VAMPIRE

eBACS: ECRYPT Benchmarking of Cryptographic Systems


ECRYPT II
General information: Introduction eBASH eBASC eBAEAD eBATS SUPERCOP XBX Computers
How to submit new software: Tips hash stream aead dh kem encrypt sign
List of primitives measured: sha3 hash stream caesar aead dh kem encrypt sign
Measurements indexed by machine: sha3 hash stream caesar aead dh kem encrypt sign

eBATS: ECRYPT Benchmarking of Asymmetric Systems

The eBATS (ECRYPT Benchmarking of Asymmetric Systems) project, part of eBACS, measures public-key systems according to the following criteria: "Time" refers to time on real computers: time on an ARM Cortex-A8, time on an Intel Sandy Bridge, time on an Intel Haswell, etc. The point of these cost measures is that they are directly visible to the cryptographic user. eBATS times each system on a wide variety of computers, ensuring direct comparability of all systems on whichever computers are of interest to the users.

There are separate pages explaining how to submit public-key Diffie–Hellman secret-sharing systems, key-encapsulation mechanisms, public-key cryptosystems, and public-key signature systems to eBATS. There are also pages listing the public-key Diffie–Hellman secret-sharing systems, key-encapsulation mechanisms, public-key cryptosystems, and public-key signature systems already submitted to eBATS. There are also pages presenting the latest eBATS measurements for public-key Diffie–Hellman secret-sharing systems, key-encapsulation mechanisms, public-key cryptosystems, and public-key signature systems.

This web page supersedes http://www.ecrypt.eu.org/ebats, the original eBATS web page.

Version

This is version 2018.08.25 of the ebats.html web page. This web page is in the public domain.