posted by user: dutertre || 817 views || tracked by 2 users: [display]

Cosade 2024 : Cosade conference 2024


Conference Series : Constructive Side-Channel Analysis and Secure Design
When Apr 9, 2024 - Apr 10, 2024
Where Gardanne
Submission Deadline Dec 8, 2023
Notification Due Jan 26, 2024
Final Version Due Feb 12, 2024
Categories    hardware security   cryptography

Call For Papers

Call for Papers


The 15th International Workshop on
"Constructive Side-channel Analysis and Secure Design"

April 9-10, 2024
Mines Saint-Etienne, Center of Microelectronics in Provence,
Gardanne, Aix-Marseille area, France

Important Dates: -- All deadlines are 23:59:59 Anywhere on Earth (AoE) --

Paper submission deadline: December 8, 2023
Rebuttal phase: January 15-19, 2024
Notification of acceptance: January 26, 2024
Camera-ready version: February 12, 2024

Side-channel analysis (SCA) and implementation attacks have become an important field of research and a real threat. In order to enhance the resistance of cryptographic and security critical implementations within the design phase, constructive attacks and analyzing techniques may serve as a quality metric to optimize the design and development process.
Since 2010, COSADE provides an international platform for researchers, academics, and industry participants to present their work and their current research topics. The 15th International Workshop on Constructive Side-Channel Analysis and Secure Design will be organized by Mines Saint-Etienne and will be held at the Center of Microelectronics in Provence in Gardanne in-between Marseille and Aix-en-Provence.
The program committee is seeking original papers on all aspects of the side-channel analysis and other implementation attacks as well as efficient and secure implementations.
You are invited to participate and submit your contributions to COSADE'24. The workshop's submission topics include, but are not limited to:
- Implementation attacks & countermeasures: Side-channel analysis, fault-injection attacks, probing and read-out, hardware trojans, cloning and counterfeiting, side-channel or fault-injection based reverse engineering, attacks or countermeasures based on machine learning methods
- Efficient and secure HW/SW implementations: Efficient and secure implementations of cryptographic blocks including post-quantum cryptography, lightweight cryptography, random number generators, physical unclonable functions (PUFs), symmetric cryptography, hash functions, leakage-resilient cryptography, fault-resistant and tamper-detection designs, white-box cryptography
- Hardware-intrinsic security: Foundations and practical aspects of hardware-intrinsic security, use of instance-specific and process-induced variations in electronic devices for cryptography, novel PUF designs, hardware-intrinsic security threats, supply-chain protection
- Measurement setups, evaluation platforms, and open benchmarks: Practical implementation and comparison of physical attacks including description of measurement setups, test platforms for evaluation of physical attacks, open benchmarks for physical attacks and countermeasures
- Formal analysis and automated tools: Security and leakage models, formal analysis of secure implementations, design automation and tools, evaluation tooling, domain-specific security analysis of, e.g., IoT, medical, automotive, industrial-control systems, 5G, ...


Submissions Instructions:
Submitted papers must be original, unpublished, anonymous, and not submitted to journals or other conferences/workshops that have proceedings. Submissions must be written in English, strictly follow Springer LNCS format (with default margins, font size, etc.) and should be at most 18 pages, excluding only references. Papers not meeting these guidelines risk rejection without consideration.
All submissions will be blind-refereed. Submission implies the willingness of at least one of the authors to register and present the paper.
The proceedings will be published in the Springer Lecture Notes in Computer Science (LNCS) series. Accepted papers must follow the LNCS author instructions at:


Submission Website:
Authors are invited to submit papers (PDF format) electronically using the submission
form available on


Steering Committee:
Jean-Luc Danger, Télécom ParisTech (FR)
Werner Schindler, Bundesamt für Sicherheit in der Informationstechnik (BSI) (DE)

General Chair:
Jean-Max Dutertre, Mines Saint-Etienne (FR)

Program Chairs:
Naofumi Homma, Tohoku University (JP)
Romain Wacquez, CEA Leti (FR)

Web Chair:
Raphael Viera, Mines Saint-Etienne (FR)


Questions and inquiries should be sent to:
COSADE’24 committee:

Related Resources

CST 2024   11th International Conference on Advances in Computer Science and Information Technology
CEVVE 2024   2024 2nd International Conference on Electric Vehicle and Vehicle Engineering (CEVVE 2024)
CRBL 2024   International Conference on Cryptography and Blockchain
CRYPIS 2024   13th International Conference on Cryptography and Information Security
ACIJ 2024   Advanced Computing: An International Journal
IJCI 2024   Call for Conference Proceedings - International Journal on Cybernetics & Informatics
IJFCST 2024   International Journal on Foundations of Computer Science & Technology
BLKCA 2024   2nd International Conference on Blockchain and Applications
IJMSA 2024   International Journal of Modelling, Simulation and Applications
NYC-2024-BC 2024   New York Annual Conference on Blockchain and Cryptography 2024