Try the new CSRC.nist.gov and let us know what you think!
(Note: Beta site content may not be complete.)

View the beta site
NIST Logo and ITL Banner Link to the NIST Homepage Link to the ITL Homepage Link to the NIST Homepage

recent conferences

Security Events & Conferences

 

May 2-3, 2016: Random Bit Generation Workshop 2016

June 11-12, 2015
Workshop on Elliptic Curve Cryptography Standards

July 20-21, 2015 Lightweight Cryptography Workshop

April 2-3, 2015 Workshop on Cybersecurity in a Post-Quantum World

March 30-April 1, 2015 IACR International Conference on Practice and Theory of Public-Key Cryptography (PKC) 2015 (NIST Hosted)

August 22, 2014 SHA-3 2014 Workshop

March 4-5, 2014 Cryptographic Key Management Workshop 2014

April 10-11, 2013 - Workshop on Improving Trust in the Online Marketplace

December 5-6, 2012 - Random Bit Generation Workshop

September 10-11, 2012 - Cryptographic Key Management Workshop 2012

March 22-23, 2012 - Third SHA-3 Candidate Conference

March 13-14, 2012 - NSTIC-IDtrust 2012 Workshop

December 8-9, 2011 - Meeting on Privacy-Enhancing Cryptography

November 7-8, 2011 - Workshop on Cryptography for Emerging Technologies and Applications

April 6-7, 2011 - 10th Symposium on Identity and Trust on the Internet (IDtrust 2011) (archived site)


September 20-21, 2010 - Cryptographic Key Management Workshop

August 23-24, 2010 - Second SHA-3 Candidate Conference

August 6-7, 2010 - Workshop on UOCAVA Remote Voting Systems

April 21, 2010 - Qualifying Identity and Privilege Credential Products for the Transportation Worker Identification Credential (TWIC) and other DHS/TSA programs Qualified Product Lists (QPL)

April 13-15, 2010 - 9th Symposium on Identity and Trust on the Internet (IDtrust 2010) (archived site)


October 13-14, 2009 - End-to-End Voting Systems Worskhop

June 8-9, 2009 - Key Management Workshop

April 14-16, 2009 - 8th Symposium on Identity and Trust on the Internet (IDtrust 2009) (archived site)

February 25-28, 2009 - The First SHA-3 Candidate Conference (presentations available on-line)


June 3-4, 2008 - Applications of Pairing Based Cryptography: Identity Based Encryption and Beyond

March 4-6, 2008 - 7th Symposium on Identity and Trust on the Internet (IDtrust 2008) (archived site)


April 17-19, 2007 - 6th Annual PKI R&D Workshop: Applications-Driven PKI (It's the Apps, Stupid!) (archived site)

September 19-21, 2006 - Biometric Consortium Conference 2006 (BC2006)

August 24-24, 2006 - Second Cryptographic Hash Workshop (papers and presentations available on-line)

April 4-6, 2006 - 5th Annual PKI R&D Workshop: Making PKI Easy to Use (archived site)

October 31-November 1, 2005 - Cryptographic Hash Workshop (papers and presentations available on-line)

September 19-21, 2005 - Biometric Consortium Conference 2005