Don't Miss the Deadline: Submit Your Proposal for The 4th International Cryptographic Module Conference

2015-11-30

May 18-20 * Shaw Centre * Ottawa, Ontario, Canada
We’re Looking for Great Speakers. Deadline: December 15

In 2016 ICMC grows into an expanded international venue, with a new late spring timeframe that avoids conflict with other major industry events.

You're invited to share your expertise at the fourth annual International Cryptographic Module Conference, a growing forum for global expertise in commercial cryptography. At the fourth annual edition of the conference in May, industry leaders from over 20 countries will convene to address the unique challenges faced by those who produce, use, and test cryptographic modules that conform with standards such as FIPS 140-2 and ISO/IEC 19790. The conference helps to foster a focused, organized community of users. ICMC covers the technical design problems to meet the standard, with a particular emphasis on the challenges posed as technology advances with respect to the current standards.

The ICMC Program Committee seeks high-quality vendor-neutral presentations focused on commercial cryptography from thought leaders in the engineering and research community, test laboratories, government organizations, procurers, deployers, administrators, and end-users. Product vendors are encouraged to recruit clients and partners who are front-line implementers as presenters. See the conference website for all the details.

Submission is easy. Only a brief description of the proposed presentation is required.

Click Here to Submit

ICMC is presented in 4 tracks: Certification Programs: Issues related to the CMVP, government programs and policy; General Technology: Tools and techniques relating to cryptographic modules; Advanced Technology: High-level technology issues, or special-focus subject matter; User Experience: Information of interest to the cryptographic module end-user. Proposals for in-depth pre-conference workshops, and plenary keynote speakers and topics are also sought.

Previous Conference Presentations

  • Quantum Computing and Its Impact
  • Extending Derived Credential Use to Support S/MIME Even with Medium-Hardware Protected Credentials
  • A Look into Hard Drive Firmware Hacking
  • Improved Approaches to Online Health Testing in SP800-90 RNGs
  • Low-Cost Side Channel Attacks on Smartphones and Embedded Devices using Practical Experiences Applying Test Vector Leakage Assessment (TVLA) for Side Channel
  • Analysis in Conformance Testing Scenario
  • Accreditation, Validation and Recognition based on ISO Standards
  • The Next Steps Toward A Scalable International Cryptographic Evaluation Process
  • Legacy Random Number Generators (RNGs)
  • Proposed Changes for a Long-Overdue Revision of FIPS 140-2
  • Adding to the Approved List of Algorithms
  • CMVP Programmatic Status
  • CSfC Program and its FIPS 140-2 Requirements
  • What is Suite-B Cryptography and How Does it Relate to Government Certifications?
  • Introduction on the Commercial Cryptography Scheme in China
  • FIPS 140 Quo Vadis?
  • NIST & NIAP Working Together
  • Effective Cryptography - Or: what's wrong with all these crypto APIs?
  • The Entropy Bogeyman
  • The What, Why, and How of Tokenization
  • SP 800-131A Transitions and Related Implementation Guidance
  • SP800-90B: Analysis of Linux /dev/random
  • Enough Entropy? Justify it!
  • Repetition Count Test
  • Roadmap to testing of new algorithms (CAVP)
  • Entropy Estimation by Example
  • Importance of Open Source to the Cryptographic Module Community
  • Challenges in Generating Keys for Asymmetric-Key Algorithms
  • What is my Operational Environment?
  • Impact of Draft CMVP Policy Changes on Industry
  • Commonly Accepted Keys and CSPs Initiative
  • FIPS is FIPS, Real World is Real World and never the twain shall meet?
  • Collateral Damage—Vendor and Customer Impact of Frequent Policy Changes
  • Learning from Each Other and Our Mistakes
  • FIPS140-Testing: You Want My What?
  • Validating Encryption: The Bottleneck in Security
  • Cryptographic validation requirements and the Common Criteria (ISO/IEC 15408)

Exhibit and sponsorship opportunities are available. Click here for complete information. For more info or to reserve, contact: Bill Rutledge, Project Director, bill.rutledge@icmconference.org, +1 212-866-2169.