National Academies Press: OpenBook

Cryptographic Agility and Interoperability: Proceedings of a Workshop (2017)

Chapter: Appendix A: Workshop Agenda and Participants List

« Previous: Appendixes
Suggested Citation:"Appendix A: Workshop Agenda and Participants List." National Academies of Sciences, Engineering, and Medicine. 2017. Cryptographic Agility and Interoperability: Proceedings of a Workshop. Washington, DC: The National Academies Press. doi: 10.17226/24636.
×

A Workshop Agenda and Participants List

WORKSHOP ON CRYPTOGRAPHIC AGILITY AND INTEROPERABILITY SPRING 2016 MEETING OF THE FORUM ON CYBER RESILIENCE

May 9, 2016
Keck Center of the National Academies of Sciences, Engineering, and Medicine
Washington, D.C.

AGENDA

10:00 a.m.

Welcome and Overview

Fred B. Schneider, Forum on Cyber Resilience Chair

10:05

Context Setting

Bob Blakley, Forum Member

Paul Kocher, Forum Member

10:55 Break
11:10

Government and Infrastructure

Session Moderator: Steven Lipner, Forum Member

Kerry McKay, National Institute of Standards and Technology

Richard George, Johns Hopkins University Applied Physics Laboratory

12:00 p.m. Break for lunch
1:00

Standards and Security Implications

Session Moderator: Mary Ellen Zurko, Forum Member

Russ Housley, Vigil Security, LLC

David McGrew, Cisco Systems, Inc.

1:50 Break
Suggested Citation:"Appendix A: Workshop Agenda and Participants List." National Academies of Sciences, Engineering, and Medicine. 2017. Cryptographic Agility and Interoperability: Proceedings of a Workshop. Washington, DC: The National Academies Press. doi: 10.17226/24636.
×
2:05

Engineering at Scale and User Implications

Session Moderator: Eric Grosse, Forum Member

Matthew Green, Johns Hopkins University

Adam Langley, Google, Inc.

Sara Brody, Simply Secure

3:20 Break
3:35

Research, Industry, and Policy Implications

Session Moderator: Bob Blakley, Forum Member

Steven Bellovin, Columbia University

John Manferdelli, Google, Inc.

4:25

Wrap-up Discussion and Q&A

Moderator: Paul Kocher, Forum Member

5:00

Reception

Forum members, speakers, and attendees

Suggested Citation:"Appendix A: Workshop Agenda and Participants List." National Academies of Sciences, Engineering, and Medicine. 2017. Cryptographic Agility and Interoperability: Proceedings of a Workshop. Washington, DC: The National Academies Press. doi: 10.17226/24636.
×

PARTICIPANTS LIST

Anita Allen, University of Pennsylvania

Steven Bellovin, Columbia University

Bob Blakley, CitiGroup, Inc.

Shenae Bradley, National Academies of Sciences, Engineering, and Medicine

Sara (Scout) Sinclair Brody, Simply Secure

Fred Cate, Indiana University

David Clark, Massachusetts Institute of Technology

Donna Dodson, National Institute of Standards and Technology

Jon Eisenberg, National Academies of Sciences, Engineering, and Medicine

Richard George, Johns Hopkins University

Matthew Green, Johns Hopkins University

Eric Grosse, Google, Inc.

David Hoffman, Intel

Russ Housley, Vigil Security, LLC

Paul Kocher, Cryptography Research Division, Rambus, Inc.

Tadayoshi Kohno, University of Washington

Butler Lampson, Microsoft Corporation

Adam Langley, Google, Inc.

Steven Lipner, Independent Consultant

John Manferdelli, Google, Inc.

Brad Martin, National Security Agency

David McGrew, Cisco Systems, Inc.

Kerry McKay, National Institute of Standards and Technology

Lynette Millett, National Academies of Sciences, Engineering, and Medicine

Deirdre Mulligan, University of California, Berkeley

Katiria Ortiz, National Academies of Sciences, Engineering, and Medicine

Tony Sager, Council on Cybersecurity

William Sanders, University of Illinois, Urbana-Champaign

Fred B. Schneider, Cornell University

Peter Swire, Georgia Institute of Technology

David Vladeck, Georgetown University

Mary Ellen Zurko, Cisco Systems, Inc.

Suggested Citation:"Appendix A: Workshop Agenda and Participants List." National Academies of Sciences, Engineering, and Medicine. 2017. Cryptographic Agility and Interoperability: Proceedings of a Workshop. Washington, DC: The National Academies Press. doi: 10.17226/24636.
×
Page 68
Suggested Citation:"Appendix A: Workshop Agenda and Participants List." National Academies of Sciences, Engineering, and Medicine. 2017. Cryptographic Agility and Interoperability: Proceedings of a Workshop. Washington, DC: The National Academies Press. doi: 10.17226/24636.
×
Page 69
Suggested Citation:"Appendix A: Workshop Agenda and Participants List." National Academies of Sciences, Engineering, and Medicine. 2017. Cryptographic Agility and Interoperability: Proceedings of a Workshop. Washington, DC: The National Academies Press. doi: 10.17226/24636.
×
Page 70
Next: Appendix B: Planning Committee Biographies »
Cryptographic Agility and Interoperability: Proceedings of a Workshop Get This Book
×
 Cryptographic Agility and Interoperability: Proceedings of a Workshop
Buy Ebook | $14.99
MyNAP members save 10% online.
Login or Register to save!
Download Free PDF

In May 2016, the National Academies of Sciences, Engineering, and Medicine hosted a workshop on Cryptographic Agility and Interoperability. Speakers at the workshop discussed the history and practice of cryptography, its current challenges, and its future possibilities. This publication summarizes the presentations and discussions from the workshop.

READ FREE ONLINE

  1. ×

    Welcome to OpenBook!

    You're looking at OpenBook, NAP.edu's online reading room since 1999. Based on feedback from you, our users, we've made some improvements that make it easier than ever to read thousands of publications on our website.

    Do you want to take a quick tour of the OpenBook's features?

    No Thanks Take a Tour »
  2. ×

    Show this book's table of contents, where you can jump to any chapter by name.

    « Back Next »
  3. ×

    ...or use these buttons to go back to the previous chapter or skip to the next one.

    « Back Next »
  4. ×

    Jump up to the previous page or down to the next one. Also, you can type in a page number and press Enter to go directly to that page in the book.

    « Back Next »
  5. ×

    Switch between the Original Pages, where you can read the report as it appeared in print, and Text Pages for the web version, where you can highlight and search the text.

    « Back Next »
  6. ×

    To search the entire text of this book, type in your search term here and press Enter.

    « Back Next »
  7. ×

    Share a link to this book page on your preferred social network or via email.

    « Back Next »
  8. ×

    View our suggested citation for this chapter.

    « Back Next »
  9. ×

    Ready to take your reading offline? Click here to buy this book in print or download it as a free PDF, if available.

    « Back Next »
Stay Connected!