Call for Papers for the Second SHA-3 Candidate Conference Santa Barbara, CA August 23-24, 2010 Submission deadline: May 10, 2010 (Conference without proceedings) The SHA-3 competition has entered the second round, in which 14 second-round candidate algorithms are being considered for SHA-3. NIST plans to host a Second SHA-3 Candidate Conference in August, 2010 to discuss various aspects of these candidates, and to obtain valuable feedback for the selection of the finalists soon after the conference. NIST is soliciting research and discussion papers, surveys, presentations, case studies, panel proposals, and participation from all interested parties, including researchers, system architects, implementers, vendors, and users. NIST will post the accepted papers and presentations on the conference web site after the conference; however, no formal conference proceedings will be published. NIST encourages the submission of presentations and reports on preliminary work that participants plan to publish elsewhere. To avoid the possible duplication of papers accepted for this conference and for Crypto and CHES 2010, which are held consecutively, submissions will NOT be considered for this conference if they are substantially similar to the submissions accepted for Crypto 2010 and CHES 2010. Topics for submissions should include, but are not limited to, the following: . Cryptanalysis of the candidates, including cryptanalysis of weakened or toy versions; . Analysis of relative performance or resource requirements for some or all of the candidates; . Statistical or other automated analyses or comparisons of the candidates; . Substantial improvements in the implementation of the candidates; . Improved analysis or proofs of properties of the candidates, even when this doesn't lead to any attack; and . Proposed criteria to be used for selecting the finalists. Deadlines: . Submission Deadline: May 10, 2010 . Authors Notified: June 18, 2010 . Final Version Deadline: July 23, 2010 Submissions should be provided electronically, in PDF, for standard US letter-size paper (8.5 x 11 inches). Submission papers must not exceed 15 pages (single space, with 1 inch margins using a 10 pt or larger font). Proposals for presentations or panels should be no longer than five pages; panel proposals should include possible panelists and an indication of which panelists have confirmed their participation. Please submit the following information to hash-function@nist.gov . Name, affiliation, email, phone number, postal address for the primary submitter . First name, last name, and affiliation of each co-submitter . The finished paper, presentation, or panel proposal in PDF format as an attachment. All submissions will be acknowledged. General information about the conference, including the registration and accommodation information will be available at the conference website: http://www.nist.gov/hash-function.