posted by user: afabis || 1505 views || tracked by 4 users: [display]

ICMC 2013 : International Cryptographic Module Conference 2013

FacebookTwitterLinkedInGoogle

Link: http://www.international-cryptographic-module-conference.org/paper-submissions.html
 
When Sep 24, 2013 - Sep 26, 2013
Where Gaithersburg area, MD
Submission Deadline Apr 1, 2013
Notification Due Apr 23, 2013
Final Version Due Sep 3, 2013
Categories    FIPS 140-2   cryptographic modules   cryptographic algorithms   it security
 

Call For Papers

This first ICMC aims to bring together experts from around the world to confer on the topic of cryptographic modules, with emphasis on their secure design, implementation, assurance, and use, referencing both new and established standards such as FIPS 140-2 and ISO/IEC 19790.

We are focused on attracting participants from the engineering and research community, test laboratories, government organizations, the procurers, deployers and administrators of cryptographic modules and academia. Our program consists of one day of workshops and tutorials, followed by two days of 30 minute presentations (plus 15 minute for questions). We solicit proposals for high quality papers and relevant workshops that will be of interest to the community involved with cryptographic modules on topics such as:

• Management of cryptographic modules in the field
• Standards: including FIPS 140-2, ISO/IEC 19790, FIPS 140-3
• Physical security and Hardware design
• Key management
• Random number generation
• Side channel analysis, non-invasive attacks
• Choice of and Implementing cryptographic algorithms
• Cryptographic modules implemented in Open Source
• Hybrid systems, Embedded systems
• Tools and methodologies

The committee favors vendor-neutral presentations that focus on the practical design, testing and use of cryptographic modules. Product vendors are encouraged to recruit clients and partners who are front-line implementers as presenters.

Visit www.icmc-2013.org for more information.

Related Resources

SCI 2020   ACNS Workshop on Secure Cryptographic Implementation