AIHWS 2021 - 2nd workshop on Artificial Intelligence in Hardware Security (AIHWS)
Topics/Call fo Papers
In recent years, we have witnessed severe security incidences caused by buggy protocols or implementations of cryptographic algorithms: POODLE, DROWN, OpenSSL Heartbleed, etc. It is critical for practitioners and researchers to ensure the security of cryptographic hardware and software, which are essential for a wide range of systems, services, and applications.
The aim of the workshop is to provide an international forum of scientific research and development to explore the security issues in the implementation and deployment of cryptographic algorithms. We are interested in these main aspects: (1) vulnerabilities and defenses in the implementation of cryptographic algorithms; (2) vulnerabilities and defenses in the implementation of cryptographic protocols; (3) defective cryptographic algorithms and protocols deployed in the wild; (3) weak cryptographic keys and random numbers in the cryptographic implementation; (4) runtime cryptographic key attacks and protections; (5) fraudulent certificates and key management; and (6) other topics on secure cryptographic implementations. We solicitat submissions of original research papers on a wide range of topics, including but not limited to:
Secure implementations of crypto algorithms & protocols
Vulnerable implementations in the wild
Weak cryptographic keys
Cryptographic key attacks and defense
Side Channels
Cryptographic Hardware
Physical attacks and defense
Cryptography for Blockchain
Cryptography for IoT/CPS
Cryptography for the Cloud
Verification and evaluation tools
The aim of the workshop is to provide an international forum of scientific research and development to explore the security issues in the implementation and deployment of cryptographic algorithms. We are interested in these main aspects: (1) vulnerabilities and defenses in the implementation of cryptographic algorithms; (2) vulnerabilities and defenses in the implementation of cryptographic protocols; (3) defective cryptographic algorithms and protocols deployed in the wild; (3) weak cryptographic keys and random numbers in the cryptographic implementation; (4) runtime cryptographic key attacks and protections; (5) fraudulent certificates and key management; and (6) other topics on secure cryptographic implementations. We solicitat submissions of original research papers on a wide range of topics, including but not limited to:
Secure implementations of crypto algorithms & protocols
Vulnerable implementations in the wild
Weak cryptographic keys
Cryptographic key attacks and defense
Side Channels
Cryptographic Hardware
Physical attacks and defense
Cryptography for Blockchain
Cryptography for IoT/CPS
Cryptography for the Cloud
Verification and evaluation tools
Other CFPs
- Security in Machine Learning and its Applications (SiMLA 2021)
- 19th International Conference on Applied Cryptography and Network Security
- International Workshop on Security in Mobile Technologies
- 3rd Workshop on Parallel AI and Systems for the Edge
- Online International Conference on Education, Management and Social Sciences (ICEMS 2021)
Last modified: 2020-12-27 10:33:15