Open to public submission of BATs (Benchmarkable Which public-key - - PowerPoint PPT Presentation

open to public submission of bats benchmarkable which
SMART_READER_LITE
LIVE PREVIEW

Open to public submission of BATs (Benchmarkable Which public-key - - PowerPoint PPT Presentation

Open to public submission of BATs (Benchmarkable Which public-key systems Asymmetric Tools). are smallest? Fastest? e.g. submit encrypting BAT eBATS (ECRYPT Benchmarking with three functions: of Asymmetric Systems): keypair() to generate


slide-1
SLIDE 1

Which public-key systems are smallest? Fastest? eBATS (ECRYPT Benchmarking

  • f Asymmetric Systems):

new project to measure time and space consumed by public-key signature systems, public-key encryption systems, public-key secret-sharing systems. To join list: ebats-subscribe @list.cr.yp.to Open to public submission

  • f BATs (Benchmarkable

Asymmetric Tools). e.g. submit encrypting BAT with three functions: keypair() to generate keys, ciphertext() to encrypt, plaintext() to decrypt. BATs are measured by BATMAN (Benchmarking of Asymmetric Tools on Multiple Architectures, Non-Interactively).

slide-2
SLIDE 2

ey systems astest? (ECRYPT Benchmarking Systems): measure consumed by signature systems, encryption systems, secret-sharing systems. ebats-subscribe @list.cr.yp.to Open to public submission

  • f BATs (Benchmarkable

Asymmetric Tools). e.g. submit encrypting BAT with three functions: keypair() to generate keys, ciphertext() to encrypt, plaintext() to decrypt. BATs are measured by BATMAN (Benchmarking of Asymmetric Tools on Multiple Architectures, Non-Interactively). Measured BATs enter (Comparison and Environment).

slide-3
SLIDE 3

Open to public submission

  • f BATs (Benchmarkable

Asymmetric Tools). e.g. submit encrypting BAT with three functions: keypair() to generate keys, ciphertext() to encrypt, plaintext() to decrypt. BATs are measured by BATMAN (Benchmarking of Asymmetric Tools on Multiple Architectures, Non-Interactively). Measured BATs enter the CAVE (Comparison and Visualization Environment).

slide-4
SLIDE 4

submission (Benchmarkable

  • ls).

encrypting BAT functions: generate keys, to encrypt, to decrypt. measured by BATMAN

  • f Asymmetric

Multiple Architectures, Non-Interactively). Measured BATs enter the CAVE (Comparison and Visualization Environment). Measured BATs enter (Comparison and Environment).

slide-5
SLIDE 5

Measured BATs enter the CAVE (Comparison and Visualization Environment). Measured BATs enter the CAVE (Comparison and Visualization Environment).

slide-6
SLIDE 6

Ts enter the CAVE and Visualization Measured BATs enter the CAVE (Comparison and Visualization Environment). Measured BATs enter (Comparison and Environment).

slide-7
SLIDE 7

Measured BATs enter the CAVE (Comparison and Visualization Environment). Measured BATs enter the CAVE (Comparison and Visualization Environment).

slide-8
SLIDE 8

Ts enter the CAVE and Visualization Measured BATs enter the CAVE (Comparison and Visualization Environment). The SHARCS connection: Do users want the smallest, fastest systems? Not exactly! Users smallest, fastest systems at an acceptable Open to public evaluation

  • f security levels.

Need papers analyzing costs of attacks against all of these systems.

slide-9
SLIDE 9

Measured BATs enter the CAVE (Comparison and Visualization Environment). The SHARCS connection: Do users want the smallest, fastest systems? Not exactly! Users want the smallest, fastest systems at an acceptable security level. Open to public evaluation

  • f security levels.

Need papers analyzing costs of attacks against all of these systems.