Events 2005 First Cryptographic Hash Workshop
First Cryptographic Hash Workshop
On Oct. 31-Nov. 1, 2005, 180 members of the global cryptographic community gathered in Gaithersburg, Maryland to attend the first Cryptographic Hash Workshop. The workshop was organized in response to a recent attack on the NIST-approved Secure Hash Algorithm SHA-1. The purpose of the workshop was to discuss this attack, assess the status of other NIST-approved hash algorithms, and discuss possible near-and long-term options.
Call for Papers
Workshop Report - The First Cryptographic Hash Workshop
Selected Presentations:
- Where Should We Go From Here, Bill Burr, NIST
- Herding Hash Functions and the Nostradamus Attack, John Kelsey, NIST
- SHA-160: A Truncation Mode for SHA256 (and most other hashes), John Kelsey, NIST
- Design Principles for Hash Functions Revisited, Bart Preneel, Katholieke Universiteit Leuven, COSIC
- Cryptanalysis on SHA-1, Xiaoyun Wang, Tsinghua University & Shandong University
- Cryptographic Hash Functions from Expander Graphs, Presented by: Josh Benaloh, Microsoft Research (co-authors: Denis Charles, Microsoft Research; Eyal Goren, McGill University; Kristin Lauter, Microsoft Research)
Event Details
Starts: October 31, 2005 - 07:00 AM EST
Ends: November 01, 2005 - 04:00 PM EST
Format: In-person
Type: Workshop
Attendance Type: Open to public
Audience Type: Industry,Government,Academia
Location
NIST
Gaithersburg, MD
Created January 17, 2017, Updated February 26, 2018