Cryptology ePrint Archive: Report 2009/510

High-Speed Hardware Implementations of BLAKE, Blue Midnight Wish, CubeHash, ECHO, Fugue, Gr{\o}stl, Hamsi, JH, Keccak, Luffa, Shabal, SHAvite-3, SIMD, and Skein

Stefan Tillich and Martin Feldhofer and Mario Kirschbaum and Thomas Plos and J{\"o}rn-Marc Schmidt and Alexander Szekely

Abstract: In this paper we describe our high-speed hardware implementations of the 14 candidates of the second evalution round of the \mbox{SHA-3} hash function competition. We synthesized all implementations using a uniform tool chain, standard-cell library, target technology, and optimization heuristic. This work provides the fairest comparison of all second-round candidates to date.

Category / Keywords: implementation / SHA-3, round 2, hardware, ASIC, standard-cell implementation, high speed, high throughput, BLAKE, Blue Midnight Wish, CubeHash, ECHO, Fugue, Gr{\o}stl, Hamsi, JH, Keccak, Luffa, Shabal, SHAvite-3, SIMD, Skein

Date: received 21 Oct 2009, last revised 11 Nov 2009

Contact author: Stefan Tillich at iaik tugraz at

Available format(s): PDF | BibTeX Citation

Note: Version 2.0, November 11, 2009

Version: 20091111:173556 (All versions of this report)

Discussion forum: Show discussion | Start new discussion


[ Cryptology ePrint archive ]