Was adapted for use on processors with ARM architecture. A constructor was modified so that it could make use of the SHA-3 function and all the options provided by the library. The purpose of the designed program is to obtain measurements of processing times. This, considering the time taken by both the embedded and the personal computer to solve the operations of the hash functions of the SHA-3 family.
That is, the post-quantum algorithm of the SHA-3 family could be run on resource-limited south korea email list devices with a slow response speed, which improved with the increase in computing capacity.
Results
The results of the first test are shown in Table 1, where the input to the SHA-3 function is a file containing one million times the same character, and the execution times in milliseconds for processing the SHA-3 functions with outputs of length 224, 256, 384 and 512 are shown in Table 1. Also, Table 2 shows the resulting values for the SHAKE output functions. Likewise, the input value of the function is a file containing one million characters.
For the research described in this article liboqs
-
- Posts: 325
- Joined: Thu Jan 16, 2025 8:32 am