Comparison of the Power Consumption of the 2nd Round SHA-3 Candidates

被引:0
|
作者
Westermann, Benedikt [1 ]
Gligoroski, Danilo [2 ]
Knapskog, Svein [1 ]
机构
[1] NTNU Q2S, N-7491 Trondheim, Norway
[2] NTNU ITEM, N-7491 Trondheim, Norway
来源
ICT INNOVATIONS 2010 | 2011年 / 83卷
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In the paper we show that the second round candidates of the NIST hash competition differ up to 22 % in their power consumption. We perform a detailed analysis of the candidates with respect to different performance parameters. Finally, we discuss the time, the power consumption, and the energy per byte as criteria to distinguish the candidates with respect to the performance.
引用
收藏
页码:102 / +
页数:3
相关论文
共 50 条
  • [21] Performance Analysis of the SHA-3 Candidates on Exotic Multi-core Architectures
    Bos, Joppe W.
    Stefan, Deian
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2010, 2010, 6225 : 279 - +
  • [22] 2ND WIVES - (ROUND 3)
    BERLIANT, C
    FORTUNE, 1989, 120 (09) : 52 - 52
  • [23] Two Step Power Attack on SHA-3 Based MAC
    Chu, Chun-Yi
    Lukowiak, Marcia
    PROCEEDINGS OF THE 25TH INTERNATIONAL CONFERENCE MIXED DESIGN OF INTEGRATED CIRCUITS AND SYSTEM (MIXDES 2018), 2018, : 209 - 214
  • [24] Replacing SHA-2 with SHA-3 Enhances Generic Security of HMAC
    Naito, Yusuke
    Wang, Lei
    TOPICS IN CRYPTOLOGY - CT-RSA 2016, 2016, 9610 : 397 - 412
  • [25] Collision Attacks on Round-Reduced SHA-3 Using Conditional Internal Differentials
    Zhang, Zhongyi
    Hou, Chengan
    Liu, Meicheng
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2023, PT IV, 2023, 14007 : 220 - 251
  • [26] FPGA Implementations of SHA-3 Candidates: CubeHash, Grostl, LANE, Shabal and Spectral Hash
    Baldwin, Brian
    Byrne, Andrew
    Hamilton, Mark
    Hanley, Neil
    McEvoy, Robert P.
    Pan, Weibo
    Marnane, William P.
    PROCEEDINGS OF THE 2009 12TH EUROMICRO CONFERENCE ON DIGITAL SYSTEM DESIGN, ARCHITECTURES, METHODS AND TOOLS, 2009, : 783 - 790
  • [27] Data-Oriented Performance Analysis of SHA-3 Candidates on FPGA Accelerated Computers
    Chen, Zhimin
    Guo, Xu
    Sinha, Ambuj
    Schaumont, Patrick
    2011 DESIGN, AUTOMATION & TEST IN EUROPE (DATE), 2011, : 1650 - 1655
  • [28] Low Power and Pipelined Secure hashing Algorithm-3(SHA-3)
    Sharma, Javanti
    Koppad, Deepali
    2016 IEEE ANNUAL INDIA CONFERENCE (INDICON), 2016,
  • [29] SHA-3-LPHP: Hardware Acceleration of SHA-3 for Low-Power High-Performance Systems
    Akiya, Yuta
    Le, Kyle Thomas
    Luong, Megan
    Wilson, Justin C.
    Eddin, Anas Salah
    Formicola, Valerio
    El-Hadedy, Mohamed
    2021 IEEE INTERNATIONAL SYMPOSIUM ON SOFTWARE RELIABILITY ENGINEERING WORKSHOPS (ISSREW 2021), 2021, : 393 - 398
  • [30] Exploring SAT for Cryptanalysis: (Quantum) Collision Attacks Against 6-Round SHA-3
    Guo, Jian
    Liu, Guozhen
    Song, Ling
    Tu, Yi
    ADVANCES IN CRYPTOLOGY-ASIACRYPT 2022, PT III, 2022, 13793 : 645 - 674