logo

11 أكتوبر - 15 أكتوبر 2026

الترتيب: A (CORE2023)Offline

Workshop on Cryptographic Hardware and Embedded Systems

آخر تحديث: 2 days ago
0.0 (0 التقييمات)
TürkiyeRuhr University Bochum (for TCHES journal

لا يوجد متابعون بعد.

نظرة عامة

CHES 2026, the premier venue for research on cryptographic hardware and embedded systems, will take place in Türkiye on October 11-15, 2026. It is organized by the International Association for Cryptologic Research (IACR). CHES has transitioned to an open-access journal/conference hybrid model.

الدعوة لتقديم الأوراق

CHES 2026: Call for Papers

The Cryptographic Hardware and Embedded Systems (CHES) conference, established in 1999, is the premier venue for research on both design and analysis of cryptographic hardware and software implementations. CHES 2026 will take place in Türkiye from October 11-15, 2026.

The conference website is accessible at https://ches.iacr.org/2026.

Scope

The scope of CHES is diverse, including (but not limited to) the following topics:

  • Cryptographic implementations:
    • Hardware architectures
    • Cryptographic processors and coprocessors
    • True and pseudorandom number generators
    • Physical unclonable functions (PUFs)
    • Efficient software implementation
    • SHARCS (Special-purpose HARdware for Cryptanalysis, quantum included)
  • Attacks against implementations, and countermeasures:
    • Remote, micro-architectural and physical side-channel attacks and countermeasures
    • Fault attacks and countermeasures
    • Hardware tampering and tamper-resistance
    • White-box cryptography and code obfuscation
    • Reverse engineering of hardware/software
    • Hardware trojans and countermeasures
  • Tools and methodologies:
    • Formal methods, techniques and tools for secure design and verification for hardware/software
    • Computer-aided cryptographic engineering
    • Domain-specific languages for cryptographic systems
    • Metrics for the security of embedded systems
    • FPGA design security
    • Physical assurance and analysis of embedded systems
    • New datasets for public use
    • Systematization of Knowledge (SoK)
  • Interactions between cryptographic theory and implementation issues:
    • Quantum cryptanalysis
    • Algorithm subversion and subversion prevention
    • New and emerging cryptographic algorithms and protocols targeting embedded devices
    • Theoretical hardware models that allow proofs
  • Applications:
    • RISC-V security
    • Trusted execution environments and trusted computing platforms
    • IP protection for hardware/software and technologies for anti-counterfeiting
    • Reconfigurable hardware for cryptography
    • Secure elements, security subsystems, and applications
    • Security for the Internet of Things and cyberphysical systems (RFID, sensor networks, smart meters, medical implants, smart devices for home automation, industrial control, automotive, etc.)
    • Secure storage devices (memories, disks, etc.)
    • Isolation and monitoring hardware for cyberresilience
    • Engineering of zero-knowledge proof systems
    • Privacy-preserving computing in practice (MPC, FHE)
    • Post-quantum security

Paper Submission

Author instructions for paper submission are on the submissions page.

TCHES Publication Model

CHES has transitioned to an open-access journal/conference hybrid model.

A comprehensive list of FAQs relating to the model can be found via the TCHES website at https://tches.iacr.org

In summary:

  • Submitted papers will undergo a journal-style review process, with accepted papers published by Ruhr University Bochum in an issue of the journal IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES). Since it has a Gold Open Access status, all papers published in TCHES are immediately and freely available.
  • The annual CHES conference consists of presentations for each paper published in the associated issues of TCHES, plus invited talks and a range of additional and social activities. All papers accepted for publication in TCHES between 15 July of year n − 1 and 15 July of year n will be presented at CHES of year n.

Important Dates

All submission deadlines are at 23:59:59 Anywhere on Earth (AoE).

Schedule for TCHES Volume 2026/1

  • Submission: 15 July 2025
  • Rebuttal period: 28–31 Aug. 2025
  • Notification: 15 Sept. 2025
  • Camera ready: 14 Oct. 2025

Schedule for TCHES Volume 2026/2

  • Submission: 15 Oct. 2025
  • Rebuttal period: 27–30 Nov. 2025
  • Notification: 15 Dec. 2025
  • Camera ready: 14 Jan. 2026

Schedule for TCHES Volume 2026/3

  • Submission: 15 Jan. 2026
  • Rebuttal period: 26 Feb.–1 Mar. 2026
  • Notification: 15 Mar. 2026
  • Camera ready: 14 April 2026

Schedule for TCHES Volume 2026/4

  • Submission: 15 April 2026
  • Rebuttal period: 28–31 May 2026
  • Notification: 15 June 2026
  • Camera ready: 14 July 2026

المواعيد الهامة

تواريخ المؤتمر

Conference Date

11 أكتوبر 202615 أكتوبر 2026

التقديم

(TCHES Volume 2026/1) Submission

15 يوليو 2025

(TCHES Volume 2026/2) Submission

15 أكتوبر 2025

(TCHES Volume 2026/3) Submission

15 يناير 2026

الإشعار

(TCHES Volume 2026/1) Notification

15 سبتمبر 2025

(TCHES Volume 2026/2) Notification

15 ديسمبر 2025

(TCHES Volume 2026/3) Notification

15 مارس 2026

النسخة النهائية

(TCHES Volume 2026/1) Camera ready

14 أكتوبر 2025

(TCHES Volume 2026/2) Camera ready

14 يناير 2026

(TCHES Volume 2026/3) Camera ready

14 أبريل 2026

تواريخ أخرى

(TCHES Volume 2026/1) Rebuttal period

28 أغسطس 202531 أغسطس 2025

(TCHES Volume 2026/2) Rebuttal period

27 نوفمبر 202530 نوفمبر 2025

(TCHES Volume 2026/3) Rebuttal period

26 فبراير 20261 مارس 2026

تصنيف المصدر

المصدر: CORE2023

الترتيب: A

مجال البحث: Cybersecurity and privacy

الخريطة

Loading feedback section...