SHA-3 on ARM11 Processors

نویسندگان

  • Peter Schwabe
  • Bo-Yin Yang
  • Shang-Yi Yang
چکیده

This paper presents high-speed assembly implementations of the 256-bit-output versions of all five SHA-3 finalists and of SHA-256 for the ARM11 family of processors. We report new speed records for all of the six implemented functions. For example our implementation of the round-3 version of JH-256 is 35% faster than the fastest implementation of the round-2 version of JH-256 in eBASH. Scaled with the number of rounds this is more than a 45% improvement. We also improve upon previous assembly implementations for 32-bit ARM processors. For example the implementation of Grøstl-256 described in this paper is about 20% faster than the arm32 implementation in eBASH.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The design of high-speed data transmission method for a small nuclear physics DAQ system

( 1. I nstitute of Modern Physics,Chinese Academy of Sciences,LanZhou,730000,China, 2. University of Chinese Academy of Sciences ,Beijing,100039,China) Abstract: A large number of data need to be transmitted in high-speed between Field Programmable Gate Array (FPGA) and Advanced RISC Machines 11 micro-controller (ARM11) when we design a small data acquisition (DAQ) system for nuclear experiment...

متن کامل

Design and implementation of wifi based intercom system using Arm11

---------------------------------------------------------------------***--------------------------------------------------------------------Abstract The new technology has the ability to transmit a voice over Internet protocol process networks by using an Asterisk PBX.In present day companies are implement to produce a different VoIP products to many features in market.This paper aim is introdu...

متن کامل

The Intel AES Instructions Set and the SHA-3 Candidates

The search for SHA-3 is now well-underway and the 51 accepted submissions reflect a wide variety of design approaches. A significant number are built around Rijndael/AES-based operations and, in some cases, the AES round function itself. Many of the design teams have pointed to the forthcoming Intel AES instructions set, to appear on Westmere chips during 2010, when making a variety of performa...

متن کامل

TIGER: A Fast New Hash Function

Among those cryptographic hash function which are not based on block ciphers, MD4 and Snefru seemed initially quite attractive for applications requiring fast software hashing. However collisions for Snefru were found in 1990, and recently a collision of MD4 was also found. This casts doubt on how long these functions' variants, such as RIPE-MD, MD5, SHA, SHA1 and Snefru-8, will remain unbroken...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011