VAMPIRE

eBACS: ECRYPT Benchmarking of Cryptographic Systems


ECRYPT II
General information: Introduction eBASH eBASC eBAEAD eBATS SUPERCOP XBX Computers
How to submit new software: Tips hash stream aead dh kem encrypt sign
List of primitives measured: sha3 hash stream caesar aead dh kem encrypt sign
Measurements indexed by machine: sha3 hash stream caesar aead dh kem encrypt sign
List of subroutines: verify decode encode sort core hashblocks scalarmult

List of scalarmult subroutines

Typically crypto_scalarmult is used as a subroutine inside crypto_dh.

PrimitiveDescriptionDesigners
curve25519 Curve25519 scalar multiplication Daniel J. Bernstein
kummer
nistp256 NIST P-256 scalar multiplication

Implementations

PrimitiveImplementationAuthors
curve25519amd64-51 Daniel J. Bernstein
Niels Duif
Tanja Lange
lead: Peter Schwabe
Bo-Yin Yang
curve25519amd64-64 Daniel J. Bernstein
Niels Duif
Tanja Lange
lead: Peter Schwabe
Bo-Yin Yang
curve25519athlon Daniel J. Bernstein
curve25519costigan-schwabe/cbe Neil Costigan (Dublin City University)
Peter Schwabe (Technische Universiteit Eindhoven)
curve25519donna Adam Langley (Google)
curve25519donna_c64 Adam Langley (Google)
curve25519neon2 Daniel J. Bernstein
Peter Schwabe
curve25519ref Matthew Dempsky (Mochi Media)
curve25519ref10 D. J. Bernstein
curve25519sandy2x Tung Chou
kummeravx
kummeravx2
kummeravx2int
kummerneon
kummerref5
kummerref5u
nistp256mj32 Jan Mojzis

Version

This is version 2019.08.19 of the primitives-scalarmult.html web page. This web page is in the public domain.