DAY 1 - November 7, 2011
8:30 - 9:00 | Check‐in and Coffee Reception |
9:00 - 9:15 | Welcome & Opening Remarks Donna Dodson, Chief, NIST/ITL/Computer Security Division |
9:15 - 10:00 | Workshop Keynote: Turning Points in Cryptography Dr. Whitfield Diffie, Chief Cryptographer, Revere Security |
10:00 - 10:25 | Crypto Strength and Attacks, John Kelsey, NIST |
10:25 - 10:35 | Constrained Environments and Many‐Core Devices, Larry Bassham, NIST |
10:35 - 10:50 | Pairing Based Cryptography, Dustin Moody, NIST |
10:50 - 11:05 | Coffee Break |
11:05 - 11:30 | Cryptography for Highly Constrained Networks, Rene Struik, Struik Security Consultancy |
11:30 - 11:55 | Cryptographic Challenges for Smart Grid Home Area Networks Secure Networking, Apurva Mohan, Honeywell ACS Labs |
11:55 - 12:20 | FIPS‐140‐2 Validation of OpenSSL for Android Devices, Tom Karygiannis, NIST and Steve Marquess, OpenSSL Foundation |
12:20 - 12:45 | Secure App Execution On Commercial Mobile Devices By Means Of Bare Metal Hypervisors, Katrin Hoeper, Motorola Solutions, Inc. |
12:45 - 13:45 | Lunch Break |
13:45 - 14:10 | Compact Asymmetric Authentication using Hash‐based Signatures, David McGrew, CISCO |
14:10 - 14:35 | Stream Ciphers for Constrained Environments, Meltem Sonmez Turan, NIST |
14:35 - 15:00 | A Framework for the Evaluation of Physical Unclonable Functions, Abhranil Maiti, Virginia Tech |
15:00 - 15:15 | Coffee Break |
15:15 - 15:40 | A Symmetric Key Generation System (KGS) Suitable for Sensor/Building Networks, David McGrew, CISCO |
15:40 - 16:05 | Key Security Challenges in Smart Swarm of Things (SSoT), Oscar Garcia‐Morchon, Philips Research Europe |
16:05 - 16:30 | Securing the Next Wave of Technology, Dr. Daniel Engels, CTO, Revere Security |
16:30 | Closing Remarks for the Day |
DAY 2 - November 8, 2011
8:30 - 9:00 | Check‐in and Coffee Reception |
9:00 - 9:10 | Welcome & Opening Remarks Tim Polk, NIST |
9:10 - 9:55 | Workshop Keynote: Introduction to Delay-Tolerant Networks, Angela Hennessy, Laboratory for Telecommunications Sciences (LTS) |
9:55 - 10:30 | Cryptographic Module Design with Domain Specific Languages, John Launchbury, Chief Scientist, Galois |
10:30 - 10:55 | NIST's Cryptographic Toolkit, Elaine Barker, NIST |
10:55 - 11:10 | Coffee Break |
11:10 - 11:35 | The Need for Parallel Ultra Fast Cryptographic Designs for Emerging Technologies, Danilo Gligoroski, Department of Telematics, NTNU, Norway |
11:35 - 12:00 | Secret Sharing and Reliable Cloud Computing, Yvo Desmedt, University College London |
12:00 - 12:25 | Privacy-preserving Electronic Transactions, Rene Peralta, NIST |
12:25 - 12:50 | Security/Privacy Models for "Internet of things": What should be studied from RFID‐schemes? Daisuke Moriyama, NICT |
12:50 - 13:50 | Lunch Break |
13:50 - 14:50 | Open Floor Discussions |
14:50 | Closing Remarks & Adjourn |