Cryptology ePrint Archive: Report 2010/531
Comparison of seven SHA-3 candidates software implementations on smart cards.
Abstract: In this work, we present and compare seven SHA-3 second-round candidates implementations on two different architectures used on smart cards: the Intel 8051 and the ARM7TDMI. After presenting the performances of our implementations, we explain for each candidate the main differences between our 8-bit and 32-bit implementations. Then, we compare our results to those of two benchmarks published at the second SHA-3 candidates conference this summer, and deduce a ranking according to performance and what we call 8-bit tolerance.
Category / Keywords: implementation /
Date: received 18 Oct 2010
Contact author: g piret at oberthur com
Available formats: PDF | BibTeX Citation
Version: 20101019:213026 (All versions of this report)
Discussion forum: Show discussion | Start new discussion
[ Cryptology ePrint archive ]