The new SHA-3 software shootout

Onderzoeksoutput: Boek/rapportRapportAcademic

10 Downloads (Pure)

Samenvatting

This paper introduces a new graphing mechanism to allow easy comparison of software performance of the SHA-3 candidates. The new mechanism concisely captures a large amount of performance data without oversimplifying the data. We have integrated this graphing mechanism into our eBASH (ECRYPT Benchmarking of All Submitted Hashes) project. New graphs are automatically posted at the top of http://bench.cr.yp.to/results-sha3.html whenever the eBASH performance results are updated. This paper includes snapshots of these graphs, but readers are advised to check the web page for the latest updates.See http://bench.cr.yp.to for more information regarding eBASH. Keywords: SHA-3 competition, benchmarking, eBASH
Originele taal-2Engels
UitgeverijIACR
Aantal pagina's13
StatusGepubliceerd - 2012

Publicatie series

NaamCryptology ePrint Archive
Volume2012/004

Vingerafdruk Duik in de onderzoeksthema's van 'The new SHA-3 software shootout'. Samen vormen ze een unieke vingerafdruk.

Citeer dit