会议信息
CHES 2026 : International Conference on Cryptographic Hardware and Embedded System
https://ches.iacr.org/2026/
会议地点:
通知日期:
截稿日期:
会议日期:
领域:
届数:
Turkiye,Turkiye
2026-06-15
2026-04-15
2026-10-11
网络与信息安全
28
CE:B    CCF:B    CORE:A   QUALIS:A1
征稿信息
General Information Having been established in 1999, the Cryptographic Hardware and Embedded Systems (CHES) conference is the premier venue for research on both design and analysis of cryptographic hardware and software implementations. As an area conference of the International Association for Cryptologic Research (IACR), CHES bridges the cryptographic research and engineering communities, and attracts participants from academia, industry, government and beyond. CHES 2026 will take place in Türkiye in October 11-15, 2026. The conference website is accessible at https://ches.iacr.org/2026 The scope of CHES is intentionally diverse, meaning we solicit submission of papers on topics including, but not limited to, the following (with new topics for CHES 2026 highlighted in bold blue): Cryptographic implementations: Hardware architectures Cryptographic processors and coprocessors True and pseudorandom number generators Physical unclonable functions (PUFs) Efficient software implementation SHARCS (Special-purpose HARdware for Cryptanalysis, quantum included) Attacks against implementations, and countermeasures: Remote, micro-architectural and physical side-channel attacks and countermeasures Fault attacks and countermeasures Hardware tampering and tamper-resistance White-box cryptography and code obfuscation Reverse engineering of hardware/software Hardware trojans and countermeasures Tools and methodologies: Formal methods, techniques and tools for secure design and verification for hardware/software Computer aided cryptographic engineering Domain-specific languages for cryptographic systems Metrics for the security of embedded systems FPGA design security Physical assurance and analysis of embedded systems New datasets for public use Systematization of Knowledge (SoK) Interactions between cryptographic theory and implementation issues: Quantum cryptanalysis Algorithm subversion and subversion prevention New and emerging cryptographic algorithms and protocols targeting embedded devices Theoretical hardware models that allow proofs Applications: RISC-V security Trusted execution environments and trusted computing platforms IP protection for hardware/software and technologies for anti-counterfeiting Reconfigurable hardware for cryptography Secure elements, security subsystems, and applications Security for the Internet of Things and cyberphysical systems (RFID, sensor networks, smart meters, medical implants, smart devices for home automation, industrial control, automotive, etc.) Secure storage devices (memories, disks, etc.) Isolation and monitoring hardware for cyberresilience Engineering of zero-knowledge proof systems Privacy-preserving computing in practice (MPC, FHE) Post-quantum security
关键词:
关于会议之眼
致力于为广大用户提供面向计算机领域的最新会议动态和学术热点。 会议之眼倡导社会奉献与公益性,力求建立公平、公正、科学的国际/国内会议评价体系,为大家提供更全面的、更富有学术价值的参考。
联系我们
邮箱
公众号
小程序
微信