Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

CETA 2011-Agenda

Workshop on Cryptography for Emerging Technologies and Applications

Draft Agenda

DAY 1 - November 7, 2011

8:30 - 9:00 Check‐in and Coffee Reception
9:00 - 9:15 Welcome & Opening Remarks
Donna Dodson, Chief, NIST/ITL/Computer Security Division
9:15 - 10:00 Workshop Keynote: Turning Points in Cryptography
Dr. Whitfield Diffie, Chief Cryptographer, Revere Security
10:00 - 10:25 Crypto Strength and Attacks,
John Kelsey, NIST
10:25 - 10:35 Constrained Environments and Many‐Core Devices,
Larry Bassham, NIST
10:35 - 10:50 Pairing Based Cryptography,
Dustin Moody, NIST
10:50 - 11:05 Coffee Break
11:05 - 11:30 Cryptography for Highly Constrained Networks,
Rene Struik, Struik Security Consultancy
11:30 - 11:55 Cryptographic Challenges for Smart Grid Home Area Networks Secure Networking,
Apurva Mohan, Honeywell ACS Labs
11:55 - 12:20 FIPS‐140‐2 Validation of OpenSSL for Android Devices,
Tom Karygiannis, NIST and Steve Marquess, OpenSSL Foundation
12:20 - 12:45 Secure App Execution On Commercial Mobile Devices By Means Of Bare Metal Hypervisors,
Katrin Hoeper, Motorola Solutions, Inc.
12:45 - 13:45 Lunch Break
13:45 - 14:10 Compact Asymmetric Authentication using Hash‐based Signatures,
David McGrew, CISCO
14:10 - 14:35 Stream Ciphers for Constrained Environments,
Meltem Sonmez Turan, NIST
14:35 - 15:00 A Framework for the Evaluation of Physical Unclonable Functions,
Abhranil Maiti, Virginia Tech
15:00 - 15:15 Coffee Break
15:15 - 15:40 A Symmetric Key Generation System (KGS) Suitable for Sensor/Building Networks,
David McGrew, CISCO
15:40 - 16:05 Key Security Challenges in Smart Swarm of Things (SSoT),
Oscar Garcia‐Morchon, Philips Research Europe
16:05 - 16:30 Securing the Next Wave of Technology,
Dr. Daniel Engels, CTO, Revere Security
16:30 Closing Remarks for the Day


DAY 2 - November 8, 2011

8:30 - 9:00 Check‐in and Coffee Reception
9:00 - 9:10 Welcome & Opening Remarks
Tim Polk, NIST
9:10 - 9:55 Workshop Keynote: Introduction to Delay-Tolerant Networks,
Angela Hennessy, Laboratory for Telecommunications Sciences (LTS)
9:55 - 10:30 Cryptographic Module Design with Domain Specific Languages,
John Launchbury, Chief Scientist, Galois
10:30 - 10:55 NIST's Cryptographic Toolkit,
Elaine Barker, NIST
10:55 - 11:10 Coffee Break
11:10 - 11:35 The Need for Parallel Ultra Fast Cryptographic Designs for Emerging Technologies,
Danilo Gligoroski, Department of Telematics, NTNU, Norway
11:35 - 12:00 Secret Sharing and Reliable Cloud Computing,
Yvo Desmedt, University College London
12:00 - 12:25 Privacy-preserving Electronic Transactions,
Rene Peralta, NIST
12:25 - 12:50 Security/Privacy Models for "Internet of things": What should be studied from RFID‐schemes?
Daisuke Moriyama, NICT
12:50 - 13:50 Lunch Break
13:50 - 14:50 Open Floor Discussions
14:50 Closing Remarks & Adjourn

CETA Workshop Home

Created November 1, 2011, Updated August 1, 2013