Conversation
|
Inspired from seeing stwo using a custom simd blake2: https://github.com/starkware-libs/stwo/blob/dev/crates/prover/src/core/backend/simd/blake2s.rs |
This reverts commit 171c442.
Previous BenchmarkBenchmark for Predicate
AIR metrics
Commit: 3dfdfb4 New BenchmarkBenchmark for Predicate
AIR metrics
Commit: 171c442 |
Previous BenchmarkBenchmark for ReadWrite
AIR metrics
Commit: 3dfdfb4 New BenchmarkBenchmark for ReadWrite
AIR metrics
Commit: 171c442 |
|
workflow for more comprehensive benches: https://github.com/axiom-crypto/afs-prototype/actions/runs/10311730058 results here: https://docs.google.com/spreadsheets/d/1wwhyGgFNGcapD2xk5_gixPFt8dlp722bRwwFHmaKzrE/edit?usp=sharing Closing for now since there's no difference. I feel there is something slightly fishy about this, but I'd need to make some flamegraphs of the trace commitment to go deeper. |
follow-up to #263. use the same trick to reduce constraint degrees of some airs
I added Sha256 from rust-crypto to Plonky3/Plonky3#413
Apparently the rust-crypto implementation even with NEON is perhaps 2x worse than the openssl one: RustCrypto/hashes#327 (comment)
Here I directly implement
CryptographicHasheron the openssl sha256, let's see the benchmarks.The openssl rust crate is just a FFI wrapper for their C library. I am hoping they use the ARMv8 SHA256 intrinsics: https://mijailovic.net/2018/06/06/sha256-armv8/