Workshop on Cryptographic Hardware and Embedded Systems (CHES) 2014 Busan

  • Conference Call
  • The Inter­na­tional Asso­ci­a­tion for Cryp­to­logic Research (IACR) is kindly invit­ing you to par­tic­i­pate in a Work­shop on Cryp­to­graphic Hard­ware and Embed­ded Sys­tems (CHES) held on Sep­tem­ber 23 – 26, 2014 in Busan, South Korea at the Par­adise Hotel Busan.

    The annual CHES work­shop high­lights new results in the design and analy­sis of cryp­to­graphic hard­ware and soft­ware imple­men­ta­tions. CHES pro­vides a valu­able con­nec­tion between the research and cryp­to­graphic engi­neer­ing com­mu­ni­ties and attracts par­tic­i­pants from indus­try, acad­e­mia, and gov­ern­ment organizations.

    As well as a sin­gle track of high-​quality pre­sen­ta­tions, CHES 2014 will offer invited talks, tuto­ri­als, a poster ses­sion, and a rump ses­sion. All sub­mit­ted papers will be reviewed by at least four Pro­gram Com­mit­tee mem­bers. Authors will be invited to sub­mit brief rebut­tals of the reviews before the final accep­tances are made.

    Work­shop Topics

    Top­ics suit­able for CHES 2014 include, but are not lim­ited to:

    Cryp­to­graphic implementations

    • Hard­ware architectures
    • Cryp­to­graphic proces­sors and co-​processors
    • Hard­ware accel­er­a­tors for secu­rity pro­to­cols (secu­rity proces­sors, net­work proces­sors, etc.)
    • True and pseudo­ran­dom num­ber generators
    • Phys­i­cal unclon­able func­tions (PUFs)
    • Effi­cient soft­ware implementations

    Attacks against imple­men­ta­tions and countermeasures

    • Side chan­nel attacks and countermeasures
    • Fault attacks and countermeasures
    • Hard­ware tam­per­ing and tamper-​resistance

    Inter­ac­tions between cryp­to­graphic the­ory and imple­men­ta­tion issues

    • New and emerg­ing cryp­to­graphic algo­rithms and pro­to­cols tar­get­ing embed­ded devices
    • Special-​purpose hard­ware for cryptanalysis
    • Leak­age resilient cryptography


    • Cryp­tog­ra­phy in wire­less appli­ca­tions (mobile phone, WLANs, etc.)
    • Cryp­tog­ra­phy for per­va­sive com­put­ing (RFID, sen­sor net­works, smart devices, etc.)
    • Hard­ware IP pro­tec­tion and anti-​counterfeiting
    • Recon­fig­urable hard­ware for cryptography
    • Smart card proces­sors, sys­tems and applications
    • Secu­rity in com­mer­cial con­sumer appli­ca­tions (pay-​TV, auto­mo­tive, domotics, etc.)
    • Secure stor­age devices (mem­o­ries, disks, etc.)
    • Tech­nolo­gies and hard­ware for con­tent protection
    • Trusted com­put­ing platforms

    Tools and methodologies

    • Com­puter aided cryp­to­graphic engineering
    • Ver­i­fi­ca­tion meth­ods and tools for secure design
    • Met­rics for the secu­rity of embed­ded systems
    • Secure pro­gram­ming techniques
    • FPGA design security
    • For­mal meth­ods for secure hardware

    Call for Posters

    Pro­pos­als for a poster pre­sen­ta­tion at CHES 2014 should be sub­mit­ted to the Poster Ses­sion Chair, Nele Mentens. Sub­mis­sions on top­ics of broad inter­est to the CHES com­mu­nity are wel­come. Poster sub­mis­sions must pro­vide the fol­low­ing infor­ma­tion as a single-​page pdf file:

    • Poster Title
    • Author list, indi­cat­ing a con­tact author (with name, affil­i­a­tion, phone and email address)
    • Abstract (up to 500 words)

    Accepted posters must be dis­played in stan­dard A0 for­mat and at least one author for each poster must be avail­able for dis­cus­sion dur­ing the Poster Ses­sion at CHES 2014.

