In response to the discovery of vulnerabilities in SHA-1, the National Institute of Standards and Technology intends to launch a public competition similar to the one that led to AES. A tentative agenda has been released on NIST's website.
The first step in this agenda is of course the Second Cryptographic Hash Workshop, to be held in conjunction with CRYPTO 2006.
Previous News
SHA-1 broken
It seems it finally happened: three Chinese researchers announced they found a method of obtaining collisions on the full SHA-1 hash function. If this result is confirmed, it means that SHA-1 is broken. more
Does the proof of the Riemann hypothesis really bring the whole of ecommerce to its knees?
Recent news argues that a proof of Riemann hypothesis has been discovered, and that this breakthrough could "bring disaster for ecommerce". What are the actual implications on cryptography? more
Secure Hash Standard (SHS)
SHA-1 Broken: Collision Attack Found, Implications for Cryptography
NIST is issuing a tentative agenda for the development of a SHA successor
Does the proof of the Riemann hypothesis really bring the whole of ecommerce to its knees?
The Cost of Insecurity: Understanding the “Non-Loss” Benefit of Cryptography
The Cost of “Just Enough” Security: Why Good Cryptography isn’t More Expensive
Cryptographer Consulting: Security Transparency vs. Relying on Ourselves
Why do people believe they should handle cryptography themselves?
The Illusion of Simplicity: Why Designing Your Own Cryptography Fails
Why Do I Need a Cryptographer?
Founding Members
Academic and Historical References
What Is Our Methodology?
Security Courses, Cryptography Consulting, System Evaluation & TTP Services
Bridging The Gap Between Scientific Research And Industry Needs