Computer Security Resource Center

Computer Security Resource Center

Computer Security
Resource Center

Hash Functions

Past Events

SHA-3 2014 Workshop
August 22, 2014
The goal of the workshop was to engage the cryptographic community to help NIST get a better understanding of SHA-3 and its possible applications, with particular focus on additional modes of operation for SHA-3 that might...
The Third SHA-3 Candidate Conference
March 22, 2012 - March 23, 2012
The purpose of the Third SHA-3 Candidate Conference was to discuss the SHA-3 finalist algorithms, and to solicit public feedback before NIST selected a winning algorithm for standardization later in 2012.Call for...
The Second SHA-3 Candidate Conference
August 23, 2010 - August 24, 2010
The purpose of the Second SHA-3 Candidate Conference was to discuss the second-round candidates, and to obtain feedback for the selection of the finalists soon after the conference.Call for PapersAugust 2010 SHA-3...
First SHA-3 Candidate Conference
February 25, 2009 - February 28, 2009
The purpose of the SHA-3 Conference was to allow the submitters of the first round candidates to present their algorithms, and for NIST to discuss the way forward with the competition.Selected NIST Presentations:System...
Second Cryptographic Hash Workshop
August 24, 2006 - August 25, 2006
The Second Cryptographic Hash Workshop was held on Aug. 24-25, 2006, at University of California, Santa Barbara, in conjunction with Crypto 2006. 210 members of the global cryptographic community attended the workshop. The...
First Cryptographic Hash Workshop
October 31, 2005 - November 1, 2005
On Oct. 31-Nov. 1, 2005, 180 members of the global cryptographic community gathered in Gaithersburg, Maryland to attend the first Cryptographic Hash Workshop. The workshop was organized in response to a recent attack...
Created January 04, 2017, Updated January 31, 2018