SCI 2021 - 2nd ACNS Workshop on Secure Cryptographic Implementation (SCI)
Topics/Call fo Papers
In recent years, we have witnessed severe security incidences caused by buggy protocols or implementations of cryptographic algorithms: POODLE, DROWN, OpenSSL Heartbleed, etc. It is critical for practitioners and researchers to ensure the security of cryptographic hardware and software, which are essential for a wide range of systems, services, and applications.
The aim of the workshop is to provide an international forum of scientific research and development to explore the security issues in the implementation and deployment of cryptographic algorithms. We are interested in these main aspects: (1) vulnerabilities and defenses in the implementation of cryptographic algorithms; (2) vulnerabilities and defenses in the implementation of cryptographic protocols; (3) defective cryptographic algorithms and protocols deployed in the wild; (3) weak cryptographic keys and random numbers in the cryptographic implementation; (4) runtime cryptographic key attacks and protections; (5) fraudulent certificates and key management; and (6) other topics on secure cryptographic implementations. We solicitat submissions of original research papers on a wide range of topics, including but not limited to:
Secure implementations of crypto algorithms & protocols
Vulnerable implementations in the wild
Weak cryptographic keys
Cryptographic key attacks and defense
Side Channels
Cryptographic Hardware
Physical attacks and defense
Cryptography for Blockchain
Cryptography for IoT/CPS
Cryptography for the Cloud
Verification and evaluation tools
The aim of the workshop is to provide an international forum of scientific research and development to explore the security issues in the implementation and deployment of cryptographic algorithms. We are interested in these main aspects: (1) vulnerabilities and defenses in the implementation of cryptographic algorithms; (2) vulnerabilities and defenses in the implementation of cryptographic protocols; (3) defective cryptographic algorithms and protocols deployed in the wild; (3) weak cryptographic keys and random numbers in the cryptographic implementation; (4) runtime cryptographic key attacks and protections; (5) fraudulent certificates and key management; and (6) other topics on secure cryptographic implementations. We solicitat submissions of original research papers on a wide range of topics, including but not limited to:
Secure implementations of crypto algorithms & protocols
Vulnerable implementations in the wild
Weak cryptographic keys
Cryptographic key attacks and defense
Side Channels
Cryptographic Hardware
Physical attacks and defense
Cryptography for Blockchain
Cryptography for IoT/CPS
Cryptography for the Cloud
Verification and evaluation tools
Other CFPs
- 3rd Workshop on Cloud Security and Privacy (Cloud S&P)
- 1st ACNS Workshop on Critical Infrastructure and Manufacturing System Security (CIMSS)
- 3rd International Workshop on Artificial Intelligence and Industrial Internet-of-Things Security (AIoTS)
- 2nd workshop on Artificial Intelligence in Hardware Security (AIHWS)
- Security in Machine Learning and its Applications (SiMLA 2021)
Last modified: 2020-12-27 10:35:25