Dashboard

Find Content

Refine Results
Embedded Content Library

Active Tags

  • 16 Results
  • Items Per Page

Boosting AES Algorithm Performance for Superior Encryption

White Paper: Running the AES algorithm with Intel® technology improves encryption performance of serial and parallel modes of operation. (April 2010)

Multi-buffer IPsec Implementation on Intel® Processors White Paper

White Paper: Describes highly-optimized implementations on the Intel® Multi-Buffer Crypto for IPsec. (v.001, Dec. 2012)

Preview | Download

Fast SHA512 Implementations on Intel® Architecture: White Paper

White Paper: Describes family of highly optimized implementations of the SHA512 cryptographic hash algorithm on Intel® processors (v.001, Nov. 2012).

Preview | Download

Large Integer Squaring on Intel® Architecture Processors

White Paper: Critical operations in large integer arithmetic using new instructions on Intel® processors for fast implementation. (v.001, Jan. 2013)

Preview | Download

Improve Linux* Secure Storage Performance with Intel® AES-NI

White Paper: Cipher algorithms optimized for Intel® AES-NI can deliver up to 6x performance gain in the Linux* storage subsystem (v.1, Feb. 2013).

Preview | Download

Fast SHA-256 Implementations on Intel® Architecture Processors

White Paper: Describes highly-optimized Fast SHA-256 cryptographic hash algorithm implementations for Intel® processors. (v.001, May 2012)

Preview | Download

Improve IPSec Performance Using Intel® AES Instructions

White Paper: Demos IPSec performance capabilities in Linux* using Intel® AES New Instructions and Galois Counter Mode* algorithm combination.

Preview | Download

High Performance DEFLATE Compression Intel® Architecture: Paper

White Paper: The performance characteristics of fast prototype implementations of DEFLATE compression on Intel® processors addresses server burdens.

Preview | Download

Enhance Embedded System Security with Intel® AES-NI

Advanced encryption in Intel® AES New Instructions prevents delays and avoids errors, enhancing the security of embedded systems. (v.001, Nov. 2010)

Novel Hashing Method Suitable for Lookup Functions: Paper

Describes a hashing method suitable for lookup functions and how to compute a high-quality 64-bit hash digest on Intel® processors. (v.1, Feb. 2012)

Preview | Download