Conference Information
CHES 2020: International Conference on Cryptographic Hardware and Embedded Systems
https://ches.iacr.org/2020/
Submission Date:
2020-04-15
Notification Date:
2020-06-15
Conference Date:
2020-09-14
Location:
Beijing, China
Years:
22
CCF: b   CORE: a   QUALIS: a1   Viewed: 14563   Tracked: 31   Attend: 2

Conference Location
Call For Papers
Having been established in 1999, the Cryptographic Hardware and Embedded Systems (CHES) conference is the premier venue for research on design and analysis of cryptographic hardware and software implementations. As an area conference of the International Association for Cryptologic Research (IACR), CHES bridges the cryptographic research and engineering communities, and attracts participants from academia, industry, government and beyond. CHES 2020 will take place in Beijing, China, September 14–17, 2020. The conference website is accessible at https://ches.iacr.org/2020.

The scope of CHES is intentionally diverse, meaning we solicit submission of papers on topics including, but not limited to, the following:

Cryptographic implementations:
Hardware architectures
Cryptographic processors and co-processors
True and pseudorandom number generators
Physical unclonable functions (PUFs)
Efficient software implementations

Attacks against implementations, and countermeasures:
Side-channel attacks and countermeasures
Fault attacks and countermeasures
Hardware tampering and tamper-resistance
White-box cryptography and code obfuscation
Hardware and software reverse engineering

Tools and methodologies:
Computer aided cryptographic engineering
Verification methods and tools for secure design
Metrics for the security of embedded systems
Secure programming techniques
FPGA design security
Formal methods for secure hardware and software

Interactions between cryptographic theory and implementation issues:
New and emerging cryptographic algorithms and protocols targeting embedded devices
Special-purpose hardware for cryptanalysis
Leakage resilient cryptography

Applications:
Cryptography and security for the Internet of Things (RFID, sensor networks, smart devices, smart meters, etc.)
Hardware IP protection and anti-counterfeiting
Reconfigurable hardware for cryptography
Smart card processors, systems and applications
Security for cyberphysical systems (home automation, medical implants, industrial control, etc.)
Automotive security
Secure storage devices (memories, disks, etc.)
Technologies and hardware for content protection
Trusted computing platforms
Last updated by Dou Sun in 2019-10-14
Acceptance Ratio
YearSubmittedAcceptedAccepted(%)
20141273326%
20131322720.5%
20121203226.7%
20111193226.9%
20101083027.8%
20091482919.6%
20081072725.2%
2007993131.3%
20061123228.6%
20051083229.6%
20041253225.6%
20031113228.8%
20021013938.6%
Related Conferences
CCFCOREQUALISShortFull NameSubmissionNotificationConference
ICCMITInternational Conference on Communication, Management and Information Technology2018-12-312019-01-152019-03-26
ICERPInternational Conference on Environmental Research and Public Health2017-10-15 2017-10-20
b3AISCInternational Conference on Artificial Intelligence and Symbolic Computation 2010-04-192010-07-05
CoSIT'International Conference on Computer Science and Information Technology2019-11-232019-12-262020-01-25
cb1ANCSACM/IEEE Symposium on Architectures for Networking and Communications Systems2019-07-222019-08-092019-09-24
ICAR''International Conference on Availability and Reliability2017-11-202017-12-122017-12-17
cCT-RSAThe Cryptographer's Track at RSA Conference2017-10-012017-12-102018-04-16
ISARCSInternational ACM Sigsoft Symposium on Architecting Critical Systems 2013-02-202013-04-032013-06-17
Mobility IoTEAI International Conference on Mobility, IoT and Smart Cities2020-06-222020-08-032020-12-02
cICCC'International Conference on Communications in China2020-06-152020-07-052020-08-09
Recommendation