Comparison of the Power Consumption of the 2nd Round SHA-3 Candidates

被引:0
|
作者
Westermann, Benedikt [1 ]
Gligoroski, Danilo [2 ]
Knapskog, Svein [1 ]
机构
[1] NTNU Q2S, N-7491 Trondheim, Norway
[2] NTNU ITEM, N-7491 Trondheim, Norway
来源
ICT INNOVATIONS 2010 | 2011年 / 83卷
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In the paper we show that the second round candidates of the NIST hash competition differ up to 22 % in their power consumption. We perform a detailed analysis of the candidates with respect to different performance parameters. Finally, we discuss the time, the power consumption, and the energy per byte as criteria to distinguish the candidates with respect to the performance.
引用
收藏
页码:102 / +
页数:3
相关论文
共 50 条
  • [11] Side-Channel Analysis of Six SHA-3 Candidates
    Benoit, Olivier
    Peyrin, Thomas
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2010, 2010, 6225 : 140 - 157
  • [12] Design and benchmarking of an ASIC with five SHA-3 finalist candidates
    Srivastav, Meeta
    Guo, Xu
    Huang, Sinan
    Ganta, Dinesh
    Henry, Michael B.
    Nazhandali, Leyla
    Schaumont, Patrick
    MICROPROCESSORS AND MICROSYSTEMS, 2013, 37 (02) : 246 - 257
  • [13] Hardware Implementations of the SHA-3 Candidates Shabal and Cube Hash
    Bernet, Markus
    Henzen, Luca
    Kaeslin, Hubert
    Felber, Norbert
    Fichtner, Wolfgang
    2009 52ND IEEE INTERNATIONAL MIDWEST SYMPOSIUM ON CIRCUITS AND SYSTEMS, VOLS 1 AND 2, 2009, : 515 - 518
  • [14] Fair and Comprehensive Methodology for Comparing Hardware Performance of Fourteen Round Two SHA-3 Candidates Using FPGAs
    Gaj, Kris
    Homsirikamol, Ekawat
    Rogawski, Marcin
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2010, 2010, 6225 : 264 - 278
  • [15] COMPARISON AND ANALYSIS STUDY OF SHA-3 FINALISTS
    Alshaikhli, Imad Fakhri
    Alahmad, Mohammad A.
    Munthir, Khanssaa
    2012 INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER SCIENCE APPLICATIONS AND TECHNOLOGIES (ACSAT), 2012, : 366 - 371
  • [16] Length Extension Attack on Narrow-Pipe SHA-3 Candidates
    Gligoroski, Danilo
    ICT INNOVATIONS 2010, 2011, 83 : 5 - 10
  • [17] Practical Collision Attacks against Round-Reduced SHA-3
    Guo, Jian
    Liao, Guohong
    Liu, Guozhen
    Liu, Meicheng
    Qiao, Kexin
    Song, Ling
    JOURNAL OF CRYPTOLOGY, 2020, 33 (01) : 228 - 270
  • [18] A Comparison of NIST 2nd Round Candidates' MQ-based Signature Schemes
    Bai, Yuhao
    Kim, Aeyoung
    Seo, Seung-Hyun
    2019 10TH INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY CONVERGENCE (ICTC): ICT CONVERGENCE LEADING THE AUTONOMOUS FUTURE, 2019, : 41 - 46
  • [19] Practical Collision Attacks against Round-Reduced SHA-3
    Jian Guo
    Guohong Liao
    Guozhen Liu
    Meicheng Liu
    Kexin Qiao
    Ling Song
    Journal of Cryptology, 2020, 33 : 228 - 270
  • [20] SHA-2 and SHA-3 Based Sequence Randomization Algorithm
    Nugroho, Kuntoro Adi
    Hangga, Arimaz
    Sudana, I. Made
    2016 2ND INTERNATIONAL CONFERENCE ON SCIENCE AND TECHNOLOGY-COMPUTER (ICST), 2016,