Conference Information
CHES 2022: International Conference on Cryptographic Hardware and Embedded Systems
https://ches.iacr.org/2022/
Submission Date:
2022-04-15
Notification Date:
2022-06-15
Conference Date:
2022-09-12
Location:
Beijing, China
Years:
24
CCF: b   CORE: a   QUALIS: a1   Viewed: 36526   Tracked: 53   Attend: 4

Call For Papers
Having been established in 1999, the Cryptographic Hardware and Embedded Systems (CHES) conference is the premier venue for research on both design and analysis of cryptographic hardware and software implementations. As an area conference of the International Association for Cryptologic Research (IACR), CHES bridges the cryptographic research and engineering communities, and attracts participants from academia, industry, government and beyond. CHES 2022 will take place in Beijing, China in September 2022. The conference website is accessible at https://ches.iacr.org/2022.

The scope of CHES is intentionally diverse, meaning we solicit submission of papers on topics including, but not limited to, the following (with new topics for CHES 2022 in boldface):
Cryptographic implementations:

    Hardware architectures
    Cryptographic processors and co-processors
    True and pseudorandom number generators
    Physical unclonable functions (PUFs)
    Efficient software implementations

Attacks against implementations, and countermeasures:

    Side-channel attacks and countermeasures
    Micro-architectural side-channel attacks
    Fault attacks and countermeasures
    Hardware tampering and tamper-resistance
    White-box cryptography and code obfuscation
    Hardware and software reverse engineering

Tools and methodologies:

    Formal methods for secure hardware and software
    Computer aided cryptographic engineering
    Verification methods and tools for secure design
    Domain-specific languages for cryptographic systems
    Metrics for the security of embedded systems
    Secure programming techniques
    FPGA design security

Interactions between cryptographic theory and implementation issues:

    Quantum cryptanalysis
    Algorithm subversion and subversion prevention
    New and emerging cryptographic algorithms and protocols targeting embedded devices
    Special-purpose hardware for cryptanalysis, including quantum circuits
    Leakage resilient cryptography

Applications:

    RISC-V security
    Trusted execution environments and trusted computing platforms
    Cryptography and security for the Internet of Things (RFID, sensor networks, smart devices, smart meters, etc.)
    Hardware IP protection and anti-counterfeiting
    Reconfigurable hardware for cryptography
    Smart card processors, systems, and applications
    Security for cyberphysical systems (home automation, medical implants, industrial control, etc.)
    Automotive security
    Secure storage devices (memories, disks, etc.)
    Technologies and hardware for content protection
Last updated by Dou Sun in 2022-01-26
Acceptance Ratio
YearSubmittedAcceptedAccepted(%)
20141273326%
20131322720.5%
20121203226.7%
20111193226.9%
20101083027.8%
20091482919.6%
20081072725.2%
2007993131.3%
20061123228.6%
20051083229.6%
20041253225.6%
20031113228.8%
20021013938.6%
Related Conferences
Recommendation