Efficient Vector Implementations of AES-based Designs: A Case Study and New Implementations for Grøstl

Severin Holzer-Graf, Thomas Krinninger, Martin Andreas Pernull, Martin Schläffer, Peter Schwabe, David Seywald, Wolfgang Wieser

Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

Abstract

In this paper we evaluate and improve different vector implementation techniques of AES-based designs. We analyze how well the T-table, bitsliced and bytesliced implementation techniques apply to the SHA-3 finalist Grøstl. We present a number of new Grøstl implementations that improve upon many previous results. For example, our fastest ARM NEON implementation of Grøstl is 40% faster than the previously fastest ARM implementation. We present the first Intel AVX2 implementations of Grøstl, which require 40% less instructions than previous implementations. Furthermore, we present ARM Cortex-M0 implementations of Grøstl that improve the speed by 55% or the memory requirements by 15%.
Original languageEnglish
Title of host publicationCryptographers' Track at the RSA Conference 2013, CT-RSA 2013x^x
Pages145-161
DOIs
Publication statusPublished - 2013
EventCryptographers' Track at the RSA Conference 2013: CT-RSA 2013 - San Francisco, United States
Duration: 25 Feb 20131 Mar 2013

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
VolumeLNCS 7779
ISSN (Print)1611-3349

Conference

ConferenceCryptographers' Track at the RSA Conference 2013
Country/TerritoryUnited States
CitySan Francisco
Period25/02/131/03/13

Fields of Expertise

  • Information, Communication & Computing

Treatment code (Nähere Zuordnung)

  • Application

Fingerprint

Dive into the research topics of 'Efficient Vector Implementations of AES-based Designs: A Case Study and New Implementations for Grøstl'. Together they form a unique fingerprint.
  • FWF - ReSIT - Realizing a Secure Internet of Things

    Hutter, M. (Co-Investigator (CoI)), Wenger, E. (Co-Investigator (CoI)), Schmidt, J.-M. (Co-Investigator (CoI)), Mendel, F. (Co-Investigator (CoI)), Mangard, S. (Co-Investigator (CoI)) & Posch, R. (Principal Investigator (PI))

    1/07/1231/05/16

    Project: Research project

  • FWF - kryptographische Hashfu - Cryptanalysis of modern cryptographic hash functions II

    Nad, T. (Co-Investigator (CoI)), Mendel, F. (Co-Investigator (CoI)), Schläffer, M. (Co-Investigator (CoI)), Lamberger, M. (Co-Investigator (CoI)) & Rijmen, V. (Principal Investigator (PI))

    1/02/1031/01/13

    Project: Research project

  • EU - ECRYPT II - European network of excellence in cryptology - Phase II

    Schmidt, J.-M. (Co-Investigator (CoI)), Nad, T. (Co-Investigator (CoI)), Kirschbaum, M. (Co-Investigator (CoI)), Feldhofer, M. (Co-Investigator (CoI)), Schläffer, M. (Co-Investigator (CoI)), Aigner, M. J. (Co-Investigator (CoI)), Rechberger, C. (Co-Investigator (CoI)), Lamberger, M. (Co-Investigator (CoI)), Tillich, S. (Co-Investigator (CoI)), Medwed, M. (Co-Investigator (CoI)), Hutter, M. (Co-Investigator (CoI)), Rijmen, V. (Co-Investigator (CoI)), Mendel, F. (Co-Investigator (CoI)) & Posch, R. (Principal Investigator (PI))

    1/08/0831/01/13

    Project: Research project

Cite this