| |||||||||||||||
ICMC 2013 : International Cryptographic Module Conference 2013 | |||||||||||||||
Link: http://www.international-cryptographic-module-conference.org/paper-submissions.html | |||||||||||||||
| |||||||||||||||
Call For Papers | |||||||||||||||
This first ICMC aims to bring together experts from around the world to confer on the topic of cryptographic modules, with emphasis on their secure design, implementation, assurance, and use, referencing both new and established standards such as FIPS 140-2 and ISO/IEC 19790.
We are focused on attracting participants from the engineering and research community, test laboratories, government organizations, the procurers, deployers and administrators of cryptographic modules and academia. Our program consists of one day of workshops and tutorials, followed by two days of 30 minute presentations (plus 15 minute for questions). We solicit proposals for high quality papers and relevant workshops that will be of interest to the community involved with cryptographic modules on topics such as: • Management of cryptographic modules in the field • Standards: including FIPS 140-2, ISO/IEC 19790, FIPS 140-3 • Physical security and Hardware design • Key management • Random number generation • Side channel analysis, non-invasive attacks • Choice of and Implementing cryptographic algorithms • Cryptographic modules implemented in Open Source • Hybrid systems, Embedded systems • Tools and methodologies The committee favors vendor-neutral presentations that focus on the practical design, testing and use of cryptographic modules. Product vendors are encouraged to recruit clients and partners who are front-line implementers as presenters. Visit www.icmc-2013.org for more information. |
|