Comparison of the Power Consumption of the 2nd Round SHA-3 Candidates

被引:0
作者
Westermann, Benedikt [1 ]
Gligoroski, Danilo [2 ]
Knapskog, Svein [1 ]
机构
[1] NTNU Q2S, N-7491 Trondheim, Norway
[2] NTNU ITEM, N-7491 Trondheim, Norway
来源
ICT INNOVATIONS 2010 | 2011年 / 83卷
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In the paper we show that the second round candidates of the NIST hash competition differ up to 22 % in their power consumption. We perform a detailed analysis of the candidates with respect to different performance parameters. Finally, we discuss the time, the power consumption, and the energy per byte as criteria to distinguish the candidates with respect to the performance.
引用
收藏
页码:102 / +
页数:3
相关论文
共 6 条
  • [1] [Anonymous], CRYPT HASH ALG COMP
  • [2] Fettweis G. P., 2008, P 11 INT S WIR PERS
  • [3] Kaps JP, 2006, LECT NOTES COMPUT SC, V4097, P372
  • [4] Analyzing the energy consumption of security protocols
    Potlapally, NR
    Ravi, S
    Raghunathan, A
    Jha, NK
    [J]. ISLPED'03: PROCEEDINGS OF THE 2003 INTERNATIONAL SYMPOSIUM ON LOW POWER ELECTRONICS AND DESIGN, 2003, : 30 - 35
  • [5] Green IT - More Than a Three Percent Solution?
    Ruth, Stephen
    [J]. IEEE INTERNET COMPUTING, 2009, 13 (04) : 74 - 78
  • [6] VAMPIRE lab, SUP SYST UN PERF EV