From 5e05745e93a126673f2ba96d1746637fe0a3f52d Mon Sep 17 00:00:00 2001 From: Daniel Schadt Date: Tue, 15 Apr 2025 22:29:06 +0200 Subject: slightly speed up aez_prf It doesn't matter much because we barely expect tau > 16, but if somebody decides to use aez as a way to generate a lot of pseudorandom bytes, then oh well. With this change, we make better use of SIMD block xor'ing if available. --- benches/zears.rs | 5 +++++ 1 file changed, 5 insertions(+) (limited to 'benches') diff --git a/benches/zears.rs b/benches/zears.rs index 8ea78ba..1144087 100644 --- a/benches/zears.rs +++ b/benches/zears.rs @@ -23,6 +23,11 @@ fn bench(c: &mut Criterion) { b.iter(|| aez.encrypt_inplace(&[0], &[], 16, &mut out)) }); + group.bench_function(BenchmarkId::new("aez_prf", size), |b| { + let mut out = vec![0u8; size]; + b.iter(|| aez.encrypt_inplace(&[0], &[], size as u32, &mut out)) + }); + let buf = aez.encrypt(&[0], &[], 16, &buf); group.bench_function(BenchmarkId::new("decrypt", size), |b| { -- cgit v1.2.3