会议名称(中文): 2014 硬件加密和嵌入式系统研讨会 会议名称(英文): Workshop on Cryptographic Hardware and Embedded Systems 所属学科: 计算机系统结构与硬件,信息安全,电子工程 开始日期: 2014-09-23 结束日期: 2014-09-26 所在国家: 韩国 所在城市: 韩国 具体地点: Busan, Korea 主办单位: International Association for Cryptologic Research
[ 重要日期 ] 全文截稿日期: 2014-03-03 论文录用通知日期: 2014-05-26
[ 会务组联系方式 ]
E-MAIL: ches2014posterchair@iacr.org 会议网站: http://www.chesworkshop.org/ 会议背景介绍: The annual CHES workshop highlights new results in the design and analysis of cryptographic hardware and software implementations. CHES provides a valuable connection between the research and cryptographic engineering communities and attracts participants from industry, academia, and government organizations.
As well as a single track of high-quality presentations, CHES 2014 will offer invited talks, tutorials, a poster session, and a rump session. All submitted papers will be reviewed by at least four Program Committee members. Authors will be invited to submit brief rebuttals of the reviews before the final acceptances are made.
征文范围及要求: Topics suitable for CHES 2014 include, but are not limited to
Cryptographic implementations Hardware architectures Cryptographic processors and co-processors Hardware accelerators for security protocols (security processors, network processors, etc.) True and pseudorandom number generators Physical unclonable functions (PUFs) Efficient software implementations
Attacks against implementations and countermeasures Side channel attacks and countermeasures Fault attacks and countermeasures Hardware tampering and tamper-resistance
Tools and methodologies Computer aided cryptographic engineering Verification methods and tools for secure design Metrics for the security of embedded systems Secure programming techniques FPGA design security Formal methods for secure hardware
Interactions between cryptographic theory and implementation issues New and emerging cryptographic algorithms and protocols targeting embedded devices Special-purpose hardware for cryptanalysis Leakage resilient cryptography
Applications Cryptography in wireless applications (mobile phone, WLANs, etc.) Cryptography for pervasive computing (RFID, sensor networks, smart devices, etc.) Hardware IP protection and anti-counterfeiting Reconfigurable hardware for cryptography Smart card processors, systems and applications Security in commercial consumer applications (pay-TV, automotive, domotics, etc.) Secure storage devices (memories, disks, etc.) Technologies and hardware for content protection Trusted computing platforms
|