Projects per year
Abstract
In this paper we evaluate and improve different vector implementation techniques of AES-based designs. We analyze how well the T-table, bitsliced and bytesliced implementation techniques apply to the SHA-3 finalist Grøstl. We present a number of new Grøstl implementations that improve upon many previous results. For example, our fastest ARM NEON implementation of Grøstl is 40% faster than the previously fastest ARM implementation. We present the first Intel AVX2 implementations of Grøstl, which require 40% less instructions than previous implementations. Furthermore, we present ARM Cortex-M0 implementations of Grøstl that improve the speed by 55% or the memory requirements by 15%.
Original language | English |
---|---|
Title of host publication | Cryptographers' Track at the RSA Conference 2013, CT-RSA 2013x^x |
Pages | 145-161 |
DOIs | |
Publication status | Published - 2013 |
Event | Cryptographers' Track at the RSA Conference 2013: CT-RSA 2013 - San Francisco, United States Duration: 25 Feb 2013 → 1 Mar 2013 |
Publication series
Name | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) |
---|---|
Volume | LNCS 7779 |
ISSN (Print) | 1611-3349 |
Conference
Conference | Cryptographers' Track at the RSA Conference 2013 |
---|---|
Country/Territory | United States |
City | San Francisco |
Period | 25/02/13 → 1/03/13 |
Fields of Expertise
- Information, Communication & Computing
Treatment code (Nähere Zuordnung)
- Application
Fingerprint
Dive into the research topics of 'Efficient Vector Implementations of AES-based Designs: A Case Study and New Implementations for Grøstl'. Together they form a unique fingerprint.Projects
- 4 Finished
-
FWF - ReSIT - Realizing a Secure Internet of Things
Hutter, M., Wenger, E., Schmidt, J., Mendel, F., Mangard, S. & Posch, R.
1/07/12 → 31/05/16
Project: Research project
-
FWF - kryptographische Hashfu - Cryptanalysis of modern cryptographic hash functions II
Nad, T., Mendel, F., Schläffer, M., Lamberger, M. & Rijmen, V.
1/02/10 → 31/01/13
Project: Research project
-
EU - ECRYPT II - European network of excellence in cryptology - Phase II
Schmidt, J., Nad, T., Kirschbaum, M., Feldhofer, M., Schläffer, M., Aigner, M. J., Rechberger, C., Lamberger, M., Tillich, S., Medwed, M., Hutter, M., Rijmen, V., Mendel, F. & Posch, R.
1/08/08 → 31/01/13
Project: Research project