<html xmlns:v="urn:schemas-microsoft-com:vml" xmlns:o="urn:schemas-microsoft-com:office:office" xmlns:w="urn:schemas-microsoft-com:office:word" xmlns:m="http://schemas.microsoft.com/office/2004/12/omml" xmlns="http://www.w3.org/TR/REC-html40"><head><meta http-equiv=Content-Type content="text/html; charset=iso-8859-1"><meta name=Generator content="Microsoft Word 12 (filtered medium)"><!--[if !mso]><style>v\:* {behavior:url(#default#VML);}
o\:* {behavior:url(#default#VML);}
w\:* {behavior:url(#default#VML);}
.shape {behavior:url(#default#VML);}
</style><![endif]--><style><!--
/* Font Definitions */
@font-face
        {font-family:Calibri;
        panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
        {font-family:Tahoma;
        panose-1:2 11 6 4 3 5 4 4 2 4;}
@font-face
        {font-family:Consolas;
        panose-1:2 11 6 9 2 2 4 3 2 4;}
@font-face
        {font-family:"Lucida Calligraphy";
        panose-1:3 1 1 1 1 1 1 1 1 1;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
        {margin:0cm;
        margin-bottom:.0001pt;
        font-size:11.0pt;
        font-family:"Calibri","sans-serif";}
a:link, span.MsoHyperlink
        {mso-style-priority:99;
        color:blue;
        text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
        {mso-style-priority:99;
        color:purple;
        text-decoration:underline;}
strong
        {mso-style-priority:22;
        font-family:"Times New Roman","serif";}
p.MsoPlainText, li.MsoPlainText, div.MsoPlainText
        {mso-style-priority:99;
        mso-style-link:"Plain Text Char";
        margin:0cm;
        margin-bottom:.0001pt;
        font-size:10.5pt;
        font-family:Consolas;}
pre
        {mso-style-priority:99;
        mso-style-link:"HTML Preformatted Char";
        margin:0cm;
        margin-bottom:.0001pt;
        font-size:10.0pt;
        font-family:"Courier New";}
p.MsoAcetate, li.MsoAcetate, div.MsoAcetate
        {mso-style-priority:99;
        mso-style-link:"Balloon Text Char";
        margin:0cm;
        margin-bottom:.0001pt;
        font-size:8.0pt;
        font-family:"Tahoma","sans-serif";}
p.MsoNoSpacing, li.MsoNoSpacing, div.MsoNoSpacing
        {mso-style-priority:1;
        margin:0cm;
        margin-bottom:.0001pt;
        font-size:11.0pt;
        font-family:"Calibri","sans-serif";}
span.HTMLPreformattedChar
        {mso-style-name:"HTML Preformatted Char";
        mso-style-priority:99;
        mso-style-link:"HTML Preformatted";
        font-family:"Courier New";}
span.PlainTextChar
        {mso-style-name:"Plain Text Char";
        mso-style-priority:99;
        mso-style-link:"Plain Text";
        font-family:Consolas;}
span.BalloonTextChar
        {mso-style-name:"Balloon Text Char";
        mso-style-priority:99;
        mso-style-link:"Balloon Text";
        font-family:"Tahoma","sans-serif";}
span.EmailStyle24
        {mso-style-type:personal;
        font-family:"Calibri","sans-serif";
        color:windowtext;}
span.EmailStyle25
        {mso-style-type:personal;
        font-family:"Calibri","sans-serif";
        color:#1F497D;}
span.EmailStyle26
        {mso-style-type:personal;
        font-family:"Calibri","sans-serif";
        color:#1F497D;}
span.EmailStyle27
        {mso-style-type:personal;
        font-family:"Calibri","sans-serif";
        color:#1F497D;}
span.EmailStyle28
        {mso-style-type:personal;
        font-family:"Calibri","sans-serif";
        color:#1F497D;}
span.EmailStyle29
        {mso-style-type:personal;
        font-family:"Calibri","sans-serif";
        color:#1F497D;}
span.EmailStyle30
