设为首页加入收藏网站地图 ENGLISH 一网通办 书记校长信箱
通知信息
当前位置: 首页 >> 学术信息 >> 正文

关于举办刘哲教授学术报告的通知--2018西邮学术讲座第五十讲

发布时间:2018年06月25日

各部门、各单位:

应我校无线网络安全技术国家工程实验室邀请,南京航空航天大学刘哲教授将于626日来我校做信息安全主题学术报告,欢迎广大师生参加!具体安排如下:

报告时间:2018626日(星期二)10:0011:00

报告地点:通院大楼106

报告题目:FourQ-basedcryptography for high-performance and low-power applications

要:This work deals with the energy-efficient, high-speed andhigh-security implementation of elliptic curve scalar multiplication, ellipticcurve Diffie-Hellman (ECDH) key exchange and elliptic curve digital signatureson embedded devices using FourQ and incorporating strong countermeasures tothwart a wide variety of side-channel attacks. First, we set new speed recordsfor constant-time curve-based scalar multiplication, DH key exchange anddigital signatures at the 128-bit security level with implementations targeting8, 16 and 32-bit microcontrollers. For example, our software computes a staticECDH shared secret in 6.9 million cycles (or 0.86 seconds @8MHz) on a low-power8-bit AVR microcontroller which, compared to the fastest Curve25519 and genus-2Kummer implementations on the same platform, offers 2x and 1.4x speedups,respectively. Similarly, it computes the same operation in 496 thousand cycleson a 32-bit ARM Cortex-M4 microcontroller, achieving a factor-2.9 speedup whencompared to the fastest Curve25519 implementation targeting the same platform.A similar speed performance is observed in the case of digital signatures.Second, we engineer a set of side-channel countermeasures taking advantage ofFourQ's rich arithmetic and propose a secure implementation that offersprotection against a wide range of sophisticated side-channel attacks,including differential power analysis (DPA). Despite the use of strongcountermeasures, the experimental results show that our FourQ software is stillefficient enough to outperform implementations of Curve25519 that only protectagainst timing attacks. Finally, we perform a differential power analysisevaluation of our software running on an ARM Cortex-M4, and report that noleakage was detected with up to 10 million traces. These results demonstratethe potential of deploying FourQ on low-power applications such as protocolsfor the Internet of Things.

报告人简介:刘哲,南京航空航天大学计算机科学与技术学院教授,博士生导师,南京航空航天大学长空学者,中国密码学会青年工作委员会、密码芯片专委会委员。曾在法国巴黎高师信息安全组(ISG)和卢森堡大学安全与信任中心(SnT)和加拿大滑铁卢大学量子研究中心和应用密码研究中心从事博士后研究工作。201511月于卢森堡大学(Universityof Luxembourg)算法、密码与安全实验室获得博士学位。刘哲的博士毕业论文“LightweightPublic-Key Cryptography for Wireless Sensor Nodes”获得卢森堡国家基金委2016年评出的唯一杰出博士毕业论文奖(Outstanding Ph.D ThesisAwards),他也成为了该奖项第一位华人获得者,卢森堡国家基金委,卢森堡大学以及滑铁卢大学量子研究中心进行了专题报道;2017年获得ACM SIGSAC新星奖,和ACM中国新星奖提名奖。刘哲已经在国内外密码学术期刊和会议上发表学术论文70多篇,其中30多篇发表在安全类著名期刊和会议上,包括IEEE Transactions onComputers (IEEE TC), IEEE Transactions on Dependable and Secure Computing (IEEETDSC), IEEE Transactions on Information Forensics and Security (IEEE TIFS); ACMTransactions on Embedded Computing Systems (ACM TECS) IACR Conference on Cryptographic Hardware and Embedded Systems (CHES)Computers & Security, Science China (中国科学) 等。刘哲目前担任4个著名安全类期刊的编委,10几个期刊的客座编辑(包括IEEE Transactions onComputers, IEEE Transactions on Emerging Topics in Computing)以及30多个安全类国际会议的程序委员会委员。

特此通知。

                                            科研处 

         通信与信息工程学院

                                          2018625 

上一条:关于举办《如何构建“学生学为中心”的互动课堂》专题讲座的通知

下一条:关于举办辛小龙教授学术讲座的通知--2018西邮学术讲座第四十九讲

关闭页面

雁塔校区

电话:029-85383106

邮政编码:710061

雁塔校区地址:西安市长安南路563号

长安校区

电话:029-88166105

邮政编码:710121

长安校区地址:西安市长安区西长安街618号

关注我们
友情链接
版权所有:西安邮电大学 2011-2024 中国西安长安南路563号 陕ICP备05001585号-1