Users of public-key cryptography have a choice of public-key cryptosystems, including RSA, DSA, ECDSA, and many more. Exactly how fast are these systems? How do the speeds vary among Pentium, PowerPC, etc.? How much network bandwidth do the systems consume? eBATS (ECRYPT Benchmarking of Asymmetric Systems) aims to answer these questions. The eBATS competition will identify the most efficient public-key systems. eBATS is open to public submissions of cryptographic software for benchmarking. There are open calls for public-key-signature software, public-key-encryption software, and public-key-secret-sharing software. Submitted BATs (Benchmarkable Asymmetric Tools) are measured on various computers by the BATMAN (Benchmarking of Asymmetric Tools on Multiple Architectures, Non-Interactively) program. Measurements are graphed in various ways by the CAVE (Comparison And Visualization Environment) program. The eBATS measurements and comparisons began at the end of 2006 and are ongoing. BATs can be submitted at any time. eBATS is organized by the European Network of Excellence for Cryptology (ECRYPT), funded within the Information Societies Technology Programme (IST) of the European Commission’s Sixth Framework Programme (FP6) under contract number IST-2002-507932. eBATS is an activity of ECRYPT’s Virtual Application and Implementation Research Lab (VAMPIRE).
Keywords for this software
References in zbMATH (referenced in 5 articles )
Showing results 1 to 5 of 5.
- Hu, Zhi; Longa, Patrick; Xu, Maozhi: Implementing the 4-dimensional GLV method on GLS elliptic curves with $j$-invariant 0 (2012)
- Galbraith, Steven D.; Lin, Xibin; Scott, Michael: Endomorphisms for faster elliptic curve cryptography on a large class of curves (2011)
- Hermans, Jens; Vercauteren, Frederik; Preneel, Bart: Speed records for NTRU (2010)
- Galbraith, Steven D.; Lin, Xibin; Scott, Michael: Endomorphisms for faster elliptic curve cryptography on a large class of curves (2009)
- Szerwinski, Robert; Güneysu, Tim: Exploiting the power of GPUs for asymmetric cryptography (2008)