The new SHA-3 software shootout

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

49 Downloads (Pure)

Abstract

§ 1. Introduction This paper introduces a new graphing mechanism to allow easy comparison of software performance of the SHA-3 candidates. The new mechanism concisely captures a large amount of performance data without oversimplifying the data. We have integrated this graphing mechanism into our eBASH (ECRYPT Benchmark- ing of All Submitted Hashes) project. New graphs are automatically posted at the top of http://bench.cr.yp.to/results-sha3.html whenever the eBASH performance results are updated. This paper includes snapshots of these graphs, but readers are advised to check the web page for the latest updates. See http://bench.cr.yp.to for more information regarding eBASH. For each function there is also a similar graph online comparing implementations of that function, showing in a concise way which implementations are slow or non-functional. Im- plementors can follow links from http://bench.cr.yp.to/primitives-sha3.html to find these graphs. Of course, users concerned about performance will reject slower implementa- tions in favor of faster implementations, so the main shootout graphs re ect only the fastest implementations.
Original languageEnglish
Title of host publicationThird SHA-3 Candidate Conference (Washington DC, USA, March 22-23, 2012)
Place of PublicationGaithersburg MD
PublisherNational Institute of Standards and Technology (NIST)
Pages1-13
Publication statusPublished - 2012

Fingerprint Dive into the research topics of 'The new SHA-3 software shootout'. Together they form a unique fingerprint.

Cite this