Abstract
The 16th International Workshop on Cryptographic Hardware and Embedded Systems was held in Busan, Korea from September 23–26, 2014. The workshop was sponsored by the International Association for Cryptologic Research. This special issue of the Journal for Cryptographic Engineering (JCEN) contains extended versions of three of the papers that were presented at this workshop. Each year CHES is one of the best-attended events among all the scientific conferences on security. It is considered by many to be the best leading indicator of the health and relevance of academic research on cryptography, its implementation, and most importantly, its deployment. The conference brings together experts from academia and industry and provides a narrow and focused insight into the field of applied cryptography. The workshop covers a wide spectrumof subjects, fromnew implementations of cryptographic algorithms, advances in the field of side channel and fault attacks, countermeasures and secure implementations, and protocols and security aspects of device manufacturing. CHES 2014 received 127 submissions from all parts of the globe. Each paper was reviewed by at least four independent reviewers, with papers from program committee members receiving at least five. The 43 members of the program committee were aided in this complex and time-consuming task by a further 203 external reviewers, providing striking testament to the size and robust health of the CHES community. From among the 127 submissions, 33 were chosen for presentation at the workshop. They represented all areas of research that are considered to sit under the CHES umbrella,
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.