logo

11 octobre - 15 octobre 2026

Classement: A (CORE2023)Offline

Workshop on Cryptographic Hardware and Embedded Systems

Mis à jour le : 2 days ago
0.0 (0 Évaluations)
TürkiyeRuhr University Bochum (for TCHES journal

Aucun abonné pour le moment.

Aperçu

CHES 2026, the premier venue for research on cryptographic hardware and embedded systems, will take place in Türkiye on October 11-15, 2026. It is organized by the International Association for Cryptologic Research (IACR). CHES has transitioned to an open-access journal/conference hybrid model.

Appel à communications

CHES 2026: Call for Papers

The Cryptographic Hardware and Embedded Systems (CHES) conference, established in 1999, is the premier venue for research on both design and analysis of cryptographic hardware and software implementations. CHES 2026 will take place in Türkiye from October 11-15, 2026.

The conference website is accessible at https://ches.iacr.org/2026.

Scope

The scope of CHES is diverse, including (but not limited to) the following topics:

  • Cryptographic implementations:
    • Hardware architectures
    • Cryptographic processors and coprocessors
    • True and pseudorandom number generators
    • Physical unclonable functions (PUFs)
    • Efficient software implementation
    • SHARCS (Special-purpose HARdware for Cryptanalysis, quantum included)
  • Attacks against implementations, and countermeasures:
    • Remote, micro-architectural and physical side-channel attacks and countermeasures
    • Fault attacks and countermeasures
    • Hardware tampering and tamper-resistance
    • White-box cryptography and code obfuscation
    • Reverse engineering of hardware/software
    • Hardware trojans and countermeasures
  • Tools and methodologies:
    • Formal methods, techniques and tools for secure design and verification for hardware/software
    • Computer-aided cryptographic engineering
    • Domain-specific languages for cryptographic systems
    • Metrics for the security of embedded systems
    • FPGA design security
    • Physical assurance and analysis of embedded systems
    • New datasets for public use
    • Systematization of Knowledge (SoK)
  • Interactions between cryptographic theory and implementation issues:
    • Quantum cryptanalysis
    • Algorithm subversion and subversion prevention
    • New and emerging cryptographic algorithms and protocols targeting embedded devices
    • Theoretical hardware models that allow proofs
  • Applications:
    • RISC-V security
    • Trusted execution environments and trusted computing platforms
    • IP protection for hardware/software and technologies for anti-counterfeiting
    • Reconfigurable hardware for cryptography
    • Secure elements, security subsystems, and applications
    • Security for the Internet of Things and cyberphysical systems (RFID, sensor networks, smart meters, medical implants, smart devices for home automation, industrial control, automotive, etc.)
    • Secure storage devices (memories, disks, etc.)
    • Isolation and monitoring hardware for cyberresilience
    • Engineering of zero-knowledge proof systems
    • Privacy-preserving computing in practice (MPC, FHE)
    • Post-quantum security

Paper Submission

Author instructions for paper submission are on the submissions page.

TCHES Publication Model

CHES has transitioned to an open-access journal/conference hybrid model.

A comprehensive list of FAQs relating to the model can be found via the TCHES website at https://tches.iacr.org

In summary:

  • Submitted papers will undergo a journal-style review process, with accepted papers published by Ruhr University Bochum in an issue of the journal IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES). Since it has a Gold Open Access status, all papers published in TCHES are immediately and freely available.
  • The annual CHES conference consists of presentations for each paper published in the associated issues of TCHES, plus invited talks and a range of additional and social activities. All papers accepted for publication in TCHES between 15 July of year n − 1 and 15 July of year n will be presented at CHES of year n.

Important Dates

All submission deadlines are at 23:59:59 Anywhere on Earth (AoE).

Schedule for TCHES Volume 2026/1

  • Submission: 15 July 2025
  • Rebuttal period: 28–31 Aug. 2025
  • Notification: 15 Sept. 2025
  • Camera ready: 14 Oct. 2025

Schedule for TCHES Volume 2026/2

  • Submission: 15 Oct. 2025
  • Rebuttal period: 27–30 Nov. 2025
  • Notification: 15 Dec. 2025
  • Camera ready: 14 Jan. 2026

Schedule for TCHES Volume 2026/3

  • Submission: 15 Jan. 2026
  • Rebuttal period: 26 Feb.–1 Mar. 2026
  • Notification: 15 Mar. 2026
  • Camera ready: 14 April 2026

Schedule for TCHES Volume 2026/4

  • Submission: 15 April 2026
  • Rebuttal period: 28–31 May 2026
  • Notification: 15 June 2026
  • Camera ready: 14 July 2026

Dates importantes

Dates de la conférence

Conference Date

11 octobre 202615 octobre 2026

Soumission

(TCHES Volume 2026/1) Submission

15 juillet 2025

(TCHES Volume 2026/2) Submission

15 octobre 2025

(TCHES Volume 2026/3) Submission

15 janvier 2026

Notification

(TCHES Volume 2026/1) Notification

15 septembre 2025

(TCHES Volume 2026/2) Notification

15 décembre 2025

(TCHES Volume 2026/3) Notification

15 mars 2026

Version finale

(TCHES Volume 2026/1) Camera ready

14 octobre 2025

(TCHES Volume 2026/2) Camera ready

14 janvier 2026

(TCHES Volume 2026/3) Camera ready

14 avril 2026

Autres dates

(TCHES Volume 2026/1) Rebuttal period

28 août 202531 août 2025

(TCHES Volume 2026/2) Rebuttal period

27 novembre 202530 novembre 2025

(TCHES Volume 2026/3) Rebuttal period

26 février 20261 mars 2026

Classement source

Source: CORE2023

Classement: A

Domaine de recherche: Cybersecurity and privacy

Carte

Loading feedback section...