ECRYPT II Yearly Report on Algorithms and Key Lengths

For those who aren’t aware of it yet: the ECRYPT II Network of Excellence maintains »a list of recommended cryptographic algorithms (e.g. block ciphers, hash functions, signature schemes, etc) and recommended keysizes and other parameter settings (where applicable) to reach specified security objectives.« This list is available as a public report, one can download the current version from their web site. If you need to assess the security and suitability of an algorithm used somewhere, this might be a valuable source.