logo

October 11 - October 15, 2026

Rank: A (CORE2023)Offline

Workshop on Cryptographic Hardware and Embedded Systems

Updated: about 1 month ago
3.3 (24 Ratings)
TurkeyIACR

No followers yet.

Topics:

Overview

The Workshop on Cryptographic Hardware and Embedded Systems (CHES) 2026 will be held in Turkey from October 11-15, 2026, organized by the International Association for Cryptologic Research (IACR). CHES is a premier venue for research on the design and analysis of cryptographic hardware and software implementations, bridging the cryptographic research and engineering communities.

Call for papers

CHES 2026: Call for Papers

CHES 2026 will take place in Turkey from October 11-15, 2026. The conference is organized by the International Association for Cryptologic Research (IACR).

CHES is the premier venue for research on both design and analysis of cryptographic hardware and software implementations, bridging the cryptographic research and engineering communities.

Call for Papers as PDF

Call for Papers as PDF

Paper Submission

Paper Submission

General Information

The scope of CHES is intentionally diverse. We solicit submissions of papers on topics including, but not limited to:

Cryptographic implementations:

  • Hardware architectures
  • Cryptographic processors and coprocessors
  • True and pseudorandom number generators
  • Physical unclonable functions (PUFs)
  • Efficient software implementation
  • SHARCS (Special-purpose HARdware for Cryptanalysis, quantum included)

Attacks against implementations, and countermeasures:

  • Remote, micro-architectural and physical side-channel attacks and countermeasures
  • Fault attacks and countermeasures
  • Hardware tampering and tamper-resistance
  • White-box cryptography and code obfuscation
  • Reverse engineering of hardware/software
  • Hardware trojans and countermeasures

Tools and methodologies:

  • Formal methods, techniques and tools for secure design and verification for hardware/software
  • Computer aided cryptographic engineering
  • Domain-specific languages for cryptographic systems
  • Metrics for the security of embedded systems
  • FPGA design security
  • Physical assurance and analysis of embedded systems
  • New datasets for public use
  • Systematization of Knowledge (SoK)

Interactions between cryptographic theory and implementation issues:

  • Quantum cryptanalysis
  • Algorithm subversion and subversion prevention
  • New and emerging cryptographic algorithms and protocols targeting embedded devices
  • Theoretical hardware models that allow proofs

Applications:

  • RISC-V security
  • Trusted execution environments and trusted computing platforms
  • IP protection for hardware/software and technologies for anti-counterfeiting
  • Reconfigurable hardware for cryptography
  • Secure elements, security subsystems, and applications
  • Security for the Internet of Things and cyberphysical systems (RFID, sensor networks, smart meters, medical implants, smart devices for home automation, industrial control, automotive, etc.)
  • Secure storage devices (memories, disks, etc.)
  • Isolation and monitoring hardware for cyberresilience
  • Engineering of zero-knowledge proof systems
  • Privacy-preserving computing in practice (MPC, FHE)
  • Post-quantum security

TCHES Publication Model

CHES has transitioned to an open-access journal/conference hybrid model.

  • Submitted papers will undergo a journal-style review process, with accepted papers published by Ruhr University Bochum in an issue of the journal IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES).
  • All papers published in TCHES are immediately and freely available due to its Gold Open Access status.
  • The annual CHES conference consists of presentations for each paper published in the associated issues of TCHES, plus invited talks and a range of additional and social activities.
  • All papers accepted for publication in TCHES between 15 July of year n − 1 and 15 July of year n will be presented at CHES of year n.

Important Dates (tentative)

*All submission deadlines are at 23:59:59 Anywhere on Earth (AoE).

