<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html>
<head>
<meta http-equiv="content-type" content="text/html;
charset=ISO-8859-15">
</head>
<body text="#000000" bgcolor="#ffffff">
<span class="Apple-style-span" style="border-collapse: separate;
color: rgb(0, 0, 0); font-family: 'Times New Roman'; font-size:
16px; font-style: normal; font-variant: normal; font-weight:
normal; letter-spacing: normal; line-height: normal; orphans: 2;
text-indent: 0px; text-transform: none; white-space: normal;
widows: 2; word-spacing: 0px;"><span class="Apple-style-span"
style="color: rgb(0, 53, 96);">
<div class="section"
id="improved-generic-algorithms-for-hard-knapsacks"
style="margin: 0px 16px 0px 0px; padding: 0px 0px 1.5em;
border-width: 0px; font-weight: inherit; font-style: inherit;
font-size: 12px; font-family: inherit; vertical-align:
baseline; display: inline; width: 572px; float: left;">
<h3><span class="Apple-style-span" style="border-collapse:
separate; color: rgb(0, 0, 0); font-weight: normal;
letter-spacing: normal; line-height: normal; orphans: 2;
text-indent: 0px; text-transform: none; white-space:
normal; widows: 2; word-spacing: 0px;"><span
class="Apple-style-span" style="color: rgb(0, 53, 96);">
</span></span></h3>
<h3><img src="cid:part1.03080005.06040904@ruhr-uni-bochum.de"
alt="HGI" width="116" align="right" height="106"><br>
</h3>
<big><big><big><small>Sehr geehrte Damen und Herren, <br>
<br>
<br>
im Rahmen des HGI-Kolloquiums organisiert vom
Lehrstuhl für Netz- und Datensicherheit (NDS), wird<br>
<br>
<big><u>Stefan Mangard</u></big></small><u><br>
<br>
</u><small>von <br>
<br>
Infineon<br>
<br>
auf Einladung des Lehrstuhls für Embedded Security
(EMSEC) am <br>
<br>
nächsten <u>Mittwoch, den 06. Juli 2011 um
14.30 Uhr s.t. in Raum ID 04/471<br>
<br>
</u>über folgendes Thema referieren:</small><br>
</big></big></big> <br>
<br>
<span class="Apple-style-span" style="border-collapse:
separate; color: rgb(0, 0, 0); font-family: 'Times New
Roman'; font-size: 16px; font-style: normal; font-variant:
normal; font-weight: normal; letter-spacing: normal;
line-height: normal; orphans: 2; text-indent: 0px;
text-transform: none; white-space: normal; widows: 2;
word-spacing: 0px;"><span class="Apple-style-span"
style="color: rgb(0, 53, 96); font-family: 'Helvetica
Neue',Arial,Helvetica,sans-serif; font-size: 12px;
line-height: 18px;">
<h1 style="margin: 0px; padding: 0.25em 0px 0.75em;
border-width: 0.125em 0px 0px; font-weight: bold;
font-style: inherit; font-size: 1.333em; font-family:
inherit; vertical-align: baseline; color: rgb(0, 53,
96); line-height: 1.125em; text-transform: uppercase;
border-top: 0.125em solid rgb(0, 53, 96); max-width:
572px;">THE CHALLENGE OF PROTECTING EMBEDDED
SYSTEMS AGAINST PHYSICAL ATTACKS</h1>
<p style="margin: 0px 0px 1.5em; padding: 0px;
border-width: 0px; font-weight: inherit; font-style:
inherit; font-size: 12px; font-family: inherit;
vertical-align: baseline; text-align: justify;">During
the last decades, embedded processors found their
way into all kinds of devices. Today, many
applications and even entire business models
critically rely on embedded hardware and
software. This leads to a strong need for security,
which is often addressed by implementing
cryptographic algorithms on the embedded
systems. However, it is important to understand
that cryptography relies on the secrecy of keys.
