| |||||||||||||
CHES 2015 : Cryptographic Hardware and Embedded SystemsConference Series : Cryptographic Hardware and Embedded Systems | |||||||||||||
Link: https://www.cryptoexperts.com/ches2015/cfp.html | |||||||||||||
| |||||||||||||
Call For Papers | |||||||||||||
The annual CHES workshop highlights new results in the design and analysis of cryptographic hardware and soft- ware implementations. The workshop builds a valuable bridge between the research and cryptographic engineering communities and attracts participants from industry, academia, and government organizations. In addition to a single track of high-quality presentations, CHES 2015 will offer invited talks, tutorials, a poster session, and a rump session. All submitted papers will be reviewed by at least four Program Committee members and authors will be invited to submit brief rebuttals of the reviews before the final decisions are made. Topics suitable for CHES 2015 include, but are not limited to:
Cryptographic implementations Hardware architectures Cryptographic processors and co-processors Hardware accelerators for security protocols (security processors, network processors, etc.) True and pseudorandom number generators Physical unclonable functions (PUFs) Efficient software implementations Attacks against implementations and countermeasures Side-channel attacks and countermeasures Fault attacks and countermeasures Hardware tampering and tamper-resistance Tools and methodologies Computer aided cryptographic engineering Verification methods and tools for secure design Metrics for the security of embedded systems Secure programming techniques FPGA design security Formal methods for secure hardware Interactions between cryptographic theory and implementation issues New and emerging cryptographic algorithms and protocols targeting embedded devices Special-purpose hardware for cryptanalysis Leakage resilient cryptography Applications Cryptography in wireless applications (mobile phones, WLANs, etc.) Cryptography for pervasive computing (RFID, sensor networks, smart devices, etc.) Hardware IP protection and anti-counterfeiting Reconfigurable hardware for cryptography Smart card processors, systems and applications Security in commercial consumer applications (pay-TV, automotive, domotics, etc.) Secure storage devices (memories, disks, etc.) Technologies and hardware for content protection Trusted computing platforms |
|