![]() VAMPIRE |
eBACS: ECRYPT Benchmarking of Cryptographic Systems |
![]() ECRYPT II |
---|
General information: | Introduction | eBASH | eBASC | eBAEAD | eBATS | SUPERCOP | XBX | Computers |
---|
How to submit new software: | Tips | hash | stream | aead | dh | kem | encrypt | sign |
---|
List of primitives measured: | lwc | sha3 | hash | stream | lwc | caesar | aead | dh | kem | encrypt | sign |
---|
Measurements indexed by machine: | lwc | sha3 | hash | stream | lwc | caesar | aead | dh | kem | encrypt | sign |
---|
List of subroutines: | verify | decode | encode | sort | core | hashblocks | scalarmult |
---|
Primitive | Description | Designers |
---|---|---|
8 | ||
16 | ||
32 | ||
897 | ||
1025 | ||
1039 | ||
1167 | ||
1184 | ||
1312 |
Primitive | Implementation | Authors |
---|---|---|
8 | ref | |
16 | ref | |
32 | ref | |
897 | avx | |
897 | ref | |
1025 | avx | |
1025 | ref | |
1039 | avx | |
1039 | ref | |
1167 | avx | |
1167 | ref | |
1184 | avx | |
1184 | ref | |
1312 | avx | |
1312 | ref |