In response to the discovery of vulnerabilities in SHA-1, the National Institute of Standards and Technology intends to launch a public competition similar to the one that led to AES. A tentative agenda has been released on NIST's website.

The first step in this agenda is of course the Second Cryptographic Hash Workshop, to be held in conjunction with CRYPTO 2006.

Previous News

SHA-1 broken

It seems it finally happened: three Chinese researchers announced they found a method of obtaining collisions on the full SHA-1 hash function. If this result is confirmed, it means that SHA-1 is broken. more
Does the proof of the Riemann hypothesis really bring the whole of ecommerce to its knees?
Recent news argues that a proof of Riemann hypothesis has been discovered, and that this breakthrough could "bring disaster for ecommerce". What are the actual implications on cryptography? more