Is this code available anywhere? If not, it makes it hard to reproduce their results.
It’s too bad they don’t submit this to bench.cr.yp.to so we could have an apples-to-apples comparison with other implementations. Yoav > On Jul 21, 2015, at 11:57 AM, Stephen Kent <k...@bbn.com> wrote: > > I checked with the NIST folks and their contractor. The answer is that their > sign > operations are constant time. The attached paper describes their work in the > context of BGPsec, because that was the motivation at NIST for exploring > performance > improvements for P-256. There is one table (3) that also compares P-256 code > to 25591 > in terms of signature performance. I realize that we were discussing ECDH, > not ECDSA, > for IKE(v2) but I believe the performance numbers cited in this paper are > indicative > of what one would see in that context as well. > > Steve > <Efficient and Secure ECC Implementation of Curve P-256 > vf.pdf>_______________________________________________ > IPsec mailing list > IPsec@ietf.org > https://www.ietf.org/mailman/listinfo/ipsec
_______________________________________________ IPsec mailing list IPsec@ietf.org https://www.ietf.org/mailman/listinfo/ipsec