Paper 2010/531
Comparison of seven SHA-3 candidates software implementations on smart cards.
Mourad Gouicem
Abstract
In this work, we present and compare seven SHA-3 second-round candidates implementations on two different architectures used on smart cards: the Intel 8051 and the ARM7TDMI. After presenting the performances of our implementations, we explain for each candidate the main differences between our 8-bit and 32-bit implementations. Then, we compare our results to those of two benchmarks published at the second SHA-3 candidates conference this summer, and deduce a ranking according to performance and what we call 8-bit tolerance.
Metadata
- Available format(s)
- Category
- Implementation
- Publication info
- Published elsewhere. Unknown where it was published
- Contact author(s)
- g piret @ oberthur com
- History
- 2010-10-19: received
- Short URL
- https://ia.cr/2010/531
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2010/531, author = {Mourad Gouicem}, title = {Comparison of seven {SHA}-3 candidates software implementations on smart cards.}, howpublished = {Cryptology {ePrint} Archive, Paper 2010/531}, year = {2010}, url = {https://eprint.iacr.org/2010/531} }