logo

11 أكتوبر - 15 أكتوبر 2026

الترتيب: A (CORE2023)Offline

Workshop on Cryptographic Hardware and Embedded Systems

آخر تحديث: about 2 months ago
3.3 (24 التقييمات)
TurkeyIACR

لا يوجد متابعون بعد.

المواضيع:

نظرة عامة

The Workshop on Cryptographic Hardware and Embedded Systems (CHES) 2026 will be held in Turkey from October 11-15, 2026, organized by the International Association for Cryptologic Research (IACR). CHES is a premier venue for research on the design and analysis of cryptographic hardware and software implementations, bridging the cryptographic research and engineering communities.

الدعوة لتقديم الأوراق

CHES 2026: Call for Papers

CHES 2026 will take place in Turkey from October 11-15, 2026. The conference is organized by the International Association for Cryptologic Research (IACR).

CHES is the premier venue for research on both design and analysis of cryptographic hardware and software implementations, bridging the cryptographic research and engineering communities.

Call for Papers as PDF

Call for Papers as PDF

Paper Submission

Paper Submission

General Information

The scope of CHES is intentionally diverse. We solicit submissions of papers on topics including, but not limited to:

Cryptographic implementations:

  • Hardware architectures
  • Cryptographic processors and coprocessors
  • True and pseudorandom number generators
  • Physical unclonable functions (PUFs)
  • Efficient software implementation
  • SHARCS (Special-purpose HARdware for Cryptanalysis, quantum included)

Attacks against implementations, and countermeasures:

  • Remote, micro-architectural and physical side-channel attacks and countermeasures
  • Fault attacks and countermeasures
  • Hardware tampering and tamper-resistance
  • White-box cryptography and code obfuscation
  • Reverse engineering of hardware/software
  • Hardware trojans and countermeasures

Tools and methodologies:

  • Formal methods, techniques and tools for secure design and verification for hardware/software
  • Computer aided cryptographic engineering
  • Domain-specific languages for cryptographic systems
  • Metrics for the security of embedded systems
  • FPGA design security
  • Physical assurance and analysis of embedded systems
  • New datasets for public use
  • Systematization of Knowledge (SoK)

Interactions between cryptographic theory and implementation issues:

  • Quantum cryptanalysis
  • Algorithm subversion and subversion prevention
  • New and emerging cryptographic algorithms and protocols targeting embedded devices
  • Theoretical hardware models that allow proofs

Applications:

  • RISC-V security
  • Trusted execution environments and trusted computing platforms
  • IP protection for hardware/software and technologies for anti-counterfeiting
  • Reconfigurable hardware for cryptography
  • Secure elements, security subsystems, and applications
  • Security for the Internet of Things and cyberphysical systems (RFID, sensor networks, smart meters, medical implants, smart devices for home automation, industrial control, automotive, etc.)
  • Secure storage devices (memories, disks, etc.)
  • Isolation and monitoring hardware for cyberresilience
  • Engineering of zero-knowledge proof systems
  • Privacy-preserving computing in practice (MPC, FHE)
  • Post-quantum security

TCHES Publication Model

CHES has transitioned to an open-access journal/conference hybrid model.

  • Submitted papers will undergo a journal-style review process, with accepted papers published by Ruhr University Bochum in an issue of the journal IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES).
  • All papers published in TCHES are immediately and freely available due to its Gold Open Access status.
  • The annual CHES conference consists of presentations for each paper published in the associated issues of TCHES, plus invited talks and a range of additional and social activities.
  • All papers accepted for publication in TCHES between 15 July of year n − 1 and 15 July of year n will be presented at CHES of year n.

Important Dates (tentative)

*All submission deadlines are at 23:59:59 Anywhere on Earth (AoE).

