VAMPIRE |
eBACS: ECRYPT Benchmarking of Cryptographic Systems |
ECRYPT II |
General information: | Introduction | eBASH | eBASC | eBATS | SUPERCOP | XBX | Computers |
How to submit new software: | Hash functions | Stream ciphers | DH functions | Public-key encryption | Public-key signatures |
List of primitives measured: | SHA-3 finalists | All hash functions | Stream ciphers | DH functions | Public-key encryption | Public-key signatures |
Measurements indexed by machine: | SHA-3 finalists | All hash functions | Stream ciphers | DH functions | Public-key encryption | Public-key signatures |
There are separate pages explaining how to submit public-key Diffie–Hellman secret-sharing systems, public-key cryptosystems, and public-key signature systems to eBATS. There are also pages listing the public-key Diffie–Hellman secret-sharing systems, public-key cryptosystems, and public-key signature systems already submitted to eBATS. There are also pages presenting the latest eBATS measurements for public-key Diffie–Hellman secret-sharing systems, public-key cryptosystems, and public-key signature systems.
This web page supersedes http://www.ecrypt.eu.org/ebats, the original eBATS web page.