Información de la conferencia
CHES 2024: International Conference on Cryptographic Hardware and Embedded Systems
https://ches.iacr.org/2024/
Día de Entrega:
2024-04-15
Fecha de Notificación:
2024-06-15
Fecha de Conferencia:
2024-09-04
Ubicación:
Halifax, Canada
Años:
26
CCF: b   CORE: a   QUALIS: a1   Vistas: 54527   Seguidores: 56   Asistentes: 4

Solicitud de Artículos
Having been established in 1999, the Cryptographic Hardware and Embedded Systems (CHES) conference is the premier venue for research on both design and analysis of cryptographic hardware and software implementations. As an area conference of the International Association for Cryptologic Research (IACR), CHES bridges the cryptographic research and engineering communities, and attracts participants from academia, industry, government and beyond. CHES 2024 will take place in Halifax, Canada in September 4-7, 2024. The conference website is accessible at
https://ches.iacr.org/2024

The scope of CHES is intentionally diverse, meaning we solicit submission of papers on topics including, but not limited to, the following:

Cryptographic implementations:

    Hardware architectures
    Cryptographic processors and coprocessors
    True and pseudorandom number generators
    Physical unclonable functions (PUFs)
    Efficient software implementation
    SHARCS (Special-purpose HARdware for Cryptanalysis, quantum included)

Attacks against implementations, and countermeasures:

    Remote, micro-architectural and physical side-channel attacks and countermeasures
    Fault attacks and countermeasures
    Hardware tampering and tamper-resistance
    White-box cryptography and code obfuscation
    Reverse engineering of hardware/software

Tools and methodologies:

    Formal methods, techniques and tools for secure design and verification for hardware/software
    Computer aided cryptographic engineering
    Domain-specific languages for cryptographic systems
    Metrics for the security of embedded systems
    FPGA design security

Systematization of Knowledge (SoK)

Interactions between cryptographic theory and implementation issues:

    Quantum cryptanalysis
    Algorithm subversion and subversion prevention
    New and emerging cryptographic algorithms and protocols targeting embedded devices
    Theoretical hardware models that allow proofs

Applications:

    RISC-V security
    Trusted execution environments and trusted computing platforms
    IP protection for hardware/software and technologies for anti-counterfeiting
    Reconfigurable hardware for cryptography
    Secure elements, security subsystems, and applications
    Security for the Internet of Things and cyberphysical systems (RFID, sensor networks, smart meters, medical implants, smart devices for home automation, industrial control, automotive, etc.)
    Secure storage devices (memories, disks, etc.)
    Isolation and monitoring hardware for cyberresilience
    Engineering of zero-knowledge proof systems
    Privacy-preserving computing in practice (MPC, FHE)
Última Actualización Por Dou Sun en 2024-02-10
Coeficiente de Aceptación
AñoEnviadosAceptadosAceptados(%)
20141273326%
20131322720.5%
20121203226.7%
20111193226.9%
20101083027.8%
20091482919.6%
20081072725.2%
2007993131.3%
20061123228.6%
20051083229.6%
20041253225.6%
20031113228.8%
20021013938.6%
Conferencias Relacionadas
CCFCOREQUALISAbreviaciónNombre CompletoEntregaNotificaciónConferencia
ICCMITInternational Conference on Communication, Management and Information Technology2018-12-312019-01-152019-03-26
ICERPInternational Conference on Environmental Research and Public Health2017-10-15 2017-10-20
ArITInternational Conference on Advances in Artificial Intelligence Techniques2023-06-032023-06-122023-06-17
b3AISCInternational Conference on Artificial Intelligence and Symbolic Computation 2010-04-192010-07-05
CCNETInternational Conference on Computer Networks & Communications2023-02-112023-02-182023-02-25
CoSIT'International Conference on Computer Science and Information Technology2023-05-062023-05-172023-05-20
cb1ANCSACM/IEEE Symposium on Architectures for Networking and Communications Systems2021-09-292021-11-152021-12-13
ICAR''International Conference on Availability and Reliability2017-11-202017-12-122017-12-17
cCT-RSAThe Cryptographer's Track at RSA Conference2024-10-152025-01-102025-04-28
ISARCSInternational ACM Sigsoft Symposium on Architecting Critical Systems 2013-02-202013-04-032013-06-17
Revistas Relacionadas
CCFNombre CompletoFactor de ImpactoEditorISSN
cPeer-to-Peer Networking and Applications3.300Springer1936-6442
bComputers & Security4.800Elsevier0167-4048
Journal of Complex AnalysisHindawi2314-4963
Sensing and Bio-Sensing Research5.400Elsevier2214-1804
International Journal in Foundations of Computer Science & Technology AIRCC1839-7662
Journal of Construction EngineeringHindawi2356-7295
Advances in Fuzzy Systems1.400Hindawi1687-7101
Computer Communication Review ACM0146-4833
AI & SOCIETY2.900Springer0951-5666
cDistributed Computing1.300Springer0178-2770
Recomendaciones