Cryptography methods and apparatus
First Claim
Patent Images
1. A cryptography method, comprising:
- in response to receiving a request to perform a first operation on data in a first memory cacheline, accessing data associated with the first memory cacheline;
performing cryptography on data of the first memory cacheline when necessary; and
speculatively accessing data associated with a second memory cacheline based on the first memory cacheline before receiving a request to perform an operation on data in the second memory cacheline.
1 Assignment
0 Petitions
Accused Products
Abstract
In a first aspect, a first cryptography method is provided. The first method includes the steps of (1) in response to receiving a request to perform a first operation on data in a first memory cacheline, accessing data associated with the first memory cacheline; (2) performing cryptography on data of the first memory cacheline when necessary; and (3) speculatively accessing data associated with a second memory cacheline based on the first memory cacheline before receiving a request to perform an operation on data in the second memory cacheline. Numerous other aspects are provided.
51 Citations
20 Claims
-
1. A cryptography method, comprising:
-
in response to receiving a request to perform a first operation on data in a first memory cacheline, accessing data associated with the first memory cacheline;
performing cryptography on data of the first memory cacheline when necessary; and
speculatively accessing data associated with a second memory cacheline based on the first memory cacheline before receiving a request to perform an operation on data in the second memory cacheline. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A cryptography apparatus, comprising:
controller logic, adapted to couple to a processing unit and a memory of a system, and further adapted to;
in response to receiving a request to perform a first operation on data in a first memory cacheline, access data associated with the first memory cacheline;
perform cryptography on data of the first memory cacheline when necessary; and
speculatively access data associated with a second memory cacheline based on the first memory cacheline before receiving a request to perform an operation on data in the second memory cacheline. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
15. A cryptography system, comprising:
-
a processing unit;
a memory; and
controller logic, coupled to the processing unit and memory, and adapted to;
in response to receiving a request to perform a first operation on data in a first memory cacheline, access data associated with the first memory cacheline;
perform cryptography on data of the first memory cacheline when necessary; and
speculatively access data associated with a second memory cacheline based on the first memory cacheline before receiving a request to perform an operation on data in the second memory cacheline. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification