Skip to content

Commit 8c8aa75

Browse files
authored
Update lab01.md
1 parent 09455b0 commit 8c8aa75

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

Diff for: education/sheffield_onedaycuda/lab01.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,7 @@ Note: The $$mod$$ operation is not the same as the remainder operator (`%`) for
3030

3131
As each of the encrypted character values are independent we can use the GPU to decrypt them in parallel. To do this we will launch a thread for each of the encrypted character values and use a kernel function to perform the decryption. Starting from the code provided in `exercise01.cu`, complete the following;
3232

33-
* 1.1. Modify the modulo function so that it can be called on the device by the `affine_decrypt` kernel.
33+
* 1.1. Modify the `modulo` function (by adding an appropriate function decorator) so that it can be called on the device by the `affine_decrypt` kernel.
3434
* 1.2. Implement the decryption kernel for a single block of threads with an `x` dimension of `N` (`1024`). The function should store the result in `d_output`. You can define the inverse modulus `A`, `B` and `M` using a C pre-processor definition.
3535
* 1.3. Allocate some memory on the device for the input (`d_input`) and output (`d_output`).
3636
* 1.4. Copy the host input values in `h_input` to the device memory `d_input`.

0 commit comments

Comments
 (0)