Conferences In Information Security
Conference Name | Workshop on Cryptographic Hardware and Embedded Systems |
---|---|
Venue | Switzerland |
URL | http://www.chesworkshop.org/ |
Submission Deadline | 16-Mar-10 |
Conference Date | September 6, 2010 |
Sponsership/Publisher | |
Aim/Scope/Research Area |
The focus of this workshop is on all aspects of cryptographic hardware and security in embedded systems. The workshop is a forum for new results from the research community as well as from the industry and other interested parties. Of special interest are contributions that describe new methods for secure and efficient hardware implementations, and high-speed or leak-resistant software for embedded systems, e.g. smart cards, microprocessors, DSPs, etc. The workshop aims to bridge the gap between the cryptography research community and the application areas of cryptography. All submitted papers will be reviewed. During the last years, the number of participants of CHES has grown to more than 300, with attendees coming from industry, academia, and government organizations. CHES 2010 will be co-located with the 30th Annual International Cryptology Conference, CRYPTO 2010, in Santa Barbara, California, USA. This will provide unique interaction opportunities for the communities of both conferences. The topics of CHES 2010 include but are not limited to:
Cryptographic implementations * Hardware architectures for public-key and secret-key cryptographic algorithms * Cryptographic processors and co-processors * Hardware accelerators for security protocols (security processors, network processors, etc.) * True and pseudorandom number generators * Physically unclonable functions (PUFs) * Efficient software implementations of cryptography for embedded processors Attacks against implementations and countermeasures against these attacks * Side channel attacks and countermeasures * Fault attacks and countermeasures * Hardware tamper resistance * Hardware trojans Tools and methodologies * Computer aided cryptographic engineering * Verification methods and tools for secure design * Metrics for the security of embedded systems * Secure programming techniques Applications * Cryptography in wireless applications (mobile phone, WLANs, analysis of standards, etc.) * Cryptography for pervasive computing (RFID, sensor networks, smart devices, etc.) * FPGA design security * Hardware IP protection and anti-counterfeiting * Reconfigurable hardware for cryptography * Smart card processors, systems and applications * Security in commercial consumer applications (pay-TV, automotive, domotics, etc.) * Secure storage devices (memories, disks, etc.) * Technologies and hardware for content protection * Trusted computing platforms Interactions between cryptographic theory and implementation issues * New and emerging cryptographic algorithms and protocols targeting embedded devices * Non-classical cryptographic technologies * Special-purpose hardware for cryptanalysis * Formal methods for secure hardware |