Kiren Srinivasan pfp
Kiren Srinivasan
@kiren
Has anyone here explicitly written 2 versions of code for 2 unique chip sets that have the same “user-facing” functionality? Would love the recast bump @v @cassie @gt
2 replies
1 recast
0 reaction

Cassie Heart pfp
Cassie Heart
@cassie
Warrants clarification: do you mean two different versions of assembly code for different ISAs for the same algorithm?
1 reply
0 recast
0 reaction

Kiren Srinivasan pfp
Kiren Srinivasan
@kiren
Correct
1 reply
0 recast
0 reaction

Cassie Heart pfp
Cassie Heart
@cassie
Ah yeah, have done that.
1 reply
0 recast
1 reaction

Kiren Srinivasan pfp
Kiren Srinivasan
@kiren
What kind of algorithm are you alluding to?
2 replies
0 recast
0 reaction

Cassie Heart pfp
Cassie Heart
@cassie
Cryptographic implementations usually — compilers are fighting a different battle than typical needs for cryptography — optimizations designed by a compiler are typically adverse to security.
1 reply
0 recast
1 reaction

Kiren Srinivasan pfp
Kiren Srinivasan
@kiren
Will most def need to Zoom with ya
1 reply
0 recast
1 reaction

Cassie Heart pfp
Cassie Heart
@cassie
cool cool, DC me!
0 reply
0 recast
1 reaction