{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T20:10:11Z","timestamp":1755893411377,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":31,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,5,7]],"date-time":"2024-05-07T00:00:00Z","timestamp":1715040000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,5,7]]},"DOI":"10.1145\/3629527.3652266","type":"proceedings-article","created":{"date-parts":[[2024,5,7]],"date-time":"2024-05-07T12:19:06Z","timestamp":1715084346000},"page":"227-234","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Fastcrypto: Pioneering Cryptography Via Continuous Benchmarking"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3252-9975","authenticated-orcid":false,"given":"Kostas Kryptos","family":"Chalkias","sequence":"first","affiliation":[{"name":"Mysten Labs, San Francisco, CA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1989-3019","authenticated-orcid":false,"given":"Jonas","family":"Lindstr\u00f8m","sequence":"additional","affiliation":[{"name":"Mysten Labs, Aarhus, Denmark"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5324-6889","authenticated-orcid":false,"given":"Deepak","family":"Maram","sequence":"additional","affiliation":[{"name":"Mysten Labs, New York, NY, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-2192-1905","authenticated-orcid":false,"given":"Ben","family":"Riva","sequence":"additional","affiliation":[{"name":"Mysten Labs, Tel Aviv, Israel"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-3770-9982","authenticated-orcid":false,"given":"Arnab","family":"Roy","sequence":"additional","affiliation":[{"name":"Mysten Labs, San Francisco, CA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5337-4741","authenticated-orcid":false,"given":"Alberto","family":"Sonnino","sequence":"additional","affiliation":[{"name":"Mysten Labs &amp; University College London, London, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-9002-3191","authenticated-orcid":false,"given":"Joy","family":"Wang","sequence":"additional","affiliation":[{"name":"Mysten Labs, New York, NY, USA"}]}],"member":"320","published-online":{"date-parts":[[2024,5,7]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Zachary Amsden Ramnik Arora Shehar Bano Mathieu Baudet Sam Blackshear Abhay Bothra G Cabrera C Catalini K Chalkias E Cheng et al. 2019. The libra blockchain. URl: https:\/\/developers. libra. org\/docs\/assets\/papers\/the-libra-blockchain. pdf (2019)."},{"key":"e_1_3_2_1_2_1","volume-title":"62: public key cryptography for the financial services industry: the elliptic curve digital signature algorithm (ecdsa). Am. Nat'l Standards Inst","author":"ANSI.","year":"1999","unstructured":"X9 ANSI. 1999. 62: public key cryptography for the financial services industry: the elliptic curve digital signature algorithm (ecdsa). Am. Nat'l Standards Inst (1999)."},{"key":"e_1_3_2_1_3_1","unstructured":"Jorge Aparicio and Brook Heisler. 2024. criterion.rs: Statistics-driven micro-benchmarking library. https:\/\/github.com\/japaric\/criterion.rs."},{"key":"e_1_3_2_1_4_1","unstructured":"Arkworks. 2024. arkworks-rs. https:\/\/github.com\/arkworks-rs\/."},{"key":"e_1_3_2_1_5_1","unstructured":"arnaucube. 2024. poseidon-ark. https:\/\/github.com\/arnaucube\/poseidon-ark."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38980-1_8"},{"key":"e_1_3_2_1_7_1","volume-title":"Yan Ji, Jonas Lindstr\u00f8m, Deepak Maram, Ben Riva, Arnab Roy, Mahdi Sedaghat, and Joy Wang.","author":"Baldimtsi Foteini","year":"2024","unstructured":"Foteini Baldimtsi, Konstantinos Kryptos Chalkias, Yan Ji, Jonas Lindstr\u00f8m, Deepak Maram, Ben Riva, Arnab Roy, Mahdi Sedaghat, and Joy Wang. 2024. zkLogin: Privacy-Preserving Blockchain Authentication with Existing Credentials. arxiv: 2401.11735 [cs.CR]"},{"volume-title":"Security in Communication Networks","author":"Barreto Paulo S. L. M.","key":"e_1_3_2_1_8_1","unstructured":"Paulo S. L. M. Barreto, Ben Lynn, and Michael Scott. 2003. Constructing Elliptic Curves with Prescribed Embedding Degrees. In Security in Communication Networks, Stelvio Cimato, Giuseppe Persiano, and Clemente Galdi (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 257--267."},{"key":"e_1_3_2_1_9_1","unstructured":"Ben Dickson. 2022. Dozens of cryptography libraries vulnerable to private key theft. The Daily Swig: https:\/\/portswigger.net\/daily-swig\/dozens-of-cryptography-libraries-vulnerable-to-private-key-theft."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-012-0027--1"},{"key":"e_1_3_2_1_11_1","volume-title":"Stephane Sezer, et al.","author":"Blackshear Sam","year":"2019","unstructured":"Sam Blackshear, Evan Cheng, David L Dill, Victor Gao, Ben Maurer, Todd Nowacki, Alistair Pott, Shaz Qadeer, Dario Russi Rain, Stephane Sezer, et al. 2019. Move: A language with programmable resources. Libra Assoc (2019), 1."