model can be used to reveal the secret keys of the cryptosystems. Se
 veral of the current-art attack techniques will be shared in this talk. Tw
 o main approaches of countermeasure against CPA and CEMA attacks\, i.e. Hi
 ding and Masking\, which usually known as hardware approach and algorithmi
 c (DSP) approach will also be discussed in this talk. We will also present
  several effective countermeasure techniques based on these approaches to 
 design a highly secured microchip.&lt;/p&gt;
END:VEVENT
END:VCALENDAR

