The new SHA-3 software shootout

D.J. Bernstein, T. Lange

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

42 Downloads (Pure)

Abstract

§ 1. Introduction This paper introduces a new graphing mechanism to allow easy comparison of software performance of the SHA-3 candidates. The new mechanism concisely captures a large amount of performance data without oversimplifying the data. We have integrated this graphing mechanism into our eBASH (ECRYPT Benchmark- ing of All Submitted Hashes) project. New graphs are automatically posted at the top of http://bench.cr.yp.to/results-sha3.html whenever the eBASH performance results are updated. This paper includes snapshots of these graphs, but readers are advised to check the web page for the latest updates. See http://bench.cr.yp.to for more information regarding eBASH. For each function there is also a similar graph online comparing implementations of that function, showing in a concise way which implementations are slow or non-functional. Im- plementors can follow links from http://bench.cr.yp.to/primitives-sha3.html to find these graphs. Of course, users concerned about performance will reject slower implementa- tions in favor of faster implementations, so the main shootout graphs re ect only the fastest implementations.
Original languageEnglish
Title of host publicationThird SHA-3 Candidate Conference (Washington DC, USA, March 22-23, 2012)
Place of PublicationGaithersburg MD
PublisherNational Institute of Standards and Technology (NIST)
Pages1-13
Publication statusPublished - 2012

Fingerprint

Websites

Cite this

Bernstein, D. J., & Lange, T. (2012). The new SHA-3 software shootout. In Third SHA-3 Candidate Conference (Washington DC, USA, March 22-23, 2012) (pp. 1-13). Gaithersburg MD: National Institute of Standards and Technology (NIST).
Bernstein, D.J. ; Lange, T. / The new SHA-3 software shootout. Third SHA-3 Candidate Conference (Washington DC, USA, March 22-23, 2012). Gaithersburg MD : National Institute of Standards and Technology (NIST), 2012. pp. 1-13
@inproceedings{17f183210b0841baa71b34064977f447,
title = "The new SHA-3 software shootout",
abstract = "§ 1. Introduction This paper introduces a new graphing mechanism to allow easy comparison of software performance of the SHA-3 candidates. The new mechanism concisely captures a large amount of performance data without oversimplifying the data. We have integrated this graphing mechanism into our eBASH (ECRYPT Benchmark- ing of All Submitted Hashes) project. New graphs are automatically posted at the top of http://bench.cr.yp.to/results-sha3.html whenever the eBASH performance results are updated. This paper includes snapshots of these graphs, but readers are advised to check the web page for the latest updates. See http://bench.cr.yp.to for more information regarding eBASH. For each function there is also a similar graph online comparing implementations of that function, showing in a concise way which implementations are slow or non-functional. Im- plementors can follow links from http://bench.cr.yp.to/primitives-sha3.html to find these graphs. Of course, users concerned about performance will reject slower implementa- tions in favor of faster implementations, so the main shootout graphs re ect only the fastest implementations.",
author = "D.J. Bernstein and T. Lange",
year = "2012",
language = "English",
pages = "1--13",
booktitle = "Third SHA-3 Candidate Conference (Washington DC, USA, March 22-23, 2012)",
publisher = "National Institute of Standards and Technology (NIST)",

}

Bernstein, DJ & Lange, T 2012, The new SHA-3 software shootout. in Third SHA-3 Candidate Conference (Washington DC, USA, March 22-23, 2012). National Institute of Standards and Technology (NIST), Gaithersburg MD, pp. 1-13.

The new SHA-3 software shootout. / Bernstein, D.J.; Lange, T.

Third SHA-3 Candidate Conference (Washington DC, USA, March 22-23, 2012). Gaithersburg MD : National Institute of Standards and Technology (NIST), 2012. p. 1-13.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

TY - GEN

T1 - The new SHA-3 software shootout

AU - Bernstein, D.J.

AU - Lange, T.

PY - 2012

Y1 - 2012

N2 - § 1. Introduction This paper introduces a new graphing mechanism to allow easy comparison of software performance of the SHA-3 candidates. The new mechanism concisely captures a large amount of performance data without oversimplifying the data. We have integrated this graphing mechanism into our eBASH (ECRYPT Benchmark- ing of All Submitted Hashes) project. New graphs are automatically posted at the top of http://bench.cr.yp.to/results-sha3.html whenever the eBASH performance results are updated. This paper includes snapshots of these graphs, but readers are advised to check the web page for the latest updates. See http://bench.cr.yp.to for more information regarding eBASH. For each function there is also a similar graph online comparing implementations of that function, showing in a concise way which implementations are slow or non-functional. Im- plementors can follow links from http://bench.cr.yp.to/primitives-sha3.html to find these graphs. Of course, users concerned about performance will reject slower implementa- tions in favor of faster implementations, so the main shootout graphs re ect only the fastest implementations.

AB - § 1. Introduction This paper introduces a new graphing mechanism to allow easy comparison of software performance of the SHA-3 candidates. The new mechanism concisely captures a large amount of performance data without oversimplifying the data. We have integrated this graphing mechanism into our eBASH (ECRYPT Benchmark- ing of All Submitted Hashes) project. New graphs are automatically posted at the top of http://bench.cr.yp.to/results-sha3.html whenever the eBASH performance results are updated. This paper includes snapshots of these graphs, but readers are advised to check the web page for the latest updates. See http://bench.cr.yp.to for more information regarding eBASH. For each function there is also a similar graph online comparing implementations of that function, showing in a concise way which implementations are slow or non-functional. Im- plementors can follow links from http://bench.cr.yp.to/primitives-sha3.html to find these graphs. Of course, users concerned about performance will reject slower implementa- tions in favor of faster implementations, so the main shootout graphs re ect only the fastest implementations.

M3 - Conference contribution

SP - 1

EP - 13

BT - Third SHA-3 Candidate Conference (Washington DC, USA, March 22-23, 2012)

PB - National Institute of Standards and Technology (NIST)

CY - Gaithersburg MD

ER -

Bernstein DJ, Lange T. The new SHA-3 software shootout. In Third SHA-3 Candidate Conference (Washington DC, USA, March 22-23, 2012). Gaithersburg MD: National Institute of Standards and Technology (NIST). 2012. p. 1-13