Computer Security Resource Center

Computer Security Resource Center

Computer Security
Resource Center

Events

Showing 9 matching records.
March 11, 2019 - March 12, 2019
NIST is interested in promoting the security of implementations of cryptographic primitives. This security depends not only on the theoretical properties of the primitives but also on the ability to withstand attacks on...
April 11, 2018 - April 13, 2018
NIST has initiated a process to solicit, evaluate, and standardize one or more quantum-resistant public-key cryptographic algorithms. The submission deadline of November 30, 2017 has passed. Please see the Round 1...
March 29, 2017 - March 31, 2017
The Information Security and Privacy Advisory Board (ISPAB) met March 29-31, 2017, at the National Press Club Building in Washington, D.C. All sessions were open to the public.Federal Register Notice Announcing...
June 15, 2016 - June 17, 2016
The Information Security and Privacy Advisory Board (ISPAB) met from June 15-17, 2016, at the U.S. Access Board in Washington, D.C. All sessions were open to the public.Federal Register Notice Announcing MeetingMinutes...
June 3, 2008 - June 4, 2008
This workshop explores innovative and practical applications of pairing-based cryptography. Pairings have been used to create identity-based encryption schemes, but are also a useful tool for solving other cryptographic...
September 26, 2005 - September 29, 2005
This workshop discussed physical security testing of cryptographic modules, related to FIPS 140 and ISO.
September 14, 2004 - September 15, 2004
The Cryptographic Module Validation Program Symposium 2004 will be held on September 14-15, 2004 at the DoubleTree Hotel & Executive Meeting Center in Rockville, MD. NIST and the...
March 26, 2002 - March 27, 2002
The Cryptographic Module Validation Program Conference 2002 will be held on March 26-27, 2002 at the Washington Plaza Hotel in Washington DC. Sponsored by NIST and the Canadian Security...
May 11, 1998 - May 12, 1998
Federal agencies and departments are required to comply with FIPS 140-1, Security Requirements for Cryptographic Modules. This involves the acquisition of validated cryptographic modules (which may be incorporated in a...