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-39200-9_26"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45682-1_30"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3488932.3527284"},{"key":"e_1_3_2_1_15_1","unstructured":"dalek cryptography. 2024. ed25519-dalek. https:\/\/github.com\/dalek-cryptography\/ed25519-dalek."},{"key":"e_1_3_2_1_16_1","volume-title":"Poseidon: A New Hash Function for Zero-Knowledge Proof Systems. In USENIX Security Symposium. https:\/\/api.semanticscholar.org\/CorpusID:221069468","author":"Grassi Lorenzo","year":"2021","unstructured":"Lorenzo Grassi, Dmitry Khovratovich, Christian Rechberger, Arnab Roy, and Markus Schofnegger. 2021. Poseidon: A New Hash Function for Zero-Knowledge Proof Systems. In USENIX Security Symposium. https:\/\/api.semanticscholar.org\/CorpusID:221069468"},{"key":"e_1_3_2_1_17_1","volume-title":"Double Public Key Signing Function Oracle Attack on EdDSA Software Implementations. arXiv preprint arXiv:2308.15009","author":"Grierson Sam","year":"2023","unstructured":"Sam Grierson, Konstantinos Chalkias, and William J Buchanan. 2023. Double Public Key Signing Function Oracle Attack on EdDSA Software Implementations. arXiv preprint arXiv:2308.15009 (2023)."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","unstructured":"Jens Groth. 2016. On the Size of Pairing-Based Non-interactive Arguments. 305--326. https:\/\/doi.org\/10.1007\/978--3--662--49896--5_11","DOI":"10.1007\/978--3--662--49896--5_11"},{"key":"e_1_3_2_1_19_1","unstructured":"iden3. 2024. rapidsnark. https:\/\/github.com\/iden3\/rapidsnark."},{"key":"e_1_3_2_1_20_1","unstructured":"Kostas Kryptos. 2023. Blockchain research has advanced systems and cryptography. https:\/\/twitter.com\/kostascrypto\/status\/1626983601572302849."},{"key":"e_1_3_2_1_21_1","unstructured":"Zhuolun Li Alberto Sonnino and Philipp Jovanovic. 2023. Performance of EdDSA and BLS Signatures in Committee-Based Consensus. In Workshop on Advanced tools programming languages and PLatforms for Implementing and Evaluating algorithms for Distributed systems."},{"key":"e_1_3_2_1_22_1","unstructured":"lurk-lab. 2024. neptune. https:\/\/github.com\/lurk-lab\/neptune."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2692956.2663188"},{"key":"e_1_3_2_1_24_1","unstructured":"Mysten Labs. 2024. fastcrypto. https:\/\/github.com\/MystenLabs\/fastcrypto."},{"key":"e_1_3_2_1_25_1","unstructured":"NumPy Team. 2024. Numpy. https:\/\/numpy.org."},{"key":"e_1_3_2_1_26_1","unstructured":"Penumbra. 2024. ed25519-consensus. https:\/\/github.com\/penumbra-zone\/ed25519-consensus."},{"key":"e_1_3_2_1_27_1","unstructured":"Rust Bitcoin Community. 2024. rust-secp256k1. https:\/\/github.com\/rust-bitcoin\/rust-secp256k1\/."},{"key":"e_1_3_2_1_28_1","unstructured":"RustCrypto. 2024. p256. https:\/\/github.com\/RustCrypto\/elliptic-curves\/tree\/master\/p256."},{"key":"e_1_3_2_1_29_1","unstructured":"Rustsec. 2022. Double Public Key Signing Function Oracle Attack on ed25519-dalek. RUSTSEC-2022-0093: https:\/\/rustsec.org\/advisories\/RUSTSEC-2022-0093."},{"key":"e_1_3_2_1_30_1","unstructured":"Supranational. 2024. blst. https:\/\/github.com\/supranational\/blst."},{"key":"e_1_3_2_1_31_1","volume-title":"Ethereum: A secure decentralised generalised transaction ledger. , bibinfonumpages32 pages.","author":"Gavin Wood","year":"2014","unstructured":"Gavin Wood et al. 2014. Ethereum: A secure decentralised generalised transaction ledger. , bibinfonumpages32 pages."}],"event":{"name":"ICPE '24: 15th ACM\/SPEC International Conference on Performance Engineering","sponsor":["SIGMETRICS ACM Special Interest Group on Measurement and Evaluation","SIGSOFT ACM Special Interest Group on Software Engineering"],"location":"London United Kingdom","acronym":"ICPE '24"},"container-title":["Companion of the 15th ACM\/SPEC International Conference on Performance Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3629527.3652266","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3629527.3652266","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T19:51:25Z","timestamp":1755892285000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3629527.3652266"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,7]]},"references-count":31,"alternative-id":["10.1145\/3629527.3652266","10.1145\/3629527"],"URL":"https:\/\/doi.org\/10.1145\/3629527.3652266","relation":{},"subject":[],"published":{"date-parts":[[2024,5,7]]},"assertion":[{"value":"2024-05-07","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}