VAMPIRE

eBACS: ECRYPT Benchmarking of Cryptographic Systems


ECRYPT II
General information: Introduction eBASH eBASC eBAEAD eBATS SUPERCOP XBX Computers
How to submit new software: Tips hash stream aead dh kem encrypt sign
List of primitives measured: lwc sha3 hash stream lwc caesar aead dh kem encrypt sign
Measurements indexed by machine: lwc sha3 hash stream lwc caesar aead dh kem encrypt sign
List of subroutines: verify decode encode sort core hashblocks scalarmult

List of verify subroutines

PrimitiveDescriptionDesigners
8
16
32
897
1025
1039
1167
1184
1312
1349
1455
1477
1583
1847
1975
127vartime

Implementations

PrimitiveImplementationAuthors
8ref
8rust
16ref
32ref
897avx
897ref
1025avx
1025ref
1039avx
1039ref
1167avx
1167ref
1184avx
1184ref
1312avx
1312ref
1349avx
1349ref
1455avx
1455ref
1477avx
1477ref
1583avx
1583ref
1847avx
1847ref
1975avx
1975ref
127vartimeref

Version

This is version 2024.03.23 of the primitives-verify.html web page. This web page is in the public domain.