    Work­shop Proceedings

    The pro­ceed­ings will be pub­lished in Springer Lec­ture Notes in Com­puter Sci­ence (LNCS) series in time for dis­tri­b­u­tion at the work­shop. Accepted papers should fol­low the LNCS default author instruc­tions (see file “typeinst.pdf”). In order to be included in the pro­ceed­ings, the authors of an accepted paper must guar­an­tee to present their con­tri­bu­tion at the workshop.

    Pro­gram Committee

    • O. Aci­içmez – Sam­sung Research Amer­ica, US
    • L. Batina – Rad­boud Uni­ver­sity Nijmegen, NL
    • D.J. Bern­stein – Uni­ver­sity of Illi­nois at Chicago, USA and Tech­nis­che Uni­ver­siteit Eind­hoven, NL
    • G. Bertoni – STMicroelectronics,IT
    • C. Clavier – Uni­ver­sity of Limo­ges, FR
    • J.-S. Coron – Uni­ver­sity of Lux­em­bourg, LU
    • E. De Mul­der – Cryp­tog­ra­phy Research, US
    • T. Eisen­barth – Worces­ter Poly­tech­nic Insti­tute, US
    • J. Fan – Nationz Tech­nolo­gies, CN
    • W. Fis­cher – Infi­neon Tech­nolo­gies, DE
    • P.-A. Fouque – Uni­ver­site Rennes 1 and Insti­tut Uni­ver­si­taire de France, FR
    • K. Gaj – George Mason Uni­ver­sity, USA
    • B. Gier­lichs – KU Leu­ven, BE
    • L. Goubin – Uni­ver­sity of Ver­sailles, FR
    • T. Güneysu – Ruhr Uni­ver­sity, DE
    • D.-G. Han – Kook­min Uni­ver­sity, KR
    • H. Hand­schuh – Cryp­to­graphic Research, US and and KU Leu­ven, BE
    • M. Hut­ter – Graz Uni­ver­sity of Tech­nol­ogy, AT
    • M. Joye – Tech­ni­color, FR
    • H. Kim – Busan National Uni­ver­sity, KR
    • I. Kizh­va­tov – Riscure, NL
    • F. Koe­une – Uni­ver­site Catholique de Lou­vain, BE
    • F. Koushan­far – ECE, Rice Uni­ver­sity, US
    • G. Lean­der – Ruhr-​Universität Bochum, DE
    • K. Lemke-​Rust – Bonn-​Rhein-​Sieg Uni­ver­sity of Applied Sci­ences, DE
    • S. Man­gard – Graz Uni­ver­sity of Tech­nol­ogy, AT
    • R. Maes – Intrinsic-​ID, NL
    • M. Med­wed – NXP Semi­con­duc­tors, AT
    • C. Paar – Ruhr-​Universität Bochum, DE
    • D. Page – Uni­ver­sity of Bris­tol, UK
    • E. Peeters – Texas Instru­ments, US
    • A. Poschmann – Nanyang Tech­no­log­i­cal Uni­ver­sity, SG
    • E. Prouff – ANSSI, FR
    • F. Regaz­zoni – ALaRI, Lugano, CH
    • M. Rivain – Cryp­to­Ex­perts, FR
    • M. Rob­shaw – Imp­inj, Inc., US
    • A.-R. Sadeghi – Tech­nis­che Uni­ver­sität Darmstadt/​CASED, DE
    • K. Sakiyama – Uni­ver­sity of Electro-​Communications, JP
    • A. Satoh – Uni­ver­sity of Electro-​Communications, JP
    • P. Schau­mont – Vir­ginia Tech, US
    • P. Schwabe – Rad­boud Uni­ver­sity Nijmegen, NL
    • D. Suzuki – Mit­subishi Elec­tric, JP
    • M. Tibouchi – NTT Secure Plat­form Lab­o­ra­to­ries, JP
    • I. Ver­bauwhede – KU Leu­ven, BE
    • B.-Y. Yang – Acad­e­mia Sinica, TW
    starting: ending: 26.09.2014 Location: , Category:


    Conference START 26.09.2014 END

    All deadlines have expired!

    This conference has no more open deadlines. There may be successive conferences coming up you may by interested in.

    Please check our conference list and search...

    Conference Facts

    Location , Address 1408-5, Joong-Dong, Haeundae-Gu Category Organiser More Info Conference Website

    Further interesting Conferences

    Currently we have no similar events listed. Please check our website regulary, subscribe to our RSS-Feed or follow us on twitter for new listings.