首页    期刊浏览 2025年06月16日 星期一
登录注册

文章基本信息

  • 标题:Performance Comparison of Keccak, Skein, Grøstl, Blake and JH: SHA-3 Final Round Candidate Algorithms on ARM Cortex A8 Processor
  • 本地全文:下载
  • 作者:Rajeev Sobti ; G. Geetha
  • 期刊名称:International Journal of Security and Its Applications
  • 印刷版ISSN:1738-9976
  • 出版年度:2015
  • 卷号:9
  • 期号:12
  • 页码:367-384
  • DOI:10.14257/ijsia.2015.9.12.34
  • 出版社:SERSC
  • 摘要:Taking cognizance of various attacks on MDx family of Hash function including SHA- 0 and SHA-1, National Institute of Standards and Technology came up with a public competition for new Hash standard SHA-3 to augment or replace the current Hash standard SHA-2. NIST provided a reference platform (Wintel machines) and compiler (Microsoft Visual Studio) on which the submitted algorithms were to be evaluated. The five algorithms that reached the final round of SHA-3 public competition were evaluated by us on ARM Cortex A8 architecture (architecture other than the reference platform). Performance evaluation of these final round candidate algorithms were done on Cortex- A8 based OpenBoard AM335x from PHYTEC running Linux 3.2.0. The results in Cycles consumed per byte are shared in this paper.
  • 关键词:Hash Functions; SHA-3; Performance Evaluation; Cortex A8; Cycles per ; Byte
国家哲学社会科学文献中心版权所有