Comparison of the Power Consumption of the 2nd Round SHA-3 Candidates

被引:0
|
作者
Westermann, Benedikt [1 ]
Gligoroski, Danilo [2 ]
Knapskog, Svein [1 ]
机构
[1] NTNU Q2S, N-7491 Trondheim, Norway
[2] NTNU ITEM, N-7491 Trondheim, Norway
来源
ICT INNOVATIONS 2010 | 2011年 / 83卷
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In the paper we show that the second round candidates of the NIST hash competition differ up to 22 % in their power consumption. We perform a detailed analysis of the candidates with respect to different performance parameters. Finally, we discuss the time, the power consumption, and the energy per byte as criteria to distinguish the candidates with respect to the performance.
引用
收藏
页码:102 / +
页数:3
相关论文
共 50 条
  • [1] Hardware authentication based on PUFs and SHA-3 2nd round candidates
    Eiroa, Susana
    Baturone, Iluminada
    2010 INTERNATIONAL CONFERENCE ON MICROELECTRONICS, 2010, : 319 - 322
  • [2] On security arguments of the second round SHA-3 candidates
    Andreeva, Elena
    Bogdanov, Andrey
    Mennink, Bart
    Preneel, Bart
    Rechberger, Christian
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2012, 11 (02) : 103 - 120
  • [3] On security arguments of the second round SHA-3 candidates
    Elena Andreeva
    Andrey Bogdanov
    Bart Mennink
    Bart Preneel
    Christian Rechberger
    International Journal of Information Security, 2012, 11 : 103 - 120
  • [4] Security Reductions of the Second Round SHA-3 Candidates
    Andreeva, Elena
    Mennink, Bart
    Preneel, Bart
    INFORMATION SECURITY, 2011, 6531 : 39 - +
  • [5] Fair and Consistent Hardware Evaluation of Fourteen Round Two SHA-3 Candidates
    Knezevic, Miroslav
    Kobayashi, Kazuyuki
    Ikegami, Jun
    Matsuo, Shin'ichiro
    Satoh, Akashi
    Kocabas, Uenal
    Fan, Junfeng
    Katashita, Toshihiro
    Sugawara, Takeshi
    Sakiyama, Kazuo
    Verbauwhede, Ingrid
    Ohta, Kazuo
    Homma, Naofumi
    Aoki, Takafumi
    IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, 2012, 20 (05) : 827 - 840
  • [6] Lightweight Implementations of SHA-3 Candidates on FPGAs
    Kaps, Jens-Peter
    Yalla, Panasayya
    Surapathi, Kishore Kumar
    Habib, Bilal
    Vadlamudi, Susheel
    Gurung, Smriti
    Pham, John
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2011, 2011, 7107 : 270 - 289
  • [7] Integral Distinguishers of Some SHA-3 Candidates
    Minier, Marine
    Phan, Raphael C. -W.
    Pousse, Benjamin
    CRYPTOLOGY AND NETWORK SECURITY, 2010, 6467 : 106 - +
  • [8] Developing a Hardware Evaluation Method for SHA-3 Candidates
    Henzen, Luca
    Gendotti, Pietro
    Guillet, Patrice
    Pargaetzi, Enrico
    Zoller, Martin
    Guerkaynak, Frank K.
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2010, 2010, 6225 : 248 - +
  • [9] The Intel AES Instructions Set and the SHA-3 Candidates
    Benadjila, Ryad
    Billet, Olivier
    Gueron, Shay
    Robshaw, Matt J. B.
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2009, 2009, 5912 : 162 - +
  • [10] Meet-in-the-Middle Attacks on SHA-3 Candidates
    Khovratovich, Dmitry
    Nikolic, Ivica
    Weinmann, Ralf-Philipp
    FAST SOFTWARE ENCRYPTION, 2009, 5665 : 228 - 245