SHARCS'07 - Special-purpose Hardware for Attacking Cryptographic Systems

SHARCS'07 is the third workshop dedicated to the challenging subject of special-purpose cryptanalytical devices. This field is still a very young one (at least outside government agencies). In addition to key search machines à la Deep Crack and COPACOBANA, we are in particular interested in exploring the interaction between cryptanalytical algorithms and computer hardware. Much work in this area remains to be done including, for instance, special purpose hardware crackers for:

In addition to algorithmic issues, it is also the workshop's goal to make advances in computer hardware issues such as:

There are three main objectives for SHARCS:

  1. to determine whether special purpose hardware poses a real threat for today's cryptographic algorithms,
  2. to determine reliable security estimations for today's algorithms (i.e., how long are RSA1024 or ECC160 "secure"), and
  3. to advance the knowledge in cryptanalysis in general.
Since this is an intrinsically interdisciplinary subject, it is hoped that the workshop can bring together researchers with different backgrounds for discussing and advancing this exciting field. At SHARCS, submitted contributions are presented together with invited talks from world leading experts.


The workshop will consist of invited presentations and contributed talks. We welcome submissions of extended abstracts. We would like to stress that we do not aim at receiving contributions on side channel attacks. Papers analyzing algorithms, hardware architectures, new technologies and costs of attacks using specialized hardware are very much welcomed. There will be no formal proceedings, but a handout with papers will be provided to all participants. (This approach avoids submissions to SHARCS from conflicting with submissions to forthcoming conferences with proceedings.)

Invited Speaker:

The following speakers have confirmed giving an invited talk:


The workshop is organized by the European Network of Excellence (ECRYPT). The workshop is an activity of ECRYPT's VAMPIRE - Virtual Application and Implementation Research Lab.

Workshop venue:

SHARCS'07 takes place in Vienna, Austria, September 09-10, 2007 in the Vienna Marriott Hotel. These days are right before CHES 2007 which is also held in Vienna in the same hotel. SHARCS'07 will start on noon on Sunday, September 9, and will run until Monday evening. The program of CHES 2007 will start on Tuesday morning.
For travel information please consult the corresponding page of the CHES workshop.

Call for papers:

There will be no formal proceedings, but a handout with abstracts will be provided to all participants. (This avoids submissions to SHARCS from conflicting with submissions to forthcoming conferences with proceedings).

Call for contributions:

Important dates:

July 06, 2007: submission of papers
July 29, 2007: notification of acceptance or rejection
August 19, 2007: revised version of accepted papers due
September 9-10, 2007: SHARCS workshop in Vienna

The submission should start with a title, a list of the authors together with their affiliations and a short abstract describing the content of the paper. This should be followed by an extended abstract of at least 3 and at most 20 pages including appendices. The authors of accepted papers must guarantee to present their paper at the workshop.

List of accepted papers for SHARCS'07

Program Committee:


For further information please contact


SHARCS is organized within ECRYPT - European Network of Excellence for Cryptology. We aknowledge the support by the European Commission under the IST program, IST-2002-507932.


HGI We acknowledge organizational support from the Horst Görtz Institute for IT-Security, Ruhr-Universität Bochum.
TUE We acknowledge organizational support from Coding theory & Cryptology group, Technische Universiteit Eindhoven.

Disclaimer: The information on this web site is provided as is, and no guarantee or warranty is given or implied that the information is fit for any particular purpose. The user thereof uses the information at its sole risk and liability.