很抱歉，此 PDF 仅供下载
Fast Cryptographic Computation Via Function Stitching
Executive summaryCryptographic applications often run more than one independent algorithm such as encryption and authentication. This fact provides a high level of parallelism which can be exploited by software and converted into instruction level parallelism to improve overall performance on modern super-scalar processors. We present fast and efficient methods of computing such pairs of functions on IA processors using a method called “function stitching”. Instead of computing pairs of functions sequentially as is done today in applications/libraries, we replace the function calls by a single call to a composite function that implements both algorithms. The execution time of this composite function can be made significantly shorter than the sums of the execution times for the individual functions and, in many cases, close to the execution time of the slower function.Function stitching is best done at a very fine grain, interleaving the code for the individual algorithms at an instruction-level granularity. This results in excellent utilization of the execution resources in the processor core with a single thread.We show how stitching pairs of functions together in a fine-grained manner results in excellent performance on IA processors. Currently, applications perform the functions sequentially. We demonstrate performance gains of 1.4X-1.9X with stitching over the best sequential function performance.Read the full Fast Cryptographic Computation Via Function Stitching white paper: http://www.intel.com/content/www/us/en/communications/communications-ia-cryptographic-paper.html
下载 PDF 文档
Intel® embedded products synergize systems for applications, services, and control plane and packet processing.
See how tomorrow’s network will deliver individual solutions to enhance experience and value.
Illustrates Yanzi Networks* real-time machine-to-machine communication solution.
RSA 2012 Intel keynote speech provides architectural insights to tomorrow’s security infrastructure.
Security software extracts metadata, classifies flows, and displays data in a compact format.
Off-the-shelf components provide a high-quality solution without using custom hardware.