How Can We Conduct "Fair and Consistent" Hardware Evaluation for SHA-3 Candidate?

Download Now
Provided by: Katholieke Universiteit Leuven
Topic: Security
Format: PDF
The objective of the NIST SHA-3 competition is to select, among multiple competing candidates, a standard algorithm for cryptographic hashing. The selected winner will need to have adequate cryptographic properties and good implementation characteristics over a wide range of target platforms including both software and hardware. The performance evaluation in hardware is particularly challenging. In technical sense, the reasons are the large design space, the wide range of target technologies and the multitude of optimization criteria.
Download Now

Find By Topic