Dashboard

Find Content

Related Content

Selected Filters

  • 24 Results
  • Items Per Page

Data Protection with Hardware-Assisted Security

Intel ensures data protection by consulting with global security experts, supporting key security standards, security innovations, and secure systems.

Intel Hardware-Enhanced Data Protection

By building security into the hardware foundation, Intel is transforming endpoint encryption for data protection.

Preview | Download

Oracle* 11g Transparent Data Encryption with Intel® AES-NI

Guide: a short test case on how to use Intel® AES-NI with Oracle Transparent Data Encryption* (TDE).

Preview | Download

How to Provision a Windows* Web Server for Intel® AES-NI

White Paper: guide reviews steps to configure a server and client to use Intel® Advanced Encryption AES-NI when performing secure web transactions.

Preview | Download

Enhance Embedded System Security with Intel® AES-NI

Advanced encryption in Intel® AES New Instructions prevents delays and avoids errors, enhancing the security of embedded systems. (v.001, Nov. 2010)

Enabling High-Performance Galois-Counter Mode on Intel® Processors

Intel improves data security with Galois-Counter Mode (GCM) implementations on Intel® processors, which perform high-speed GCM encryption.

Preview | Download

Intel® Advanced Encryption Standard Instructions: Article

Intel’s Jeffrey Rott presents an in-depth look at Intel® Advanced Encryption Standard New Instructions and performance and security improvements.

Boosting AES Algorithm Performance for Superior Encryption

White Paper: Running the AES algorithm with Intel® technology improves encryption performance of serial and parallel modes of operation. (April 2010)

High Performance DEFLATE Decompression on Intel® Architecture

White Paper: Performance characteristics of an optimized implementation of DEFLATE decompression on Intel® processors. (v.1, Nov. 2010)

Preview | Download

Improving OpenSSL* Performance

White Paper: Results of OpenSSL* performance measurements with highly optimized cryptographic implementations on IA. (v.1, Oct. 2011)

Preview | Download