An Expert Community of Users Focused on Commercial Cryptography Standards

  • Thanks to all of this year’s conference participants.

    View Photos of ICMC14

    Experts from around the world will convene at ICMC 2014 to address the unique challenges faced by those who produce, use, and test cryptographic modules that conform with standards such as FIPS 140-2 and the ISO/IEC 19790 standard. The conference helps to foster a focused, organized community of users. ICMC covers the technical design problems to meet the standard, with a particular emphasis on the challenges posed as technology advances with respect to the current standards.

    ICMC reviews technical topics underlying the implementation of a cryptographic module including physical security, key management, side-channel analysis, cryptographic algorithm implementation testing, standardization (FIPS 140-2, ISO/IEC 19790), validation programs and more.

    Who Should Attend

    The conference is for those interested in developing, specifying and procuring certified commercial off the shelf cryptographic modules; manufacturers of cryptographic modules compliant with FIPS 140-2 or ISO/IEC 19790 around the world; laboratories and government departments responsible for testing cryptographic modules against FIPS 140-2 or ISO/IEC 19790 including the U.S., Canada, Japan, South Korea and Spain; key players and stakeholders in standards development; leading members of the academic community; embedded systems OEMs; and the side channel research community.

  • utimacoLevel2
  • Conference Presentations
    Have Been Posted

    Available to Conference Registrants
    (Password Protected)

       Click Here



    Presented by CMUF

       The Cryptographic Module User Forum (CMUF)
       provides a voice and communications channel be-
       tween the community of unclassified cryptographic
       module (CM) and unclassified cryptographic algo-
       rithm developers, vendors, test labs and other
       interested parties, and the various national, inter-
       national, and multi-lateral organizational committees,
       schemes, and policy makers.

    Join the Forum at cmuf.org.


 

  • Conference Agenda

     

    • November 19, 2014
      • 08:00 - 09:00Registration
      • 09:00 - 10:30Workshop: Explaining the ISO 19790 Standard (W01)
      • 10:30 - 10:45Break
      • 10:45 - 12:15Workshop Cont'd (W02)
      • 12:15 - 13:15Lunch
      • 13:15 - 14:45Workshop: Comparing ISO/IEC 19790 and FIPS PUB 140-2 (W03)
      • 14:45 - 15:00Break
      • 15:00 - 16:30Workshop: Questions to CMVP (NIST/CSEC) (W04)
    • November 20, 2014
      • 08:00 - 09:00Registration
      • 09:00 - 10:15Plenary Keynote Presentations (P11)
      • 10:15 - 11:00Break in the Exhibit Area
      • 11:00 - 12:30Track Sessions: Certification Programs, General and Advanced Technology
      • 12:30 - 13:45Lunch in the Exhibit Area
      • 13:45 - 15:15Track Sessions Cont'd
      • 15:15 - 15:45Break in the Exhibit Area
      • 15:45 - 17:15Track Sessions Cont'd

    continue reading 

  • Sponsors and Exhibitors

     

    • atsec information security

      atsec information security Exhibitor
      An independent, privately owned company that focuses on providing laboratory and consulting services for information security.

    • SafeLogic

      SafeLogic Conference Bag Sponsor
      A provider of security products for applications in mobile and server/appliance environments.

    • Leidos

      Leidos Event Sponsor
      CloudShield Technologies, a wholly owned subsidiary of Leidos, has been a leading innovator in cybersecurity for a decade.

    • Cryptography Research

      Cryptography Research Exhibitor
      The world's leading semiconductor security R&D and licensing company.

    • Riscure

      Riscure Exhibitor
      An international and independent security test laboratory located in the USA and the Netherlands.

    • Secure-IC

      Secure-IC Exhibitor
      A leader in the creation of sustainable embedded technologies that strike the best balance between threat protection and your product life-cycle pressures.

    • Ultra Electronics, 3eTI

      Ultra Electronics, 3eTI Exhibitor
      A leading cyber-technology company with products and systems that secure critical infrastructure and improve operational efficiency.

    • WolfSSL

      WolfSSL Badge Sponsor
      An open source Internet security company with products including the CyaSSL embedded SSL library, wolfCrypt crypto engine, SSL Inspection, and the yaSSL Embedded Web Server.

    • Utimaco

      Utimaco Level 2 Sponsor
      A leading manufacturer of hardware-based security solutions that provide the root of trust to keep cryptographic keys safe, secure critical digital infrastructures and protect high value data assets.

    • Oracle

      Oracle Opening Lunch Sponsor
      Oracle engineers hardware and software to work together in the cloud and in your data center.

    continue reading