Dear NIST , all , In round 1 technical evaluation , NIST intends to perform an efficiency analysis on Intel
نویسنده
چکیده
We would like to explain why AES instructions should be considered: Based on our observation that Intel CPU performance figures of several SHA-3 candidates are due to the use of instructions in SSE, we think that new version of SSE which employs AES instructions should be considered as the same way as the current version of it. We expect that Intel CPUs with AES instructions will be widely used by the end of the SHA-3 competition.
منابع مشابه
Hardware Performance Simulations of Round 2 Advanced Encryption Standard Algorithms
The National Security Agency (NSA) is providing hardware simulation support and performance measurements to aid NIST in their selection of the AES algorithm. Although much of the Round 1 analysis focused on software, much more attention will be directed towards hardware implementation issues in the Round 2 analysis. As NIST has stated, a common set of assumptions will be essential in comparing ...
متن کاملUpdate on Finalist Grøstl
Dear all, as announced in December the Grøstl hash function has been tweaked for the final round. The round3mods, updated specification, implementation and cryptanalysis are available at www.groestl.info. For the final round we have * significantly increased the size of the round constants to make the internal differential attack and its extensions impossible * and use different rotation consta...
متن کاملImproving the performance of Luffa Hash Algorithm
Luffa is a new hash algorithm that has been accepted for round two of the NIST hash function competition SHA-3. Computational efficiency is the second most important evaluation criteria used to compare candidate algorithms. In this paper, we describe a fast software implementation of the Luffa hash algorithm for the Intel Core 2 Duo platform. We explore the use of the perfect shuffle operation ...
متن کاملA method for range calculation of proton in liquid water: Validation study using Monte Carlo method and NIST data
Introduction: The main advantage of using ion beams over photons in radiotherapy is due to their inverse depth-dose profiles, allowing higher doses to tumors, while better sparing normal tissues. When calculating dose distributions with ion beams, one crucial point is the uncertainty of the Bragg-peak range. Recently great effort is devoted to enhance the accuracy of the comput...
متن کاملA Hardware Wrapper for the SHA-3 Hash Algorithms
The second round of the NIST public competition is underway to find a new hash algorithm(s) for inclusion in the NIST Secure Hash Standard (SHA-3). Computational efficiency of the algorithms in hardware is to be addressed during the second round of the contest. For software implementations NIST specifies an application programming interface (API) along with reference implementation for each of ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2009