eBATS is open to public submission of BATs Which public-key systems - - PowerPoint PPT Presentation

ebats is open to public submission of bats which public
SMART_READER_LITE
LIVE PREVIEW

eBATS is open to public submission of BATs Which public-key systems - - PowerPoint PPT Presentation

eBATS is open to public submission of BATs Which public-key systems (Benchmarkable Asymmetric are smallest? Fastest? Tools). eBATS (ECRYPT Benchmarking e.g. submit encrypting BAT of Asymmetric Systems): with three functions: new project to


slide-1
SLIDE 1

Which public-key systems are smallest? Fastest? eBATS (ECRYPT Benchmarking

  • f Asymmetric Systems):

new project to measure time and space consumed by public-key signature systems, public-key encryption systems, public-key secret-sharing systems. http://ebats.cr.yp.to Inspired by eSTREAM timings. eBATS is open to public submission of BATs (Benchmarkable Asymmetric Tools). e.g. submit encrypting BAT with three functions: keypair() to generate keys, ciphertext() to encrypt, plaintext() to decrypt. BATs are measured by BATMAN (Benchmarking of Asymmetric Tools on Multiple Architectures, Non-Interactively).

slide-2
SLIDE 2

ey systems astest? (ECRYPT Benchmarking Systems): measure consumed by signature systems, encryption systems, secret-sharing systems. http://ebats.cr.yp.to eSTREAM timings. eBATS is open to public submission of BATs (Benchmarkable Asymmetric Tools). e.g. submit encrypting BAT with three functions: keypair() to generate keys, ciphertext() to encrypt, plaintext() to decrypt. BATs are measured by BATMAN (Benchmarking of Asymmetric Tools on Multiple Architectures, Non-Interactively). Measured BATs enter (Comparison and Environment).

slide-3
SLIDE 3

eBATS is open to public submission of BATs (Benchmarkable Asymmetric Tools). e.g. submit encrypting BAT with three functions: keypair() to generate keys, ciphertext() to encrypt, plaintext() to decrypt. BATs are measured by BATMAN (Benchmarking of Asymmetric Tools on Multiple Architectures, Non-Interactively). Measured BATs enter the CAVE (Comparison and Visualization Environment).

slide-4
SLIDE 4

to submission of BATs able Asymmetric encrypting BAT functions: generate keys, to encrypt, to decrypt. measured by BATMAN

  • f Asymmetric

Multiple Architectures, Non-Interactively). Measured BATs enter the CAVE (Comparison and Visualization Environment). Measured BATs enter (Comparison and Environment).

slide-5
SLIDE 5

Measured BATs enter the CAVE (Comparison and Visualization Environment). Measured BATs enter the CAVE (Comparison and Visualization Environment).

slide-6
SLIDE 6

Ts enter the CAVE and Visualization Measured BATs enter the CAVE (Comparison and Visualization Environment). Measured BATs enter (Comparison and Environment).

slide-7
SLIDE 7

Measured BATs enter the CAVE (Comparison and Visualization Environment). Measured BATs enter the CAVE (Comparison and Visualization Environment).