18145801. ACCELERATING EIGHT-WAY PARALLEL KECCAK EXECUTION simplified abstract (Intel Corporation)
ACCELERATING EIGHT-WAY PARALLEL KECCAK EXECUTION
Organization Name
Inventor(s)
Santosh Ghosh of Hillsboro OR (US)
Christoph Dobraunig of St. Veit an der Glan (AT)
Manoj Sastry of Portland OR (US)
ACCELERATING EIGHT-WAY PARALLEL KECCAK EXECUTION - A simplified explanation of the abstract
This abstract first appeared for US patent application 18145801 titled 'ACCELERATING EIGHT-WAY PARALLEL KECCAK EXECUTION
The method described in the abstract involves fetching an encoded XOR3P instruction, decoding it, and executing it to perform various operations on registers and operands.
- The method involves fetching an encoded XOR3P instruction with source identifiers for registers and operands.
- The instruction is decoded to generate a decoded XOR3P instruction.
- The decoded instruction is executed to determine rotational values, perform rotate and XOR operations, and store the result.
Potential Applications: - This technology could be used in computer processors for efficient data manipulation. - It could be applied in encryption algorithms for secure data processing. - The method could find use in digital signal processing for signal analysis and manipulation.
Problems Solved: - Enables efficient manipulation of data using rotate and XOR operations. - Facilitates complex data processing tasks with multiple registers and operands. - Enhances the performance of processors by optimizing data handling operations.
Benefits: - Improved efficiency in data manipulation tasks. - Enhanced security in encryption algorithms. - Increased performance in digital signal processing applications.
Commercial Applications: Title: Advanced Data Manipulation Technology for Processors This technology could be utilized in high-performance computing systems, encryption software, and digital signal processing applications. It has the potential to enhance the speed and efficiency of data processing tasks, making it valuable in industries such as cybersecurity, telecommunications, and scientific research.
Prior Art: Readers interested in exploring prior art related to this technology could start by researching patents in the field of computer architecture, data processing algorithms, and encryption methods.
Frequently Updated Research: Researchers in the field of computer science and data processing may be conducting studies on optimizing XOR and rotate operations for improved performance in processors. Stay updated on the latest advancements in data manipulation techniques for processors.
Questions about XOR3P Technology: 1. How does the XOR3P instruction differ from traditional XOR operations? The XOR3P instruction allows for more complex data manipulation by incorporating rotate operations in addition to XOR, enabling a wider range of processing capabilities.
2. What are the potential drawbacks of using XOR3P instructions in data processing tasks? While XOR3P instructions offer enhanced functionality, they may require additional processing power and resources, potentially impacting overall system performance.
Original Abstract Submitted
A method comprises fetching, by fetch circuitry, an encoded XOR3P instruction comprising at least one opcode, a first source identifier to identify a first register, a second source identifier to identify a second register, a third source identifier to identifier a third register, and a fourth source identifier to identify a fourth operand, wherein the first register is to store a first value, the second register is to store a second value, and the third register is to store a third value, decoding, by decode circuitry, the encoded XOR3PP instruction to generate a decoded XOR3PP instruction; and executing, by execution circuitry, the decoded XOR3PP instruction to determine a first rotational value and a second rotational value, perform a rotate operation on at least a portion of the first value based on the first rotational value to generate a rotated third value, perform an XOR operation on at least a portion of the first value, at least a portion of the second value, and the rotated third value to generate an XOR result, perform a rotate operation on the XOR result based on the second rotational value to generate a rotated XOR; and store the rotated XOR result.