We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
take_even_odd
This has been taken from Benedikt Wagner's document.
Link:
rust-eth-kzg/cryptography/polynomial/src/domain.rs
Line 274 in e043452
It may improve performance, if a single loop iteration takes two indices.
Some rough pseudocode for this could be:
fn take_even_odd<T: Clone>(list: &[T]) -> (Vec<T>, Vec<T>) { assert!(list.len() % 2 == 0, "List length must be even"); let mut even = Vec::with_capacity(list.len() / 2); let mut odd = Vec::with_capacity(list.len() / 2); for chunk in list.chunks_exact(2) { even.push(chunk[0].clone()); odd.push(chunk[1].clone()); } (even, odd) }
Related to #246
The text was updated successfully, but these errors were encountered:
This may be worth a try. Not sure if it really improves performance :)
Sorry, something went wrong.
We now use the iterative version of FFT which does not require take_even_odd! This was added in #274
No branches or pull requests
This has been taken from Benedikt Wagner's document.
Link:
rust-eth-kzg/cryptography/polynomial/src/domain.rs
Line 274 in e043452
Some rough pseudocode for this could be:
Related to #246
The text was updated successfully, but these errors were encountered: