Cryptology ePrint Archive: Report 2012/004

The new SHA-3 software shootout

Daniel J. Bernstein and Tanja Lange

Abstract: This paper introduces a new graphing mechanism to allow easy comparison of software performance of the SHA-3 candidates. The new mechanism concisely captures a large amount of performance data without oversimplifying the data.

We have integrated this graphing mechanism into our eBASH (ECRYPT Benchmarking of All Submitted Hashes) project. New graphs are automatically posted at the top of whenever the eBASH performance results are updated. This paper includes snapshots of these graphs, but readers are advised to check the web page for the latest updates.See for more information regarding eBASH.

Category / Keywords: implementation / SHA-3 competition, benchmarking, eBASH

Date: received 3 Jan 2012, last revised 20 Feb 2012

Contact author: tanja at hyperelliptic org

Available format(s): PDF | BibTeX Citation

Version: 20120220:180416 (All versions of this report)

Short URL:

[ Cryptology ePrint archive ]