Cryptographic competitions


Introduction
Secret-key cryptography
Disasters
Features
Focused competitions:
AES
eSTREAM
SHA-3
PHC
CAESAR
Broader evaluations:
CRYPTREC
NESSIE
CAESAR details:
Submissions
Call for submissions
Call draft 5
Call draft 4
Call draft 3
Call draft 2
Call draft 1
Committee
Frequently asked questions

CAESAR: Competition for Authenticated Encryption: Security, Applicability, and Robustness

Timeline

  • M-20, 2012.07.05–06: DIAC: Directions in Authenticated Ciphers. Stockholm.
  • M-14, 2013.01.15: Competition announced at the Early Symmetric Crypto workshop in Mondorf-les-Bains; also announced online.
  • M-7, 2013.08.11–13: DIAC 2013: Directions in Authenticated Ciphers 2013. Chicago.
  • M0, 2014.03.15: Deadline for first-round submissions.
  • M2, 2014.05.15: Deadline for first-round software.
  • M5, 2014.08.23–24: DIAC 2014: Directions in Authenticated Ciphers 2014. Santa Barbara.
  • M16, 2015.07.07: Announcement of second-round candidates.
  • M17, 2015.08.29: Deadline for second-round tweaks.
  • M18, 2015.09.15: Deadline for second-round software.
  • M18, 2015.09.28–29: DIAC 2015: Directions in Authenticated Ciphers 2015. Singapore.
  • M27, 2016.06.30: Deadline for Verilog/VHDL.
  • M29, 2016.08.15: Announcement of third-round candidates.
  • M30, 2016.09.15: Deadline for third-round tweaks.
  • M30, 2016.09.26–27: DIAC 2016. Nagoya, Japan.
  • M31, 2016.10.15: Deadline for third-round software.
  • M40, 2017.07.15: Deadline for third-round Verilog/VHDL.
  • M40, 2017.07.15: Deadline for optimized third-round software.
  • M48, 2018.03.05: Announcement of finalists.
  • M59: 2019.02.20: Announcement of final portfolio.

Version: This is version 2019.02.20 of the caesar.html web page.