        {mso-style-type:personal;
        font-family:"Calibri","sans-serif";
        color:#1F497D;}
span.EmailStyle31
        {mso-style-type:personal;
        font-family:"Calibri","sans-serif";
        color:#1F497D;}
span.EmailStyle32
        {mso-style-type:personal;
        font-family:"Calibri","sans-serif";
        color:#1F497D;}
span.EmailStyle33
        {mso-style-type:personal;
        font-family:"Calibri","sans-serif";
        color:#1F497D;}
span.EmailStyle34
        {mso-style-type:personal;
        font-family:"Calibri","sans-serif";
        color:#1F497D;}
span.EmailStyle35
        {mso-style-type:personal;
        font-family:"Calibri","sans-serif";
        color:#1F497D;}
span.EmailStyle36
        {mso-style-type:personal-reply;
        font-family:"Calibri","sans-serif";
        color:#1F497D;}
.MsoChpDefault
        {mso-style-type:export-only;
        font-size:10.0pt;}
@page WordSection1
        {size:612.0pt 792.0pt;
        margin:72.0pt 72.0pt 72.0pt 72.0pt;}
div.WordSection1
        {page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext="edit" spidmax="1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext="edit">
<o:idmap v:ext="edit" data="1" />
</o:shapelayout></xml><![endif]--></head><body lang=EN-US link=blue vlink=purple><div class=WordSection1><p class=MsoNormal><span style='color:#1F497D'>Dear all,<o:p></o:p></span></p><p class=MsoNormal><span lang=NL style='color:#1F497D'><o:p> </o:p></span></p><p class=MsoNormal><span style='color:#1F497D'>Herewith I send you the program of the CWG-meeting on Friday, December 7, 2012.<o:p></o:p></span></p><p class=MsoNormal><span style='color:#1F497D'><o:p> </o:p></span></p><p class=MsoNormal><span lang=NL style='color:#1F497D'>With kind regards / Met vriendelijke groeten,<o:p></o:p></span></p><p class=MsoNormal><span style='font-family:"Lucida Calligraphy";color:#1F497D'>Anita Klooster<o:p></o:p></span></p><p class=MsoNormal><span style='color:#1F497D'>secretary of the section Discrete Mathematics<o:p></o:p></span></p><p class=MsoNormal><span style='font-family:"Lucida Calligraphy";color:#1F497D'><o:p> </o:p></span></p><p class=MsoNormal><span style='color:#1F497D'><img width=180 height=38 id="Picture_x0020_1" src="cid:image001.gif@01CCA472.99927100" alt="cid:image001.gif@01CB8FB5.88A9C0F0"></span><span style='font-family:"Lucida Calligraphy";color:#1F497D'><o:p></o:p></span></p><p class=MsoNormal><span style='color:#1F497D'><o:p> </o:p></span></p><p class=MsoNormal><span style='color:#1F497D'>Dept. of Mathematics and Computer Science<o:p></o:p></span></p><p class=MsoNormal><span style='color:#1F497D'>MF 4.058<o:p></o:p></span></p><p class=MsoNormal><span style='color:#1F497D'>Office hours: Monday and Friday 08.30-12.30 h / Tuesday and Wednesday 08.30-17.00 h<o:p></o:p></span></p><p class=MsoNormal><span style='color:#1F497D'>Telephone: +31 (0)40 2472254<o:p></o:p></span></p><p class=MsoNormal><span style='color:#1F497D'>Email: <a href="mailto:secdm@tue.nl">secdm@tue.nl</a> <o:p></o:p></span></p><div style='mso-element:para-border-div;border:none;border-bottom:solid windowtext 1.0pt;padding:0cm 0cm 1.0pt 0cm'><p class=MsoNormal style='border:none;padding:0cm'><u><span style='color:#1F497D'><o:p><span style='text-decoration:none'> </span></o:p></span></u></p></div><p class=MsoNormal><u><o:p><span style='text-decoration:none'> </span></o:p></u></p><p class=MsoNormal><strong><u><span style='font-size:18.0pt;font-family:"Arial","sans-serif"'>CRYPTO WORKING GROUP</span></u></strong><strong><span