Paper 2012/004

The new SHA-3 software shootout

Daniel J. Bernstein and Tanja Lange

Abstract

This paper introduces a new graphing mechanism to allow easy comparison of software performance of the SHA-3 candidates. The new mechanism concisely captures a large amount of performance data without oversimplifying the data. We have integrated this graphing mechanism into our eBASH (ECRYPT Benchmarking of All Submitted Hashes) project. New graphs are automatically posted at the top of http://bench.cr.yp.to/results-sha3.html whenever the eBASH performance results are updated. This paper includes snapshots of these graphs, but readers are advised to check the web page for the latest updates.See http://bench.cr.yp.to for more information regarding eBASH.

Metadata
Available format(s)
PDF
Category
Implementation
Publication info
Published elsewhere. Unknown where it was published
Keywords
SHA-3 competitionbenchmarkingeBASH
Contact author(s)
tanja @ hyperelliptic org
History
2012-02-20: revised
2012-01-05: received
See all versions
Short URL
https://ia.cr/2012/004
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2012/004,
      author = {Daniel J.  Bernstein and Tanja Lange},
      title = {The new {SHA}-3 software shootout},
      howpublished = {Cryptology {ePrint} Archive, Paper 2012/004},
      year = {2012},
      url = {https://eprint.iacr.org/2012/004}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.