Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Date: Fri, 16 Dec 2016 21:43:40 +0100
From: "Jason A. Donenfeld" <>
To: George Spelvin <>
Cc: Tom Herbert <>, Andi Kleen <>, 
	David Miller <>, David Laight <>, 
	"Daniel J . Bernstein" <>, Eric Biggers <>, 
	Hannes Frederic Sowa <>, 
	Jean-Philippe Aumasson <>,, 
	Linux Crypto Mailing List <>, LKML <>, 
	Andy Lutomirski <>, Netdev <>, 
	Linus Torvalds <>, "Theodore Ts'o" <>, 
	Vegard Nossum <>
Subject: Re: [PATCH v5 1/4] siphash: add cryptographically secure PRF

On Fri, Dec 16, 2016 at 9:41 PM, George Spelvin
<> wrote:
> What are you testing on?  And what input size?  And does "33% improvement"
> mean 4/3 the rate and 3/4 the time?  Or 2/3 the time and 3/2 the rate?

How that I've published my hsiphash implementation to my tree, it
should be possible to conduct the tests back to back with nearly
identical implementation strategies, to remove a potential source of

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.