Skip to main content

NOTICE: Due to a lapse in annual appropriations, most of this website is not being updated. Learn more.

Form submissions will still be accepted but will not receive responses at this time. Sections of this site for programs using non-appropriated funds (such as NVLAP) or those that are excepted from the shutdown (such as CHIPS and NVD) will continue to be updated.

U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

CETA 2011-Agenda

Workshop on Cryptography for Emerging Technologies and Applications

Draft Agenda

DAY 1 - November 7, 2011

8:30 - 9:00 Check‐in and Coffee Reception
9:00 - 9:15 Welcome & Opening Remarks
Donna Dodson, Chief, NIST/ITL/Computer Security Division
9:15 - 10:00 Workshop Keynote: Turning Points in Cryptography
Dr. Whitfield Diffie, Chief Cryptographer, Revere Security
10:00 - 10:25 Crypto Strength and Attacks,
John Kelsey, NIST
10:25 - 10:35 Constrained Environments and Many‐Core Devices,
Larry Bassham, NIST
10:35 - 10:50 Pairing Based Cryptography,
Dustin Moody, NIST
10:50 - 11:05 Coffee Break
11:05 - 11:30 Cryptography for Highly Constrained Networks,
Rene Struik, Struik Security Consultancy
11:30 - 11:55 Cryptographic Challenges for Smart Grid Home Area Networks Secure Networking,
Apurva Mohan, Honeywell ACS Labs
11:55 - 12:20 FIPS‐140‐2 Validation of OpenSSL for Android Devices,
Tom Karygiannis, NIST and Steve Marquess, OpenSSL Foundation
12:20 - 12:45 Secure App Execution On Commercial Mobile Devices By Means Of Bare Metal Hypervisors,
Katrin Hoeper, Motorola Solutions, Inc.
12:45 - 13:45 Lunch Break
13:45 - 14:10 Compact Asymmetric Authentication using Hash‐based Signatures,
David McGrew, CISCO
14:10 - 14:35 Stream Ciphers for Constrained Environments,
Meltem Sonmez Turan, NIST
14:35 - 15:00 A Framework for the Evaluation of Physical Unclonable Functions,
Abhranil Maiti, Virginia Tech
15:00 - 15:15 Coffee Break
15:15 - 15:40 A Symmetric Key Generation System (KGS) Suitable for Sensor/Building Networks,
David McGrew, CISCO
15:40 - 16:05 Key Security Challenges in Smart Swarm of Things (SSoT),
Oscar Garcia‐Morchon, Philips Research Europe
16:05 - 16:30 Securing the Next Wave of Technology,
Dr. Daniel Engels, CTO, Revere Security
16:30 Closing Remarks for the Day


DAY 2 - November 8, 2011

8:30 - 9:00 Check‐in and Coffee Reception
9:00 - 9:10 Welcome & Opening Remarks
Tim Polk, NIST
9:10 - 9:55 Workshop Keynote: Introduction to Delay-Tolerant Networks,
Angela Hennessy, Laboratory for Telecommunications Sciences (LTS)
9:55 - 10:30 Cryptographic Module Design with Domain Specific Languages,
John Launchbury, Chief Scientist, Galois
10:30 - 10:55 NIST's Cryptographic Toolkit,
Elaine Barker, NIST
10:55 - 11:10 Coffee Break
11:10 - 11:35 The Need for Parallel Ultra Fast Cryptographic Designs for Emerging Technologies,
Danilo Gligoroski, Department of Telematics, NTNU, Norway
11:35 - 12:00 Secret Sharing and Reliable Cloud Computing,
Yvo Desmedt, University College London
12:00 - 12:25 Privacy-preserving Electronic Transactions,
Rene Peralta, NIST
12:25 - 12:50 Security/Privacy Models for "Internet of things": What should be studied from RFID‐schemes?
Daisuke Moriyama, NICT
12:50 - 13:50 Lunch Break
13:50 - 14:50 Open Floor Discussions
14:50 Closing Remarks & Adjourn

CETA Workshop Home

Created November 1, 2011, Updated August 1, 2013
Was this page helpful?