(mobo import Concept___Events-migrated) |
(mobo import Concept___Events_With_Host_Organization-migrated) |
||
Line 5: | Line 5: | ||
|Homepage=https://ches.iacr.org/2021/ | |Homepage=https://ches.iacr.org/2021/ | ||
|Submitting link=https://tches.iacr.org/index.php/TCHES/submission | |Submitting link=https://tches.iacr.org/index.php/TCHES/submission | ||
− | |||
|has general chair=Benedikt Gierlichs | |has general chair=Benedikt Gierlichs | ||
|pageCreator=User:Curator 53 | |pageCreator=User:Curator 53 | ||
Line 21: | Line 20: | ||
}} | }} | ||
{{S Event}} | {{S Event}} | ||
+ | {{Organizer | ||
+ | |Organization=International Association for Cryptologic Research | ||
+ | |Contributor Type=organization | ||
+ | }} | ||
=== Topics === | === Topics === | ||
Cryptographic implementations: | Cryptographic implementations: |
Revision as of 16:43, 10 October 2022
Deadlines
|
||
Submission |
Venue
Warning: Venue is missing. The map might not show the exact location.
Topics
Cryptographic implementations:
- Hardware architectures
- Cryptographic processors and co-processors
- True and pseudorandom number generators
- Physical unclonable functions (PUFs)
- Efficient software implementations
Attacks against implementations, and countermeasures:
- Side-channel attacks and countermeasures
- Micro-architectural side-channel attacks
- Fault attacks and countermeasures
- Hardware tampering and tamper-resistance
- White-box cryptography and code obfuscation
- Hardware and software reverse engineering
Tools and methodologies:
- Computer-aided cryptographic engineering
- High-assurance crypto
- Verification methods and tools for secure design
- Domain-specific languages for cryptographic systems
- Metrics for the security of embedded systems
- Secure programming techniques
- FPGA design security
Interactions between cryptographic theory and implementation issues:
- New and emerging cryptographic algorithms and protocols targeting embedded devices
- Special-purpose hardware for cryptanalysis
- Leakage resilient cryptography
Applications:
- Cryptography and security for the Internet of Things (RFID, sensor networks, smart devices, smart meters, etc.)
- Hardware IP protection and anti-counterfeiting
- Reconfigurable hardware for cryptography
- Smartcard processors, systems and applications
- Security for cyberphysical systems (home automation, medical implants, industrial--control systems, etc.)
- Automotive security
- Secure storage devices (memories, disks, etc.)
- Technologies and hardware for content protection
- Trusted computing platforms
Submission deadlines for Transactions on CHES
Schedule for TCHES Volume 2021/1
- 15 July 2020 Submission deadline
- 17–21 August 2020 Rebuttal phase
- 15 September 2020 Notification
- 14 October 2020 Final version due
Schedule for TCHES Volume 2021/2
- 15 October 2020 Submission deadline
- 16–20 November 2020 Rebuttal phase
- 15 December 2020 Notification
- 14 January 2021 Final version due
Schedule for TCHES Volume 2021/3
- 15 January 2021 Submission deadline
- 15–19 February 2021 Rebuttal phase
- 15 March 2021 Notification
- 14 April 2021 Final version due
Schedule for TCHES Volume 2021/4
- 15 April 2021 Submission deadline
- 17–21 May 2021 Rebuttal phase
- 15 June 2021 Notification
- 14 July 2021 Final version due