期刊文献+

分簇式VLIW密码专用处理器的编译器后端优化研究

Optimizing Compiler Back-end for Clustered VLIW Cryptographic Processor
下载PDF
导出
摘要 密码专用处理器常采用分簇式超长指令字(Very Long Instruction Word,VLIW)架构,其性能的发挥依赖于编译器的实现.当前对于通用VLIW架构的编译后端优化方案,在密码专用处理器上都有一定的不适应性.为此,本文提出了一种面向密码专用处理器的、同时进行簇指派、指令调度和寄存器分配的编译器后端优化方法.构造“定值-引用”链,求解变量的候选寄存器类型集合交集,确定其寄存器类型;实时评估可用资源,进行基于优先级的指令选择和基于平衡寄存器压力的簇指派;改进线性扫描算法,基于变量的“待引用次数”列表进行实时的寄存器分配.实验结果表明,本方法能够提升生成代码的性能,且算法是非启发式的,减小了编译所需的时间. Clustered Very Long Instruction Word(VLIW)architecture is widely adopted in cryptographic processors and compilers dominate the performance of those.In this paper,an optimizing framework of compiler back-end for cryptographic processors is proposed,that integrates the cluster assignment,instruction scheduling,and register allocation steps into a single phase.This approach determines the variable′s register type by constructing a use-def chain and finding the intersection of candidate register types sets.Within the available resources,priority-based instruction selection is performed and cluster assignment aiming at balanced register pressure is conducted.The linear scan algorithm is revised to implement a real-time register allocation based on the list of remaining use.The whole process is non-heuristic,so it avoids successive iterations.Experimental results show that the proposed technique is capable of generating more efficient code than previously proposed techniques for it allows global optimization.
作者 吴艾青 李伟 别梦妮 南龙梅 陈韬 WU Ai-qing;LI Wei;BIE Meng-ni;NAN Long-mei;CHEN Tao(Strategic Support Force Information Engineering University,Zhengzhou 450001,China)
出处 《小型微型计算机系统》 CSCD 北大核心 2023年第10期2346-2352,共7页 Journal of Chinese Computer Systems
基金 国家自然科学基金项目(61404175)资助 基础加强计划基金项目(2019-JCJQ-JJ-123)资助.
关键词 编译优化 密码专用处理器 超长指令字 指令调度 寄存器分配 compiler optimization cryptographic processor VLIW instruction schedule register allocation
  • 相关文献

参考文献8

二级参考文献23

  • 1鲍可进,宋永刚.基于FPGA的有限域求逆算法的改进及实现[J].计算机工程,2006,32(23):156-158. 被引量:4
  • 2Adam. J. Elbirt, Christof Paar, "An Instruction- level Distributed Processor for Symmetric-Key Crypptography[J]", IEEE Transactions on Parallel and Distributed Systems, vo1.16, no.5, pp 468- 480, May, 2005.
  • 3Kagotani, H. Schmit, H. Asynchronous, "PipeRench: architecture and performance evaluations[C]", 7 7th Annuol IEEE Symposium on FieldProgrammable Custom Computing Machines, pp 121-129, 2003.
  • 4lisa Wu, Chris Weaver, Todd Austin, "Cryptornaniac: A fast flexible architecture for secure communication[C]". In proceeding of 28th Annual International Symposium on Computer Architecture, pp 101-119, 2001.
  • 5Rainer Buchty, "CRVPTONITE: A Programmable Crypto Processor Architecture For High-Bandwidth Applications[D]". Institute fur Informatik der Technischen Universitot Munchen. 2002.
  • 6Sean O'Melia, Adam J. Elbirt, "Enhancing the Performance of Symmetric-Key Cryptography via Instruction Set Extensions[J]". IEEE Transactions on Very Large Scale Integration System, vo1.18, no.11, pp 1505-1518, November, 2010.
  • 7Advanced Encryption Standard[EB/Ol]. http:// www.nist.gov/aes.
  • 8DES, FIPS, Federal Information Processing Standard [EB/Ol]. http://csrc.nist.gov/ps/change81.
  • 9Recommendation for Block Cipher Modes of Operation, NIST Special Publication SP 800- 38A[EB/O l]. http://csrc.n ist.gov /pu b lications/ nistpubs/index.html.
  • 10Wei Huang, Jun Han, Shuai Wang, Xiaoyang Zeng, "A low-Complexity Heterogeneous MultiCore Platform for Security SoC[C]". IEEE Asian Solid-State Circuits Conference(ASSCC 2010), pp 1-4,2010.

共引文献40

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部