Who is Afraid of Vectors�Optimizing Cryptography Using SSE, AVX, NEON, and Co.

Subscribers:
344,000
Published on ● Video Link: https://www.youtube.com/watch?v=38iKYPjdUY0



Duration: 1:02:37
792 views
14


Most computer architectures, for example, x86, AMD64 and ARMv7 support efficient operations on vectors of data. The computational power of these instructions are most easily exploited if the same long streams of computations are carried out on independent sets of data. This is, for example, the case in many cryptanalytic computations. However, also single cryptographic computations can benefit from the computational power of vector instructions. In my talk I will consider various examples of such cryptographic computations and describe what implementation techniques are required to make best use of the vector instruction sets of various computer architectures.




Other Videos By Microsoft Research


2016-07-26Gap Probabilities for Zeroes of Stationary Gaussian Functions
2016-07-26Random Walks on Groups and the Kaimanovich-Vershik Conjecture for Lamplighter Groups
2016-07-26Sensing without Sensors
2016-07-26Optimal Falsifications for Cyber-Physical Systems using Trajectory Splicing
2016-07-26A Sensor Fusion Approach towards Gesture Recognition on the Wearable Ring Form Factor
2016-07-26Digital Traces in Online Places: Methods, Software, and Applications for Social Behavioral Research
2016-07-26Stabilizer: Statistically Sound Performance Evaluation
2016-07-26Revenue maximization and prophet inequalities
2016-07-26On the Number of Matroids
2016-07-26RealTime Collaborative Analysis with (Almost) Pure SQL: A Case Study in Biogeochemical Oceanography
2016-07-26Who is Afraid of Vectors�Optimizing Cryptography Using SSE, AVX, NEON, and Co.
2016-07-26Programming with People: Integrating Human-Based and Digital Computation
2016-07-26ISHI Connects Us: Social Gaming with the Skype Team
2016-07-26Monitoring the Snowpack in Remote, Ungauged Mountains from Satellite and Computers
2016-07-26A Logical Revolution
2016-07-26Online Node-weighted Steiner Forest and Extensions
2016-07-26Optimal Pairings on Abelian Varieties with Theta Functions
2016-07-26Using Crowd Agents to Create Deployable Intelligent Systems
2016-07-26Quantum Speedup by Quantum Annealing
2016-07-26Creating Comics and Cartoons on Mobile Devices
2016-07-26Using FPGAs to Simulate Novel Datacenter Network Architecture at Scale



Tags:
microsoft research