Cryptography has made great strides in capability and variety over the past few years, enabling a broad range of new applications and extending the reach of security deep into the embedded world. A few examples include lightweight primitives that provide information security for a fraction of the energy and cost of traditional primitives; lattice-based crypto-engines that provide an alternative to public-key operations in a post-quantum-computing world; cryptographic sponges that can be configured as universal crypto-kernels; anonymous signatures that support electronic cash in portable, compact form factors; and homomorphic primitives and zero-knowledge proofs that allow privacy-friendly interaction of devices with the all-knowing cloud. These novel forms of cryptography will drive the embedded information infrastructure, and they will become a necessity to mix and merge our virtual life with our real life in a trustworthy and scalable manner.
However, this is not your father's cryptography, and its efficient implementation needs new research efforts. It is based on different mathematical structures, novel transformations and data organizations, and in many cases its computational complexity is significantly higher than that of traditional cryptographic operations. For several primitives, such as for post-quantum cryptography and homomorphic computing, the optimal implementation strategies are still an open area of research. Furthermore, threats against these novel forms of cryptography, such as side-channel analysis or fault injection, are unexplored.
This special issue of ACM Transactions on Embedded Computing Systems solicits state-of-the-art research results and surveys in embedded system engineering for these novel cryptographic primitives. The issue will cover both hardware and software implementations for performance-optimized, resource-constrained, energy-efficient platforms. Of special interest are implementations that demonstrate novel applications for cryptographic primitives.
A few examples of topics of interest for the special issue include:
- Post-quantum Primitives for Constrained Platforms (RFID, microcontroller)
- Lattice-based Cryptography in Embedded Platforms
- Embedded Implementations that interact with the Homomorphic Cloud
- Custom-instruction Extensions and Hardware Primitives for Post-quantum Cryptography
- Performance Comparisons and Benchmarks for Multi-party Computation
- Privacy-friendly Cryptography in Embedded Platforms
- Privacy-friendly Car Electronics and Public-transport Infrastructure
- Implementations of Electronic Cash
- Implementations of Electronic Passports
- Hardware Acceleration of Privacy-friendly Cryptographic Primitives
- Implementations of Unified Cryptographic Primitives (eg Authenticated Encryption)
- Implementations of Leakage-resilient Cryptography
The special issue specifically seeks novel, non-traditional implementations of cryptography, and novel, non-traditional threat analysis. Submissions that discuss standard encryption schemes such as based on AES, RSA or ECC, are considered out of scope. Likewise, implementation attacks on traditional targets (standard block ciphers) are considered out of scope.
Consideration for publication elsewhere. Conference papers may only be submitted if the paper was completely re-written or substantially extended (30%). The papers should be submitted via the Manuscript Central website and should adhere to standard ACM TECS formatting requirements. The page count limit is 25.
Authors should submit their journal version at Manuscript Central adhering to the formatting instructions on the TECS Web page and indicate that you are submitting to the Special Issue on Embedded Platforms for Cryptography in the Coming Decade on the first page and in the field "Author's Cover Letter:" in Manuscript Central. For additional questions please send an email to the Guest Editors.