Conference on Cryptographic Hardware and Embedded Systems
摘要截稿:
全文截稿: 2020-04-15
开会时间: 2020-09-14
会议难度:
CCF分类: B类
会议地点: Beijing, China
Overview
Having been established in 1999, the Cryptographic Hardware and Embedded Systems (CHES) conference is the premier venue for research on design and analysis of cryptographic hardware and software implementations. As an area conference of the International Association for Cryptologic Research (IACR), CHES bridges the cryptographic research and engineering communities, and attracts participants from academia, industry, government and beyond. CHES 2020 will take place in Beijing, China, September 14–17, 2020. The conference website is accessible at https://ches.iacr.org/2020.
The scope of CHES is intentionally diverse, meaning we solicit submission of papers on topics including, but not limited to, the following:
Cryptographic implementations:
Hardware architectures
Cryptographic processors and co-processors
True and pseudorandom number generators
Physical unclonable functions (PUFs)
Efficient software implementations
Attacks against implementations, and countermeasures:
Side-channel attacks and countermeasures
Fault attacks and countermeasures
Hardware tampering and tamper-resistance
White-box cryptography and code obfuscation
Hardware and software reverse engineering
Tools and methodologies:
Computer aided cryptographic engineering
Verification methods and tools for secure design
Metrics for the security of embedded systems
Secure programming techniques
FPGA design security
Formal methods for secure hardware and software
Interactions between cryptographic theory and implementation issues:
New and emerging cryptographic algorithms and protocols targeting embedded devices
Special-purpose hardware for cryptanalysis
Leakage resilient cryptography
Applications:
Cryptography and security for the Internet of Things (RFID, sensor networks, smart devices, smart meters, etc.)
Hardware IP protection and anti-counterfeiting
Reconfigurable hardware for cryptography
Smart card processors, systems and applications
Security for cyberphysical systems (home automation, medical implants, industrial control, etc.)
Automotive security
Secure storage devices (memories, disks, etc.)
Technologies and hardware for content protection
Trusted computing platforms