Project roles

The joint research will be carried out by four teams, who collaborate in this constellation the first time, but earlier bilateral collaborations ensure a smooth start, and based on the prior experiences we expect an efficient handling of the diverse tasks in this project. All involved teams have an extensive background in cryptology, and in their collaboration cover all project-specific competences, ranging from quantum cryptanalysis to soft- and hardware implementations and experimental work with side-channel attacks. During the last five years there has been intensive collaboration between the teams of Jean Monnet University and Slovak University of Technology in the field of side channel attacks. As one specific a example a joint project Cryptographic algorithms and primitives with increased resistance of side-channel attack can be mentioned [Gro10]. The co-director of the group in Israel collaborated with the co-director of the U.S. team repeatedly on the use of dedicated hardware in cryptanalysis [GSST05,GKST05].

The main share of the implementation work will be done at Tel Aviv University and at Jean Monnet University. The partners in Slovakia and the U.S. will carry the main workload on the theoretical analysis, but we do not expect a strict separation: it is expected that some experimental work is conducted in Slovakia and the U.S. as well and that theoretical contributions are also offered by the partners in France and Israel. The complementary measurement facilities in France and Israel  will enable the teams to proceed in parallel on performing the research on different schemes or platforms. Both groups have substantial experience with the implementation of cryptographic schemes, and the partners in Slovakia and the U.S.A. have an established track record in the theoretical analysis of cryptographic schemes aiming at a post-quantum setting. Having a theory-focused and an implementation-focused pair of project partners should also simplify the cross-checking of results—for a task as delicate as cryptographic system design we consider this good practice.

Assignment of tasks

:: Israel

Name Affiliation Position/Title % Time Task(s)
Dr. Eran Tromer School of Computer Science, Tel Aviv University, Tel Aviv 69978 Senior Lecturer 25 % PPD; technical coordination and management, kick-off meeting, visits to participating countries 
Prof. Avishai Wool School of Electrical Engineering,
Tel Aviv University, Tel Aviv 69978
Professor 15 % Cryptanalytic analysis and experimental design
Daniel Genkin School of Computer Science, Tel Aviv University, Tel Aviv 69978 PhD student 50 % Cryptanalytic analysis and measurement control
Itamar Pipman School of Computer Science, Tel Aviv University, Tel Aviv 69978 MSc student 25 % Hardware implementation and measurement control
Lev Pachmanov School of Computer Science, Tel Aviv University, Tel Aviv 69978 Research assistant 25 % Software implementation
Ezra Shaked School of Physics and Astronomy, Tel Aviv University, Tel Aviv 69978 Engineer 5 % Lab equipment construction and maintenance

 

:: Slovakia

Name Affiliation Position/Title % Time Task(s)
Prof. Otokar Grošek Slovak University of Technology, Institute of Computer Science and Mathematics, Ilkovicova 3, 812 19 Director 30 % NPD; technical and administration coordination, contact with end-users, plan, kick-off meeting implementation
Dr. Pavol Zajac Slovak University of Technology, Institute of Computer Science and Mathematics, Ilkovicova 3, 812 19 Assoc. Professor 30 %

Processing measured data, design of software implementation; Software for extracting secret data from experimental data

Dr. Michal Mikuš Slovak University of Technology, Institute of Computer Science and Mathematics, Ilkovicova 3, 812 19 Senior lecturer 30 % Processing measured data, design of software implementation
Eng. Marek Repka Slovak University of Technology, Institute of Computer Science and Mathematics, Ilkovicova 3, 812 19 PhD. student 60 %

Processing measured data, design of software implementation, preparation of test vectors, hardware implementation

Dr. Matúš Jókay Slovak University of Technology, Institute of Computer Science and Mathematics, Ilkovicova 3, 812 19 Senior lecturer 30 % Processing measured data, design of software implementation
Eng. Ondrej Gallo Slovak University of Technology, Institute of Computer Science and Mathematics, Ilkovicova 3, 812 19 Researcher 10 % Design of hardware implementation

 

:: France

Name Affiliation Position/Title % Time Task(s)
Prof. Viktor Fischer Hubert Curien Laboratory, Jean Monnet University, 18, rue Pr. Lauras, 42000 Professor 30 % Project Co-Director, help with technical and administration coordination; Configuration files; VHDL code and description of functions implemented in hardware  
Prof. Pierre – Louis Cayrel

Hubert Curien Laboratory, Jean Monnet University, 18, rue Pr. Lauras, 42000

Associate Professor 20 % The code and executable files of the software implementing selected algorithms and running on the PC, while calling functions implemented in hardware
Tania Richmond

Hubert Curien Laboratory, Jean Monnet University, 18, rue Pr. Lauras, 42000

PhD Student 60 % Software to perform side-channel attacks based on simulated leakage
Nathalie Bochard Hubert Curien Laboratory, Jean Monnet University, 18, rue Pr. Lauras, 42000 Engineer 20 % Aggregated data, traces for recommended parameter choice
Prof. Alain Aubert Hubert Curien Laboratory, Jean Monnet University, 18, rue Pr. Lauras, 42000 Assoc. Professor 20 % Hardware implementation of selected functions
Prof. Lilian Bossuet Hubert Curien Laboratory, Jean Monnet University, 18, rue Pr. Lauras, 42000 Assoc. Professor 10 % Evaluation of vulnerabilities to side-channel attacks against algorithms chosen in Step 2, based on simulated leakage

 

:: USA

Name Affiliation Position/Title % Time Task(s)
Dr. Rainer Steinwandt Department of Mathematical Sciences, Florida Atlantic University, 777 Glades Road, Boca Raton, FL 33431 Professor 20 %

Project Co-Director, help with technical and administration coordination, identification of methods which are able to withstand side-channel attacks

Dr. Spyros Magliveras Department of Mathematical Sciences, Florida Atlantic University, 777 Glades Road, Boca Raton, FL 33431 Professor 15 % Identification of suitable post-quantum cryptographic schemes, final conference with external participants
Brittanney Amento Department of Mathematical Sciences, Florida Atlantic University, 777 Glades Road, Boca Raton, FL 33431 Ph.D. student 50 % Realization of selected algorithms in software, identification of functionality