The browser version you are using is not recommended for this site.Please consider upgrading to the latest version of your browser by clicking one of the following links.
We are sorry, This PDF is available in download format only
Fast Cryptographic Computation Via Function Stitching
Executive summaryCryptographic applications often run more than one independent algorithm such as encryption and authentication. This fact provides a high level of parallelism which can be exploited by software and converted into instruction level parallelism to improve overall performance on modern super-scalar processors. We present fast and efficient methods of computing such pairs of functions on IA processors using a method called “function stitching”. Instead of computing pairs of functions sequentially as is done today in applications/libraries, we replace the function calls by a single call to a composite function that implements both algorithms. The execution time of this composite function can be made significantly shorter than the sums of the execution times for the individual functions and, in many cases, close to the execution time of the slower function.Function stitching is best done at a very fine grain, interleaving the code for the individual algorithms at an instruction-level granularity. This results in excellent utilization of the execution resources in the processor core with a single thread.We show how stitching pairs of functions together in a fine-grained manner results in excellent performance on IA processors. Currently, applications perform the functions sequentially. We demonstrate performance gains of 1.4X-1.9X with stitching over the best sequential function performance.Read the full Fast Cryptographic Computation Via Function Stitching white paper: http://www.intel.com/content/www/us/en/communications/communications-ia-cryptographic-paper.html
Video: Lunarworthy Controllers from Commercial Electronics
Provides an overview of heterogeneous architecture and power-performance.
Demonstrates 3D scanner technology powered by an Intel® processor.
Shadow puppet performance demos the use of Intel® Atom™ processors in puppet control; part 1.
Backstage view of a shadow puppet performance reveals the Intel® Atom™ processor-based robots; part 2.
Discusses some of the major problems with firmware development and validation.