Michael Sherwin wrote:There was a whole lot more to my proposal than the one simple example that Westcott decided to pick on and was not even the main focus of my idea. The main focus of my idea was a noncintiguous bit sub processor under control of source mask and destination mask. A much bigger waste of silicon!
You mentioned "This would allow simple iteration through all the possible sets (values) of the masked data" and that is excactly what Steffan's algorithms does - traversing all subsets of a set d, starting with the empty set. Did you understand that "simple" algorithm immediatly? It took me quite a while to get the idea of that carry rippler. No reason to become harsh or unrespectful, by calling Steffan by his surname only.
I have no idea what a noncintiguous bit sub processor under control of source mask and destination mask is. Can you please elaborate a bit more about that? E.g. with some sample bit-pattern or in C- or pseudo code.
Thanks,
Gerd