style='font-size:18.0pt;font-family:"Arial","sans-serif"'> </span></strong><o:p></o:p></p><p class=MsoNormal><o:p> </o:p></p><p class=MsoNormal><o:p> </o:p></p><p class=MsoNormal><b><span style='font-size:14.0pt;font-family:"Arial","sans-serif"'>Friday, December 7, 2012<o:p></o:p></span></b></p><p class=MsoNormal><span style='font-size:12.0pt;font-family:"Arial","sans-serif"'>                                                <o:p></o:p></span></p><p class=MsoNormal><span style='font-size:12.0pt;font-family:"Arial","sans-serif"'>                                                </span><span lang=NL style='font-size:12.0pt;font-family:"Arial","sans-serif"'>De Kargadoor (<span style='color:#1F497D'><a href="http://www.kargadoor.nl/utrecht/zaalverhuur.html">http://www.kargadoor.nl/utrecht/zaalverhuur.html</a></span>)<o:p></o:p></span></p><p class=MsoNormal><span lang=NL style='font-size:12.0pt;font-family:"Arial","sans-serif"'>                                                Oudegracht 36, Utrecht<o:p></o:p></span></p><pre><b><span lang=NL style='font-size:12.0pt;font-family:"Arial","sans-serif"'>                           </span></b><span lang=NL><o:p></o:p></span></pre><p class=MsoNormal style='text-align:justify;line-height:15.0pt;mso-line-height-rule:exactly'><b><span lang=NL style='font-size:12.0pt;font-family:"Arial","sans-serif"'><o:p> </o:p></span></b></p><p class=MsoNormal style='text-align:justify;line-height:15.0pt;mso-line-height-rule:exactly'><b><span lang=NL style='font-size:14.0pt;font-family:"Arial","sans-serif"'>Program<o:p></o:p></span></b></p><p class=MsoNormal style='text-align:justify;line-height:15.0pt;mso-line-height-rule:exactly'><span lang=NL style='font-size:12.0pt;font-family:"Arial","sans-serif"'><o:p> </o:p></span></p><p class=MsoNormal style='text-align:justify;line-height:15.0pt;mso-line-height-rule:exactly'><b><span lang=NL style='font-size:12.0pt;font-family:"Arial","sans-serif"'>10.45 – 11.30 hrs.    </span></b><b><span style='font-size:12.0pt;font-family:"Arial","sans-serif"'>Jasper van Woudenberg</span></b><span style='font-family:"Arial","sans-serif"'> (<i>Riscure</i>),<span style='color:#1F497D'><o:p></o:p></span></span></p><p class=MsoNormal style='margin-left:108.0pt;text-align:justify;text-indent:36.0pt;line-height:15.0pt;mso-line-height-rule:exactly'><span style='font-size:12.0pt;font-family:"Arial","sans-serif"'>From space rays to laser beams: Fault injection in practice<o:p></o:p></span></p><p class=MsoNormal style='margin-left:108.0pt;text-align:justify;text-indent:36.0pt;line-height:15.0pt;mso-line-height-rule:exactly'><span style='font-size:12.0pt;font-family:"Arial","sans-serif"'>            (Abstract below)<span style='color:#1F497D'><o:p></o:p></span></span></p><p class=MsoNormal style='text-align:justify;line-height:15.0pt;mso-line-height-rule:exactly'><span style='font-size:10.0pt;color:#1F497D'>                                                                </span><span style='font-size:9.0pt;color:#1F497D'>                                                                </span><span style='font-size:9.0pt;color:#1F497D'><o:p></o:p></span></p><p class=MsoNormal style='text-align:justify;line-height:15.0pt;mso-line-height-rule:exactly'><b><span style='font-size:12.0pt;font-family:"Arial","sans-serif"'>11.30 -  11.45 hrs.    </span></b><i><span style='font-size:12.0pt;font-family:"Arial","sans-serif"'>Coffee / tea break</span></i><i><span lang=EN-GB style='font-size:12.0pt;font-family:"Arial","sans-serif"'><o:p></o:p></span></i></p><p class=MsoNormal style='text-align:justify;line-height:15.0pt;mso-line-height-rule:exactly'><i><span style='font-size:12.0pt;font-family:"Arial","sans-serif"'><o:p> </o:p></span></i></p><p class=MsoNormal style='text-align:justify;line-height:15.0pt;mso-line-height-rule:exactly'><b><span style='font-size:12.0pt;font-family:"Arial","sans-serif"'>11.45 - 12.30 hrs.     