December 5-6, 2012 - Random Bit Generation Workshop
September 10-11, 2012 - Cryptographic Key Management Workshop 2012
March 22-23, 2012 - Third SHA-3 Candidate Conference
March 13-14, 2012 - NSTIC-IDtrust 2012 Workshop
December 8-9, 2011 - Meeting on Privacy-Enhancing Cryptography
November 7-8, 2011 - Workshop on Cryptography for Emerging Technologies and Applications
April 6-7, 2011 - 10th Symposium on Identity and Trust on the Internet (IDtrust 2011)
September 20-21, 2010 - Cryptographic Key Management Workshop
August 23-24, 2010 - Second SHA-3 Candidate Conference
August 6-7, 2010 - Workshop on UOCAVA Remote Voting Systems
April 13-15, 2010 - 9th Symposium on Identity and Trust on the Internet (IDtrust 2010)
October 13-14, 2009 - End-to-End Voting Systems Worskhop
June 8-9, 2009 - Key Management Workshop
April 14-16, 2009 - 8th Symposium on Identity and Trust on the Internet (IDtrust 2009)
February 25-28, 2009 - The First SHA-3 Candidate Conference (presentations available on-line)
June 3-4, 2008 - Applications of Pairing Based Cryptography: Identity Based Encryption and Beyond
March 4-6, 2008 - 7th Symposium on Identity and Trust on the Internet (IDtrust 2008)
April 17-19, 2007 - 6th Annual PKI R&D Workshop: Applications-Driven PKI (It's the Apps, Stupid!)
September 19-21, 2006 - Biometric Consortium Conference 2006 (BC2006)
August 24-24, 2006 - Second Cryptographic Hash Workshop (papers and presentations available on-line)
April 4-6, 2006 - 5th Annual PKI R&D Workshop: Making PKI Easy to Use
October 31-November 1, 2005 - Cryptographic Hash Workshop (papers and presentations available on-line)
September 19-21, 2005 - Biometric Consortium Conference 2005