Schedule for TCHES Volume 2026/1

  • Submission: July 15, 2025
  • Rebuttal period: August 28–31, 2025
  • Notification: September 15, 2025
  • Camera ready: October 14, 2025

Schedule for TCHES Volume 2026/2

  • Submission: October 15, 2025
  • Rebuttal period: November 27–30, 2025
  • Notification: December 15, 2025
  • Camera ready: January 14, 2026

Schedule for TCHES Volume 2026/3

  • Submission: January 15, 2026
  • Rebuttal period: February 26–March 1, 2026
  • Notification: March 15, 2026
  • Camera ready: April 14, 2026

Schedule for TCHES Volume 2026/4

  • Submission: April 15, 2026
  • Rebuttal period: May 28–31, 2026
  • Notification: June 15, 2026
  • Camera ready: July 14, 2026

Camera-ready deadline relates to (conditionally) accepted papers.

Paper Submission Instructions

Authors instructions for paper submission are on the submissions page.

  • Format: Papers must be written in English and be anonymous, with no author names, affiliations, acknowledgments, or any identifying citations. They should begin with a title, a short abstract, and a list of keywords.
  • Length: Up to 20 pages, including all figures, tables, and appendices, but excluding the bibliography. Appendices are also reviewed.
  • Long Papers: In exceptional cases, long papers of up to 40 pages may be allowed with pre-approval from the Editors-in-Chief.
  • SoK Papers: Systematization of Knowledge (SoK) papers are solicited. Authors should highlight SoK papers by annotating the title with "SoK:".
  • Submission Mode: Use the LaTeX style available at https://tches.iacr.org/index.php/TCHES/submission, noting that TCHES only accepts electronic submission in PDF format. Use the submission mode (\documentclass[submission]{iacrtrans}) that displays line numbers.

Regulations

  • Irregular Submissions: TCHES follows IACR policy regarding irregular submissions (e.g., parallel submission to another conference with proceedings), which will be instantly rejected.
  • Conflicts of Interest: TCHES follows IACR policy with respect to conflicts of interest that could prevent impartial review.
  • Transparency: Authors and reviewers must disclose to the chairs or editor any circumstances that they think may create bias.
  • Author Declaration: At the time of submission, authors are required to make a declaration regarding any conflicts of interest and guarantee they will deliver a presentation at the associated CHES conference if their submission is accepted.
  • Review Process: Each paper will be double-blind reviewed by at least three members of the TCHES editorial board. Authors are given the opportunity to submit a rebuttal.
  • Decision Types: Decisions can be outright accept, reject, minor revision (conditionally accepted, assigned a shepherd), or major revision (invited to submit a revision for a subsequent deadline).
  • Resubmissions: Resubmission of previously rejected papers requires major modifications and pre-approval by the Editors-in-Chief.

Contact

Program Co-Chairs

General Co-Chairs

  • TBA

Managing Editor

المواعيد الهامة

تواريخ المؤتمر

Conference Date

11 أكتوبر 202615 أكتوبر 2026

التقديم

Schedule for TCHES Volume 2026/1 Submission

15 يوليو 2025

Schedule for TCHES Volume 2026/2 Submission

15 أكتوبر 2025

Schedule for TCHES Volume 2026/3 Submission

15 يناير 2026

الإشعار

Schedule for TCHES Volume 2026/1 Notification

15 سبتمبر 2025

Schedule for TCHES Volume 2026/2 Notification

15 ديسمبر 2025

Schedule for TCHES Volume 2026/3 Notification

15 مارس 2026

النسخة النهائية

Schedule for TCHES Volume 2026/1 Camera ready

14 أكتوبر 2025

Schedule for TCHES Volume 2026/2 Camera ready

14 يناير 2026

Schedule for TCHES Volume 2026/3 Camera ready

14 أبريل 2026

تواريخ أخرى

Schedule for TCHES Volume 2026/1 Rebuttal period

28 أغسطس 202531 أغسطس 2025

Schedule for TCHES Volume 2026/2 Rebuttal period

27 نوفمبر 202530 نوفمبر 2025

Schedule for TCHES Volume 2026/3 Rebuttal period

26 فبراير 20261 مارس 2026

تصنيف المصدر

المصدر: CORE2023

الترتيب: A

مجال البحث: Cybersecurity and privacy, لم يعد مستخدمًا

الخريطة

Loading feedback section...