Jeroen Doumen </span></b><span style='font-family:"Arial","sans-serif"'>(<i>Irdeto</i>),</span><span style='font-size:10.0pt;font-family:"Arial","sans-serif"'><o:p></o:p></span></p><p class=MsoNormal style='margin-left:108.0pt;text-align:justify;text-indent:36.0pt;line-height:15.0pt;mso-line-height-rule:exactly'><span style='font-size:12.0pt;font-family:"Arial","sans-serif"'>Faster batch forgery identification<o:p></o:p></span></p><p class=MsoNormal style='text-align:justify;line-height:15.0pt;mso-line-height-rule:exactly'><span style='color:#1F497D'><o:p> </o:p></span></p><p class=MsoNormal style='text-align:justify;line-height:15.0pt;mso-line-height-rule:exactly'><a name="OLE_LINK1"><b><span style='font-size:12.0pt;font-family:"Arial","sans-serif"'>12.30 -  14.00 hrs.    </span></b></a><i><span style='font-size:12.0pt;font-family:"Arial","sans-serif"'>Lunch break (lunch not included)</span></i><i><span lang=EN-GB style='font-size:12.0pt;font-family:"Arial","sans-serif"'><o:p></o:p></span></i></p><p class=MsoNormal style='text-align:justify;line-height:15.0pt;mso-line-height-rule:exactly'><i><span style='font-size:12.0pt;font-family:"Arial","sans-serif"'><o:p> </o:p></span></i></p><p class=MsoNormal style='text-align:justify;line-height:15.0pt;mso-line-height-rule:exactly'><b><span style='font-size:12.0pt;font-family:"Arial","sans-serif"'>14.00 - 14.45 hrs.</span></b><span style='font-size:12.0pt;font-family:"Arial","sans-serif"'>     <b>Ludo Tolhuizen </b></span><span style='font-family:"Arial","sans-serif"'>(<i>Philips Research</i>),</span><span style='font-size:10.0pt;font-family:"Arial","sans-serif"'><o:p></o:p></span></p><p class=MsoPlainText><b><span style='font-size:12.0pt;font-family:"Arial","sans-serif"'>                                           </span></b><span style='font-size:12.0pt;font-family:"Arial","sans-serif"'>Towards fully collusion-resistant ID-based establishment of pairwise keys<span style='color:#1F497D'><br>                                                </span>(Abstract below)<o:p></o:p></span></p><p class=MsoNormal style='text-align:justify;line-height:15.0pt;mso-line-height-rule:exactly'><span style='font-size:12.0pt;font-family:"Arial","sans-serif"'><o:p> </o:p></span></p><p class=MsoNormal style='text-align:justify;line-height:15.0pt;mso-line-height-rule:exactly'><b><span style='font-size:12.0pt;font-family:"Arial","sans-serif"'>14.45 - 15.00 hrs.     </span></b><i><span style='font-size:12.0pt;font-family:"Arial","sans-serif"'>Coffee / tea break<o:p></o:p></span></i></p><p class=MsoNormal style='text-align:justify;line-height:15.0pt;mso-line-height-rule:exactly'><i><span style='font-size:12.0pt;font-family:"Arial","sans-serif"'><o:p> </o:p></span></i></p><p class=MsoNormal style='text-align:justify;line-height:15.0pt;mso-line-height-rule:exactly'><b><span style='font-size:12.0pt;font-family:"Arial","sans-serif"'>15.00 - 15.45 hrs.     