SPRINGER
LNCS

sponsored by


GOLD SPONSORS

Infineon

NewAE Technology Inc.

NXP

Riscure

Secure-IC

SILVER SPONSORS

Cryptography Research

Oberthur Technologies

Call for Papers

Important Dates

Submission web site

Background, Aim and Scope

Side-channel analysis (SCA) and implementation attacks have become an important field of research at universities and in the industry. In order to enhance the resistance of cryptographic and security critical implementations within the design phase, constructive attacks and analyzing techniques may serve as a quality metric to optimize the design and development process. Since 2010, COSADE provides an international platform for researchers, academics, and industry participants to present their work and their current research topics. It is an excellent opportunity to exchange on new results with international experts and to initiate new collaborations and information exchange at a professional level. The workshop will feature both invited presentations and contributed talks.
The seventh International Workshop on Constructive Side-Channel Analysis and Secure Design is organized by TU Graz, Austria. The topics of COSADE 2016 include, but are not limited to:

Submission

Submitted papers should present novel contributions related to the topics listed above. They must be original, unpublished, anonymous and not submitted to another conference or journal for consideration of publication. Papers must be written in English and they should not exceed 15 pages excluding bibliography and appendices (18 pages in total) and be compliant with LNCS template. Submissions not meeting these guidelines risk rejection without consideration of their merits. All submissions will be blind refereed. Authors are invited to submit their manuscripts (PDF or PS format) by filling in the submission form available on the following web site: Submission implies the willingness of at least one of the authors to register and present the paper.

Publication

The proceedings will be published as a Springer Lecture Notes in Computer Science volume.

Organised by
IAIK - Institute for Applied Information Processing and Communications