Cryptology ePrint Archive: Report 2010/531

Comparison of seven SHA-3 candidates software implementations on smart cards.

Mourad Gouicem

Abstract: In this work, we present and compare seven SHA-3 second-round candidates implementations on two different architectures used on smart cards: the Intel 8051 and the ARM7TDMI. After presenting the performances of our implementations, we explain for each candidate the main differences between our 8-bit and 32-bit implementations. Then, we compare our results to those of two benchmarks published at the second SHA-3 candidates conference this summer, and deduce a ranking according to performance and what we call 8-bit tolerance.

Category / Keywords: implementation /

Date: received 18 Oct 2010

Contact author: g piret at oberthur com

Available format(s): PDF | BibTeX Citation

Version: 20101019:213026 (All versions of this report)

Discussion forum: Show discussion | Start new discussion

[ Cryptology ePrint archive ]