Schedule for TCHES Volume 2026/1

  • Submission: July 15, 2025
  • Rebuttal period: August 28–31, 2025
  • Notification: September 15, 2025
  • Camera ready: October 14, 2025

Schedule for TCHES Volume 2026/2

  • Submission: October 15, 2025
  • Rebuttal period: November 27–30, 2025
  • Notification: December 15, 2025
  • Camera ready: January 14, 2026

Schedule for TCHES Volume 2026/3

  • Submission: January 15, 2026
  • Rebuttal period: February 26–March 1, 2026
  • Notification: March 15, 2026
  • Camera ready: April 14, 2026

Schedule for TCHES Volume 2026/4

  • Submission: April 15, 2026
  • Rebuttal period: May 28–31, 2026
  • Notification: June 15, 2026
  • Camera ready: July 14, 2026

Camera-ready deadline relates to (conditionally) accepted papers.

Paper Submission Instructions

Authors instructions for paper submission are on the submissions page.

  • Format: Papers must be written in English and be anonymous, with no author names, affiliations, acknowledgments, or any identifying citations. They should begin with a title, a short abstract, and a list of keywords.
  • Length: Up to 20 pages, including all figures, tables, and appendices, but excluding the bibliography. Appendices are also reviewed.
  • Long Papers: In exceptional cases, long papers of up to 40 pages may be allowed with pre-approval from the Editors-in-Chief.
  • SoK Papers: Systematization of Knowledge (SoK) papers are solicited. Authors should highlight SoK papers by annotating the title with "SoK:".
  • Submission Mode: Use the LaTeX style available at https://tches.iacr.org/index.php/TCHES/submission, noting that TCHES only accepts electronic submission in PDF format. Use the submission mode (\documentclass[submission]{iacrtrans}) that displays line numbers.

Regulations

  • Irregular Submissions: TCHES follows IACR policy regarding irregular submissions (e.g., parallel submission to another conference with proceedings), which will be instantly rejected.
  • Conflicts of Interest: TCHES follows IACR policy with respect to conflicts of interest that could prevent impartial review.
  • Transparency: Authors and reviewers must disclose to the chairs or editor any circumstances that they think may create bias.
  • Author Declaration: At the time of submission, authors are required to make a declaration regarding any conflicts of interest and guarantee they will deliver a presentation at the associated CHES conference if their submission is accepted.
  • Review Process: Each paper will be double-blind reviewed by at least three members of the TCHES editorial board. Authors are given the opportunity to submit a rebuttal.
  • Decision Types: Decisions can be outright accept, reject, minor revision (conditionally accepted, assigned a shepherd), or major revision (invited to submit a revision for a subsequent deadline).
  • Resubmissions: Resubmission of previously rejected papers requires major modifications and pre-approval by the Editors-in-Chief.

Contact

Program Co-Chairs

General Co-Chairs

  • TBA

Managing Editor

Important Dates

Conference Dates

Conference Date

October 11, 2026October 15, 2026

Submission

Schedule for TCHES Volume 2026/1 Submission

July 15, 2025

Schedule for TCHES Volume 2026/2 Submission

October 15, 2025

Schedule for TCHES Volume 2026/3 Submission

January 15, 2026

Notification

Schedule for TCHES Volume 2026/1 Notification

September 15, 2025

Schedule for TCHES Volume 2026/2 Notification

December 15, 2025

Schedule for TCHES Volume 2026/3 Notification

March 15, 2026

Camera-Ready

Schedule for TCHES Volume 2026/1 Camera ready

October 14, 2025

Schedule for TCHES Volume 2026/2 Camera ready

January 14, 2026

Schedule for TCHES Volume 2026/3 Camera ready

April 14, 2026

Other Dates

Schedule for TCHES Volume 2026/1 Rebuttal period

August 28, 2025August 31, 2025

Schedule for TCHES Volume 2026/2 Rebuttal period

November 27, 2025November 30, 2025

Schedule for TCHES Volume 2026/3 Rebuttal period

February 26, 2026March 1, 2026

Source Rank

Source: CORE2023

Rank: A

Field of Research: Cybersecurity and privacy, No longer used

Map

Loading feedback section...