posted by user: pineapple_sweet || 4277 views || tracked by 4 users: [display]

CHES 2015 : Cryptographic Hardware and Embedded Systems

FacebookTwitterLinkedInGoogle


Conference Series : Cryptographic Hardware and Embedded Systems
 
Link: https://www.cryptoexperts.com/ches2015/cfp.html
 
When Sep 13, 2015 - Sep 16, 2015
Where Saint-Malo, France
Submission Deadline Mar 2, 2015
Notification Due May 18, 2015
Final Version Due Jun 15, 2015
 

Call For Papers

The annual CHES workshop highlights new results in the design and analysis of cryptographic hardware and soft- ware implementations. The workshop builds a valuable bridge between the research and cryptographic engineering communities and attracts participants from industry, academia, and government organizations. In addition to a single track of high-quality presentations, CHES 2015 will offer invited talks, tutorials, a poster session, and a rump session. All submitted papers will be reviewed by at least four Program Committee members and authors will be invited to submit brief rebuttals of the reviews before the final decisions are made. Topics suitable for CHES 2015 include, but are not limited to:

Cryptographic implementations
Hardware architectures
Cryptographic processors and co-processors
Hardware accelerators for security protocols (security processors, network processors, etc.)
True and pseudorandom number generators
Physical unclonable functions (PUFs)
Efficient software implementations
Attacks against implementations and countermeasures
Side-channel attacks and countermeasures
Fault attacks and countermeasures
Hardware tampering and tamper-resistance
Tools and methodologies
Computer aided cryptographic engineering
Verification methods and tools for secure design
Metrics for the security of embedded systems
Secure programming techniques
FPGA design security
Formal methods for secure hardware
Interactions between cryptographic theory and implementation issues
New and emerging cryptographic algorithms and protocols targeting embedded devices
Special-purpose hardware for cryptanalysis
Leakage resilient cryptography
Applications
Cryptography in wireless applications (mobile phones, WLANs, etc.)
Cryptography for pervasive computing (RFID, sensor networks, smart devices, etc.)
Hardware IP protection and anti-counterfeiting
Reconfigurable hardware for cryptography
Smart card processors, systems and applications
Security in commercial consumer applications (pay-TV, automotive, domotics, etc.)
Secure storage devices (memories, disks, etc.)
Technologies and hardware for content protection
Trusted computing platforms

Related Resources

DSA 2025   The 12th International Conference on Dependability Systems and Their Applications
IEEE ICITES 2025   IEEE--2025 5th International Conference on Intelligent Technology and Embedded Systems (ICITES 2025)
ICMSCE 2026   2026 8th International Conference on Mechatronics Systems and Control Engineering (ICMSCE 2026)-ESCI
ICMSCE--EI 2026   2026 8th International Conference on Mechatronics Systems and Control Engineering (ICMSCE 2026)-ESCI
ICCRT--EI 2026   2026 4th International Conference on Control and Robot Technology (ICCRT 2026)
IEEE ICCCAS 2026   2026 IEEE the 15th International Conference on Communications, Circuits, and Systems (ICCCAS 2026)
ICCCAS 2026   2026 IEEE the 15th International Conference on Communications, Circuits, and Systems (ICCCAS 2026)
ICIST--EI 2026   2026 The 5th International Conference on Intelligent Science and Technology (ICIST 2026)
Wccs 2026   World conference on complex systems
CCAI 2026   IEEE--2026 6th International Conference on Computer Communication and Artificial Intelligence (CCAI 2026)