VAMPIRE

eBACS: ECRYPT Benchmarking of Cryptographic Systems


ECRYPT II
General information: Introduction eBASH eBASC eBAEAD eBATS SUPERCOP XBX Computers
How to submit new software: Tips hash stream aead dh kem encrypt sign
List of primitives measured: lwc sha3 hash stream lwc caesar aead dh kem encrypt sign
Measurements indexed by machine: lwc sha3 hash stream lwc caesar aead dh kem encrypt sign
List of subroutines: verify decode encode sort core hashblocks scalarmult

List of scalarmult subroutines

Typically crypto_scalarmult is used as a subroutine inside crypto_dh.

PrimitiveDescriptionDesigners
curve25519 Curve25519 scalar multiplication Daniel J. Bernstein
kummer
nistp256 NIST P-256 scalar multiplication

Implementations

PrimitiveImplementationAuthors
curve25519amd64-51 Daniel J. Bernstein
Niels Duif
Tanja Lange
lead: Peter Schwabe
Bo-Yin Yang
curve25519amd64-64 Daniel J. Bernstein
Niels Duif
Tanja Lange
lead: Peter Schwabe
Bo-Yin Yang
curve25519athlon Daniel J. Bernstein
curve25519costigan-schwabe/cbe Neil Costigan (Dublin City University)
Peter Schwabe (Technische Universiteit Eindhoven)
curve25519donna Adam Langley (Google)
curve25519donna_c64 Adam Langley (Google)
curve25519neon2 Daniel J. Bernstein
Peter Schwabe
curve25519ref10 D. J. Bernstein
curve25519ref Matthew Dempsky (Mochi Media)
curve25519rust_crypto
curve25519sandy2x Tung Chou
kummeravx2
kummeravx2int
kummeravx
kummerneon
kummerref5
kummerref5u
nistp256mj32 Jan Mojzis

Version

This is version 2024.03.23 of the primitives-scalarmult.html web page. This web page is in the public domain.