BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//Talks.cam//talks.cam.ac.uk//
X-WR-CALNAME:Talks.cam
BEGIN:VEVENT
SUMMARY:Theory and practice for hash functions - Preneel\, B (KU Leuven)
DTSTART:20120201T140000Z
DTEND:20120201T144500Z
UID:TALK36097@talks.cam.ac.uk
CONTACT:Mustapha Amrani
DESCRIPTION:In the last seven years we have witnessed a surge in the crypt
 analysis of hash functions. The most visible result was the cryptanalysis 
 of MD5 and SHA-1 by Wang et al.\, but there have been other results includ
 ing multi-collision attacks\, long message second preimage attacks\, and r
 ebound attacks. There has also been substantial progress in understanding 
 security definitions and models (e.g. indifferentiability) and a large num
 ber of security reductions has been proven. In 2007\, NIST has launched th
 e call for the SHA-3 competition.  In 2008 more than 60 submissions were r
 eceived\, which makes this the largest open cryptographic competition to d
 ate.  In this talk we will discuss the impact of the research on hash func
 tions on practice and the interaction between theory and practice in the S
 HA-3 competition.
LOCATION:Seminar Room 1\, Newton Institute
END:VEVENT
END:VCALENDAR
