The New SHA-3 Software Shootout

This paper introduces a new graphing mechanism to allow easy comparison of software performance of the SHA-3 candidates. The new mechanism concisely captures a large amount of performance data without oversimplifying the data. The authors have integrated this graphing mechanism into their eBASH (ECRYPT Benchmarking of All Submitted Hashes) project. New graphs are automatically posted at the top of whenever the eBASH performance results are updated. This paper includes snapshots of these graphs, but readers are advised to check the web page for the latest updates.

Provided by: University of Illinois at Chicago Topic: Security Date Added: Feb 2012 Format: PDF

Find By Topic