会议名称(中文):2014 硬件加密和嵌入式系统研讨会 会议名称(英文):Workshop on Cryptographic Hardware and Embedded Systems 所属学科:通信技术 开始日期:2014-09-23 结束日期:2014-09-26 所在国家:韩国 所在城市:韩国 具体地点:Busan, Korea 主办单位:International Association for Cryptologic Research 协办单位: 承办单位: 议题:
[ 组织结构 ] 会议主席: 组织委员会主席: 程序委员会主席: 会议嘉宾: 姓名 职务 简介 演讲题目
[ 重要日期 ] 全文截稿日期: 2014-03-03 论文录用通知日期:2014-05-26
[ 会务组联系方式 ] 联系人: 联系电话: 传真: E-MAIL:ches2014posterchair@iacr.org 通讯地址: 邮政编码: 会议注册费: 会议网站:http://www.chesworkshop.org/ 会议背景介绍: The annual CHES workshop highlights new results in the design and analysis of cryptographic hardware and software implementations. CHES provides a valuable connection between the research and cryptographic engineering communities and attracts participants from industry, academia, and government organizations.
As well as a single track of high-quality presentations, CHES 2014 will offer invited talks, tutorials, a poster session, and a rump session. All submitted papers will be reviewed by at least four Program Committee members. Authors will be invited to submit brief rebuttals of the reviews before the final acceptances are made. 征文范围及要求: Topics suitable for CHES 2014 include, but are not limited to
Cryptographic implementations Hardware architectures Cryptographic processors and co-processors Hardware accelerators for security protocols (security processors, network processors, etc.) True and pseudorandom number generators Physical unclonable functions (PUFs) Efficient software implementations
Attacks against implementations and countermeasures Side channel attacks and countermeasures Fault attacks and countermeasures Hardware tampering and tamper-resistance
Tools and methodologies Computer aided cryptographic engineering Verification methods and tools for secure design Metrics for the security of embedded systems Secure programming techniques FPGA design security Formal methods for secure hardware
Interactions between cryptographic theory and implementation issues New and emerging cryptographic algorithms and protocols targeting embedded devices Special-purpose hardware for cryptanalysis Leakage resilient cryptography
Applications Cryptography in wireless applications (mobile phone, WLANs, etc.) Cryptography for pervasive computing (RFID, sensor networks, smart devices, etc.) Hardware IP protection and anti-counterfeiting Reconfigurable hardware for cryptography Smart card processors, systems and applications Security in commercial consumer applications (pay-TV, automotive, domotics, etc.) Secure storage devices (memories, disks, etc.) Technologies and hardware for content protection Trusted computing platforms |