لوحة المعلومات

البحث في المحتوى

تحسين النتائج
Related Content

علامات الترميز النشطة

  • 18 النتائج
  • العناصر في كل صفحة

High-Performance Storage Encryption on Intel® Architecture

White Paper: Describes the performance benefits of optimizing storage encryption on Intel® architecture. (v.1, Aug. 2010)

مراجعة | تنزيل

Improve IPSec Performance Using Intel® AES Instructions

White Paper: Demos IPSec performance capabilities in Linux* using Intel® AES New Instructions and Galois Counter Mode* algorithm combination.

مراجعة | تنزيل

High Performance DEFLATE Compression Intel® Architecture: Paper

White Paper: The performance characteristics of fast prototype implementations of DEFLATE compression on Intel® processors addresses server burdens.

مراجعة | تنزيل

Fast SHA-256 Implementations on Intel® Architecture Processors

White Paper: Describes highly-optimized Fast SHA-256 cryptographic hash algorithm implementations for Intel® processors. (v.001, May 2012)

مراجعة | تنزيل

Enhance Embedded System Security with Intel® AES-NI

Advanced encryption in Intel® AES New Instructions prevents delays and avoids errors, enhancing the security of embedded systems. (v.001, Nov. 2010)

Intel® Advanced Encryption Standard Instructions: Article

Intel’s Jeffrey Rott presents an in-depth look at Intel® Advanced Encryption Standard New Instructions and performance and security improvements.

Boosting AES Algorithm Performance for Superior Encryption

White Paper: Running the AES algorithm with Intel® technology improves encryption performance of serial and parallel modes of operation. (April 2010)

Enabling Intel® AES New Instructions in the Enterprise

Video: Greg Wagnon, Intel's resident Data Center Dude and Leslie Xu discuss enabling Intel® AES Encryption.

A Trusted Cloud Solution from HyTrust, VMware, and Intel

The path to a secure, trusted cloud solution giving customers an agile cloud solution based on Intel® technology.

مراجعة | تنزيل

حماية بيانات مع أمان مستند إلى الأجهزة

تضمن إنتل حماية البيانات من خلال التشاور مع خبراء أمان عالميين، واعتماد معايير الأمان الأساسية وأحدث الابتكارات في مجال الأمان، بالإضافة إلى استخدام الأنظمة الآمنة.