When cryptographic keys are stored and handled by an
embedded system, the keys can easily become a
target of so-called physical attacks. The b asic
idea of these attacks is to analyze and to
manipulate physical properties of the system in
order to reveal its key.</p>
<p style="margin: 0px 0px 1.5em; padding: 0px;
border-width: 0px; font-weight: inherit; font-style:
inherit; font-size: 12px; font-family: inherit;
vertical-align: baseline; text-align: justify;">The
protection against physical attacks in embedded
systems is a vivid research area and a crucial
topic for all developers of hardware and software
with strong security requirements. This talk
provides a brief introduction to physical
attacks and it sketches the most important
challenges for countermeasures. Based on
concrete examples it shows why security has a
significant impact on the entire development
process - from the design of a single logical gate
up to the software interface.<br>
</p>
</span></span>
<hr size="2" width="100%"><span class="Apple-style-span"
style="border-collapse: separate; color: rgb(0, 0, 0);
font-family: 'Times New Roman'; font-size: 16px; font-style:
normal; font-variant: normal; font-weight: normal;
letter-spacing: normal; line-height: normal; orphans: 2;
text-indent: 0px; text-transform: none; white-space: normal;
widows: 2; word-spacing: 0px;"><span
class="Apple-style-span" style="color: rgb(0, 53, 96);
font-family: 'Helvetica Neue',Arial,Helvetica,sans-serif;
font-size: 12px; line-height: 18px;">
<p style="margin: 0px 0px 1.5em; padding: 0px;
border-width: 0px; font-weight: inherit; font-style:
inherit; font-size: 12px; font-family: inherit;
vertical-align: baseline; text-align: justify;"><br>
</p>
</span></span></div>
</span></span><span class="Apple-style-span"
style="border-collapse: separate; color: rgb(0, 0, 0);
font-family: 'Times New Roman'; font-size: 16px; font-style:
normal; font-variant: normal; font-weight: normal; letter-spacing:
normal; line-height: normal; orphans: 2; text-indent: 0px;
text-transform: none; white-space: normal; widows: 2;
word-spacing: 0px;"><span class="Apple-style-span" style="color:
rgb(0, 53, 96);">
<div class="section"
id="cover-and-decomposition-index-calculus-on-elliptic-curves-made-practical"
style="margin: 0px 16px 0px 0px; padding: 0px 0px 1.5em;
border-width: 0px; font-weight: inherit; font-style: inherit;
font-size: 12px; font-family: inherit; vertical-align:
baseline; display: inline; width: 572px; float: left;"><span
class="Apple-style-span" style="border-collapse: separate;
color: rgb(0, 0, 0); font-weight: normal; letter-spacing:
normal; line-height: normal; orphans: 2; text-indent: 0px;
text-transform: none; white-space: normal; widows: 2;
word-spacing: 0px;"><span class="Apple-style-span"
style="color: rgb(0, 53, 96);"></span></span><span
class="Apple-style-span" style="border-collapse: separate;
color: rgb(0, 0, 0); font-weight: normal; letter-spacing:
normal; line-height: normal; orphans: 2; text-indent: 0px;
text-transform: none; white-space: normal; widows: 2;
word-spacing: 0px;"><span class="Apple-style-span"
style="color: rgb(0, 53, 96);"><big>Der Vortrag beginnt am
Donnerstag um 14.30 Uhr s.t. im ID 04/471.<br>
</big></span></span><br>
<span class="Apple-style-span" style="border-collapse:
separate; color: rgb(0, 0, 0); font-weight: normal;
letter-spacing: normal; line-height: normal; orphans: 2;
text-indent: 0px; text-transform: none; white-space: normal;
widows: 2; word-spacing: 0px;"><span
class="Apple-style-span" style="color: rgb(0, 53, 96);"><big>Zu
diesem und sämtlichen weiteren Vorträgen im Rahmen des
HGI-Kolloquiums sind alle Studierenden und
Interessierten herzlich eingeladen! Eine Voranmeldung
ist nicht erforderlich!</big></span></span>
<p><span class="Apple-style-span" style="border-collapse:
separate; color: rgb(0, 0, 0); font-weight: normal;
letter-spacing: normal; line-height: normal; orphans: 2;
text-indent: 0px; text-transform: none; white-space:
normal; widows: 2; word-spacing: 0px;"><span
class="Apple-style-span" style="color: rgb(0, 53, 96);"></span></span></p>
<span class="Apple-style-span" style="border-collapse:
separate; color: rgb(0, 0, 0); font-weight: normal;
letter-spacing: normal; line-height: normal; orphans: 2;
text-indent: 0px; text-transform: none; white-space: normal;
widows: 2; word-spacing: 0px;"><span
class="Apple-style-span" style="color: rgb(0, 53, 96);"><big>Weitere
Informationen gibt es auf folgender Webseite:<br>
<br>
<a
href="http://hgi.rub.de/hgi/hgi-seminar/aktuelles/">http://hgi.rub.de/hgi/hgi-seminar/aktuelles/</a></big><br>
</span></span><span class="Apple-style-span"
style="border-collapse: separate; color: rgb(0, 0, 0);
font-family: 'Times New Roman'; font-size: 16px; font-style:
normal; font-variant: normal; font-weight: normal;
letter-spacing: normal; line-height: normal; orphans: 2;
text-indent: 0px; text-transform: none; white-space: normal;
widows: 2; word-spacing: 0px;"><span
class="Apple-style-span" style="color: rgb(0, 53, 96);"></span></span><br>
<span class="Apple-style-span" style="border-collapse:
separate; color: rgb(0, 0, 0); font-weight: normal;
letter-spacing: normal; line-height: normal; orphans: 2;
text-indent: 0px; text-transform: none; white-space: normal;
widows: 2; word-spacing: 0px;"><span
class="Apple-style-span" style="color: rgb(0, 53, 96);"></span></span><br>
<big><big>Beste Grüße, <br>
Florian Kohlar</big></big><br>
<br>
</div>
</span></span><br>
<br>
<br>
<pre class="moz-signature" cols="72">--
Dipl.-Ing. Florian Kohlar
Lehrstuhl für Netz- und Datensicherheit
Ruhr Universität Bochum
-----------------------------------
Universitätsstr. 150, Geb. ID 2/457
D-44780 Bochum
Telefon: +49 (0) 234 / 32-26798
Fax: +49 (0) 234 / 32-14347
<a class="moz-txt-link-freetext" href="http://www.nds.rub.de">http://www.nds.rub.de</a>
</pre>
</body>
</html>