logo

11. Oktober - 15. Oktober 2026

Rang: A (CORE2023)Offline

Workshop on Cryptographic Hardware and Embedded Systems

Aktualisiert: about 1 month ago
3.3 (24 Bewertungen)
TürkiyeRuhr University Bochum (for TCHES journal

Noch keine Follower.

Übersicht

CHES 2026, the premier venue for research on cryptographic hardware and embedded systems, will take place in Türkiye on October 11-15, 2026. It is organized by the International Association for Cryptologic Research (IACR). CHES has transitioned to an open-access journal/conference hybrid model.

Call for Papers

CHES 2026: Call for Papers

The Cryptographic Hardware and Embedded Systems (CHES) conference, established in 1999, is the premier venue for research on both design and analysis of cryptographic hardware and software implementations. CHES 2026 will take place in Türkiye from October 11-15, 2026.

The conference website is accessible at https://ches.iacr.org/2026.

Scope

The scope of CHES is diverse, including (but not limited to) the following topics:

  • Cryptographic implementations:
    • Hardware architectures
    • Cryptographic processors and coprocessors
    • True and pseudorandom number generators
    • Physical unclonable functions (PUFs)
    • Efficient software implementation
    • SHARCS (Special-purpose HARdware for Cryptanalysis, quantum included)
  • Attacks against implementations, and countermeasures:
    • Remote, micro-architectural and physical side-channel attacks and countermeasures
    • Fault attacks and countermeasures
    • Hardware tampering and tamper-resistance
    • White-box cryptography and code obfuscation
    • Reverse engineering of hardware/software
    • Hardware trojans and countermeasures
  • Tools and methodologies:
    • Formal methods, techniques and tools for secure design and verification for hardware/software
    • Computer-aided cryptographic engineering
    • Domain-specific languages for cryptographic systems
    • Metrics for the security of embedded systems
    • FPGA design security
    • Physical assurance and analysis of embedded systems
    • New datasets for public use
    • Systematization of Knowledge (SoK)
  • Interactions between cryptographic theory and implementation issues:
    • Quantum cryptanalysis
    • Algorithm subversion and subversion prevention
    • New and emerging cryptographic algorithms and protocols targeting embedded devices
    • Theoretical hardware models that allow proofs
  • Applications:
    • RISC-V security
    • Trusted execution environments and trusted computing platforms
    • IP protection for hardware/software and technologies for anti-counterfeiting
    • Reconfigurable hardware for cryptography
    • Secure elements, security subsystems, and applications
    • Security for the Internet of Things and cyberphysical systems (RFID, sensor networks, smart meters, medical implants, smart devices for home automation, industrial control, automotive, etc.)
    • Secure storage devices (memories, disks, etc.)
    • Isolation and monitoring hardware for cyberresilience
    • Engineering of zero-knowledge proof systems
    • Privacy-preserving computing in practice (MPC, FHE)
    • Post-quantum security

Paper Submission

Author instructions for paper submission are on the submissions page.

TCHES Publication Model

CHES has transitioned to an open-access journal/conference hybrid model.

A comprehensive list of FAQs relating to the model can be found via the TCHES website at https://tches.iacr.org

In summary:

  • Submitted papers will undergo a journal-style review process, with accepted papers published by Ruhr University Bochum in an issue of the journal IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES). Since it has a Gold Open Access status, all papers published in TCHES are immediately and freely available.
  • The annual CHES conference consists of presentations for each paper published in the associated issues of TCHES, plus invited talks and a range of additional and social activities. All papers accepted for publication in TCHES between 15 July of year n − 1 and 15 July of year n will be presented at CHES of year n.

Important Dates

All submission deadlines are at 23:59:59 Anywhere on Earth (AoE).

Schedule for TCHES Volume 2026/1

  • Submission: 15 July 2025
  • Rebuttal period: 28–31 Aug. 2025
  • Notification: 15 Sept. 2025
  • Camera ready: 14 Oct. 2025

Schedule for TCHES Volume 2026/2

  • Submission: 15 Oct. 2025
  • Rebuttal period: 27–30 Nov. 2025
  • Notification: 15 Dec. 2025
  • Camera ready: 14 Jan. 2026

Schedule for TCHES Volume 2026/3

  • Submission: 15 Jan. 2026
  • Rebuttal period: 26 Feb.–1 Mar. 2026
  • Notification: 15 Mar. 2026
  • Camera ready: 14 April 2026

Schedule for TCHES Volume 2026/4

  • Submission: 15 April 2026
  • Rebuttal period: 28–31 May 2026
  • Notification: 15 June 2026
  • Camera ready: 14 July 2026

Wichtige Termine

Konferenzdaten

Conference Date

11. Oktober 202615. Oktober 2026

Einreichung

(TCHES Volume 2026/1) Submission

15. Juli 2025

(TCHES Volume 2026/2) Submission

15. Oktober 2025

(TCHES Volume 2026/3) Submission

15. Januar 2026

Benachrichtigung

(TCHES Volume 2026/1) Notification

15. September 2025

(TCHES Volume 2026/2) Notification

15. Dezember 2025

(TCHES Volume 2026/3) Notification

15. März 2026

Druckvorlage

(TCHES Volume 2026/1) Camera ready

14. Oktober 2025

(TCHES Volume 2026/2) Camera ready

14. Januar 2026

(TCHES Volume 2026/3) Camera ready

14. April 2026

Andere Termine

(TCHES Volume 2026/1) Rebuttal period

28. August 202531. August 2025

(TCHES Volume 2026/2) Rebuttal period

27. November 202530. November 2025

(TCHES Volume 2026/3) Rebuttal period

26. Februar 20261. März 2026

Quellenrang

Quelle: CORE2023

Rang: A

Forschungsgebiet: Cybersecurity and privacy

Karte

Loading feedback section...