VAMPIRE |
eBACS: ECRYPT Benchmarking of Cryptographic Systems |
ECRYPT II |
---|
General information: | Introduction | eBASH | eBASC | eBAEAD | eBATS | SUPERCOP | XBX | Computers | Arch |
---|
How to submit new software: | Tips | hash | stream | aead | dh | kem | encrypt | sign |
---|
List of primitives measured: | lwc | sha3 | hash | stream | lwc | caesar | aead | dh | kem | encrypt | sign |
---|
Measurements: | lwc | sha3 | hash | stream | lwc | caesar | aead | dh | kem | encrypt | sign |
---|
List of subroutines: | verify | decode | encode | sort | core | hashblocks | xof | scalarmult |
---|
Primitive | Description | Designers |
---|---|---|
bitwrite16 | ||
shake256 |
Primitive | Implementation | Authors |
---|---|---|
bitwrite16 | 128 | |
bitwrite16 | 256 | |
bitwrite16 | 256x4 | |
bitwrite16 | 256x4x2 | |
bitwrite16 | 64 | |
bitwrite16 | 64x4 | |
bitwrite16 | 64x4x2 | |
bitwrite16 | ref | |
shake256 | openssl | |
shake256 | tweet | |
shake256 | unrollround | |
shake256 | usekcp |