The new SHA-3 software shootout

D.J. Bernstein, T. Lange

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

62 Downloads (Pure)


§ 1. Introduction This paper introduces a new graphing mechanism to allow easy comparison of software performance of the SHA-3 candidates. The new mechanism concisely captures a large amount of performance data without oversimplifying the data. We have integrated this graphing mechanism into our eBASH (ECRYPT Benchmark- ing of All Submitted Hashes) project. New graphs are automatically posted at the top of whenever the eBASH performance results are updated. This paper includes snapshots of these graphs, but readers are advised to check the web page for the latest updates. See for more information regarding eBASH. For each function there is also a similar graph online comparing implementations of that function, showing in a concise way which implementations are slow or non-functional. Im- plementors can follow links from to find these graphs. Of course, users concerned about performance will reject slower implementa- tions in favor of faster implementations, so the main shootout graphs re ect only the fastest implementations.
Originele taal-2Engels
TitelThird SHA-3 Candidate Conference (Washington DC, USA, March 22-23, 2012)
Plaats van productieGaithersburg MD
UitgeverijNational Institute of Standards and Technology (NIST)
StatusGepubliceerd - 2012


Duik in de onderzoeksthema's van 'The new SHA-3 software shootout'. Samen vormen ze een unieke vingerafdruk.

Citeer dit