In accordance with Swiss entry regulation, everyone entering Switzerland must present an entry form. If you are not vaccinated or recovered, you must also show proof of a negative test. Please check the requirements to enter Switzerland and ensure the compliance to them.
In accordance with Swiss regulations and USI COVID-19 campus protection provisions, a COVID certificate will be required for accessing COSADE 2021 and checks will be enforced every day at the entrance; a valid COVID certificate is also required to access restaurants, in particular the one of the social event. Face masks are also mandatory in all indoor areas of the university campus.
Side-channel analysis (SCA) and implementation attacks have become an important field of research at universities and in the industry. In order to enhance the resistance of cryptographic and security critical implementations within the design phase, constructive attacks and analyzing techniques may serve as a quality metric to optimize the design and development process. Since 2010, COSADE provides an international platform for researchers, academics, and industry participants to present their work and their current research topics. It is an excellent opportunity to exchange on new results with international experts and to initiate new collaborations and information exchange at a professional level. The workshop will feature both invited presentations and contributed talks.
The eleventh International Workshop on Constructive Side-Channel Analysis and Secure Design will be organized and held by the Università della Svizzera italiana.
The topics of COSADE 2021 include, but are not limited to:
- Implementation attacks & countermeasures:
Side-channel analysis, fault-injection attacks, probing and read-out, hardware trojans, cloning and counterfeiting, side-channel or fault-injection based reverse engineering including methods based on machine learning - Efficient and secure HW/SW implementations:
Efficient and secure cryptographic implementations of cryptographic blocks including post-quantum cryptography, lightweight cryptography, random number generators, physical unclonable functions, symmetric cryptography, hash functions, leakage-resilient cryptography, fault-resistant and tamper-detection designs, white-box cryptography - Measurement setups, evaluation platforms, and open benchmarks:
Practical implementation and comparison of physical attacks including description of measurement setups, test platforms for evaluation of physical attacks, open benchmarks for physical attacks and countermeasures - Formal analysis and automated tools:
Security and leakage models, formal analysis of secure implementations, design automation and tools, evaluation tooling, domain-specific security analysis of e.g., IoT, medical, automotive, industrial-control systems, 5G, ... - Special Topics:
COSADE 2021 encourages special submissions related to:- Optimized measurement setups for side-channel and fault,
- Implementation security of machine learning,
- Efficient implementation and security evaluation of NIST PQC/LWC competition candidates.
- Security of physical primitives like sensors and PUFs.
Important dates
Paper Submission deadline: |
April 11, 2021 (EXTENDED) |
Authors notification: |
May 27, 2021 (EXTENDED) |
Proceedings version due: |
June 11, 2021 |
COSADE workshop: |
October 25-27, 2021 |
Submission
Authors are invited to submit papers (PDF format) electronically by the submission link.Submitted papers must be original, unpublished, anonymous and not submitted to journals or other conferences/workshops that have proceedings. Submissions must be written in English, strictly follow Springer LNCS format (with default margins, font size, etc.) and should be at most 20 pages, excluding references. Papers not meeting these guidelines risk rejection without consideration. All submissions will be blind-refereed. Submission implies the willingness of at least one of the authors to register and present the paper. The proceedings will be published in the Springer Lecture Notes in Computer Science (LNCS) series. Accepted papers must follow the LNCS author instructions at: http://www.springer.de/comp/lncs/authors.html
Submission implies the willingness of at least one of the authors to register and present the paper.
Proceedings
The proceedings will be published in the Springer Lecture Notes in Computer Science (LNCS) series