The annual CHES conference highlights new results in the design and analysis of cryptographic hardware and soft- ware implementations. The workshop builds a valuable bridge between the research and cryptographic engineering communities and attracts participants from industry, academia, and government organizations. In addition to a single track of high-quality presentations, CHES 2017 will offer invited talks, tutorials, a poster session, and a rump session. Program committee members are allowed to submit one paper, and a second one if both submissions are co-authored. All submitted papers will be reviewed by at least four Program Committee members. Any Program Committee member submission will be reviewed by at least five Program Committee members. Program chairs are not allowed to submit. Authors will be invited to submit brief rebuttals of the reviews before the final decisions are made.
Topics suitable for CHES 2017 include, but are not limited to:
Cryptographic implementations
Hardware architectures
Cryptographic processors and co-processors
True and pseudorandom number generators
Physical unclonable functions (PUFs)
Efficient software implementations
Attacks against implementations and countermeasures
Side-channel attacks and countermeasures
Fault attacks and countermeasures
Hardware tampering and tamper-resistance
White-box cryptography and code obfuscation
Hardware and software reverse engineering
Tools and methodologies
Computer aided cryptographic engineering
Verification methods and tools for secure design
Metrics for the security of embedded systems
Secure programming techniques
FPGA design security
Formal methods for secure hardware
Interactions between cryptographic theory and implementation issues
New and emerging cryptographic algorithms and protocols targeting embedded devices
Special-purpose hardware for cryptanalysis
Leakage resilient cryptography
Applications
Cryptography and security for the Internet of Things (RFID, sensor networks, smart devices, smart meters, etc.)
Hardware IP protection and anti-counterfeiting
Reconfigurable hardware for cryptography
Smart card processors, systems and applications
Security for cyberphysical systems (home automation, medical implants, industrial control, etc.)
Automotive security
Secure storage devices (memories, disks, etc.)
Technologies and hardware for content protection
Trusted computing platforms
09月25日
2017
09月28日
2017
初稿截稿日期
初稿录用通知日期
终稿截稿日期
注册截止日期
留言