VAMPIRE

eBACS: ECRYPT Benchmarking of Cryptographic Systems


ECRYPT II
General information: Introduction eBASH eBASC eBAEAD eBATS SUPERCOP XBX Computers
How to submit new software: Hash functions Stream ciphers Auth ciphers DH functions Public-key encryption Public-key signatures
List of primitives measured: SHA-3 finalists All hash functions Stream ciphers CAESAR candidates All auth ciphers DH functions Public-key encryption Public-key signatures
Measurements indexed by machine: SHA-3 finalists All hash functions Stream ciphers CAESAR candidates All auth ciphers DH functions Public-key encryption Public-key signatures

eBASC: ECRYPT Benchmarking of Stream Ciphers

The eBASC (ECRYPT Benchmarking of Stream Ciphers) project, part of eBACS, measures stream ciphers according to the following criteria: "Time" refers to time on real computers: time on an ARM Cortex-A8, time on an Intel Sandy Bridge, time on an Intel Haswell, etc. The point of these cost measures is that they are directly visible to the cryptographic user. eBASC times each stream cipher on a wide variety of computers, ensuring direct comparability of all systems on whichever computers are of interest to the users.

There are separate pages explaining how to submit stream ciphers to eBASC, listing the stream ciphers already submitted, and presenting the latest eBASC measurements.

Version

This is version 2016.07.15 of the ebasc.html web page. This web page is in the public domain.