VAMPIRE

eBACS: ECRYPT Benchmarking of Cryptographic Systems


ECRYPT II
General information: Introduction eBASH eBASC eBAEAD eBATS SUPERCOP XBX Computers
How to submit new software: Tips hash stream aead dh kem encrypt sign
List of primitives measured: lwc sha3 hash stream lwc caesar aead dh kem encrypt sign
Measurements indexed by machine: lwc sha3 hash stream lwc caesar aead dh kem encrypt sign
List of subroutines: verify decode encode sort core hashblocks scalarmult

eBASH: ECRYPT Benchmarking of All Submitted Hashes

The eBASH (ECRYPT Benchmarking of All Submitted Hashes) project, part of eBACS, measures hash functions according to the following criteria: "Time" refers to time on real computers: time on an ARM Cortex-A8, time on an Intel Sandy Bridge, time on an Intel Haswell, etc. The point of these cost measures is that they are directly visible to the cryptographic user. eBASH times each hash function on a wide variety of computers, ensuring direct comparability of all systems on whichever computers are of interest to the users.

There are separate pages explaining how to submit hash functions to eBASH, listing the hash functions already submitted to eBASH, and presenting the latest eBASH measurements.

Version

This is version 2016.07.15 of the ebash.html web page. This web page is in the public domain.