CHES 2012 - Workshop on Cryptographic Hardware and Embedded Systems
Topics/Call fo Papers
The topics of CHES include but are not limited to:
Cryptographic implementations
Hardware architectures for public-key and secret-key cryptographic algorithms
Cryptographic processors and co-processors
Hardware accelerators for security protocols (security processors, network processors, etc.)
True and pseudorandom number generators
Physically unclonable functions (PUFs)
Efficient software implementations of cryptography for embedded processors
Attacks against implementations and countermeasures against these attacks
Side channel attacks and countermeasures
Fault attacks and countermeasures
Hardware tamper resistance
Hardware trojans
Tools and methodologies
Computer aided cryptographic engineering
Verification methods and tools for secure design
Metrics for the security of embedded systems
Secure programming techniques
Applications
Cryptography in wireless applications (mobile phone, WLANs, analysis of standards, etc.)
Cryptography for pervasive computing (RFID, sensor networks, smart devices, etc.)
FPGA design security
Hardware IP protection and anti-counterfeiting
Reconfigurable hardware for cryptography
Smart card processors, systems and applications
Security in commercial consumer applications (pay-TV, automotive, domotics, etc.)
Secure storage devices (memories, disks, etc.)
Technologies and hardware for content protection
Trusted computing platforms
Interactions between cryptographic theory and implementation issues
New and emerging cryptographic algorithms and protocols targeting embedded devices
Non-classical cryptographic technologies
Special-purpose hardware for cryptanalysis
Formal methods for secure hardware
Cryptographic implementations
Hardware architectures for public-key and secret-key cryptographic algorithms
Cryptographic processors and co-processors
Hardware accelerators for security protocols (security processors, network processors, etc.)
True and pseudorandom number generators
Physically unclonable functions (PUFs)
Efficient software implementations of cryptography for embedded processors
Attacks against implementations and countermeasures against these attacks
Side channel attacks and countermeasures
Fault attacks and countermeasures
Hardware tamper resistance
Hardware trojans
Tools and methodologies
Computer aided cryptographic engineering
Verification methods and tools for secure design
Metrics for the security of embedded systems
Secure programming techniques
Applications
Cryptography in wireless applications (mobile phone, WLANs, analysis of standards, etc.)
Cryptography for pervasive computing (RFID, sensor networks, smart devices, etc.)
FPGA design security
Hardware IP protection and anti-counterfeiting
Reconfigurable hardware for cryptography
Smart card processors, systems and applications
Security in commercial consumer applications (pay-TV, automotive, domotics, etc.)
Secure storage devices (memories, disks, etc.)
Technologies and hardware for content protection
Trusted computing platforms
Interactions between cryptographic theory and implementation issues
New and emerging cryptographic algorithms and protocols targeting embedded devices
Non-classical cryptographic technologies
Special-purpose hardware for cryptanalysis
Formal methods for secure hardware
Other CFPs
- PhD Students Session on the Extraction and Management of Knowledge
- The 3rd International Maghrebian Conference on the Extraction and Management of Knowledge
- Workshop on Configuration
- Writing and Maintaining Quality Standard Operating Procedures (SOPs) to Guarantee FDA Compliance - Webinar By GlobalCompliancePanel
- Conducting Successful Product Complaint Investigations - Webinar By GlobalCompliancePanel
Last modified: 2012-02-24 22:42:39