Boris Skoriç </span></b><span style='font-family:"Arial","sans-serif"'>(<i>TU/e</i>)</span><span style='font-size:12.0pt;font-family:"Arial","sans-serif"'>,<o:p></o:p></span></p><p class=MsoPlainText style='margin-left:144.0pt'><span style='font-size:12.0pt;font-family:"Arial","sans-serif"'>Quantum PUFs: from silly joke to reality<o:p></o:p></span></p><div style='border:none;border-bottom:solid windowtext 1.0pt;padding:0cm 0cm 1.0pt 0cm'><p class=MsoNormal><span style='font-size:12.0pt;font-family:"Arial","sans-serif";color:#1F497D'><o:p> </o:p></span></p></div><p class=MsoNormal><span style='font-size:12.0pt;font-family:"Arial","sans-serif";color:#1F497D'><o:p> </o:p></span></p><p class=MsoNormal style='text-align:justify;line-height:15.0pt;mso-line-height-rule:exactly'><b><span style='font-family:"Arial","sans-serif"'><o:p> </o:p></span></b></p><p class=MsoNormal style='text-align:justify;line-height:15.0pt;mso-line-height-rule:exactly'><u><span style='font-size:10.0pt;font-family:"Arial","sans-serif"'>Abstract talk Jasper van Woudenberg, From space rays to laser beams: Fault injection in practice<o:p></o:p></span></u></p><p class=MsoNoSpacing><span style='font-size:9.0pt;font-family:"Arial","sans-serif"'>Fault injection attacks are moving into the realm of embedded systems: secure memory 'readers' that use glitching to bypass security mechanisms are commercially available, and more recently Xbox 360 code security was broken by glitching the processor's reset line. Fault injection attacks aim to change the behavior of a device; e.g. to bypass authentication or extract secret information. We explain the fundamentals of fault injection, covering their history, the tools used for their execution, Differential Fault Analysis and other attacks that we execute in practice.<o:p></o:p></span></p><p class=MsoNormal style='text-align:justify;line-height:15.0pt;mso-line-height-rule:exactly'><span style='font-size:9.0pt;font-family:"Arial","sans-serif"'><o:p> </o:p></span></p><p class=MsoNormal style='text-align:justify;line-height:15.0pt;mso-line-height-rule:exactly'><u><span style='font-size:10.0pt;font-family:"Arial","sans-serif"'>Abstract talk Ludo Tolhuizen, Towards fully collusion-resistant ID-based establishment of pairwise keys<o:p></o:p></span></u></p><p class=MsoPlainText><span style='font-size:9.0pt;font-family:"Arial","sans-serif"'>We discuss the problem of securely establishing a symmetric key to be applied in a symmetric key algorithm.  This classical problem is still relevant and of paramount importance both in existing computer networks and new large-scale ubiquitous systems comprising resource-constrained devices. Identity(ID)-based pairwise key agreement allows for the generation of a common key between two parties from secret keying material owned by the first party and the identity of the second one. However, existing methods, e.g., based on polynomials, are prone to collusion attacks.<o:p></o:p></span></p><p class=MsoPlainText><span style='font-size:9.0pt;font-family:"Arial","sans-serif"'>We discuss a new key establishment scheme aiming at fully collusion-resistant ID-based symmetric-key agreement. Our scheme, the HIMMO algorithm, relies on two design concepts: Hiding Information and Mixing Modular Operations. We show why attacks on ID-based symmetric key agreement from literature, as well as some other attacks, cannot be applied to HIMMO.  The simple logic of the HIMMO algorithm allows for very efficient implementations in terms of both speed and memory.<o:p></o:p></span></p><p class=MsoNormal style='text-align:justify;line-height:15.0pt;mso-line-height-rule:exactly'><u><span style='font-size:10.0pt;font-family:"Arial","sans-serif"'><br><br><o:p></o:p></span></u></p><p class=MsoNormal><span style='color:#1F497D'><o:p> </o:p></span></p><p class=MsoNormal style='text-align:justify;line-height:15.0pt;mso-line-height-rule:exactly'><span style='color:#1F497D'><o:p> </o:p></span></p></div></body></html>