Dashboard

Find Content

Related Content

Active Tags

  • 45 Results
  • Items Per Page

Using Encryption to Protect Against Health IT Data Breaches

The increase in the mobile workforce necessitates the adoption of security solutions that protect devices and data that is travelling (physically).

Preview | Download

Enhance Embedded System Security with Intel® AES-NI

Advanced encryption in Intel® AES New Instructions prevents delays and avoids errors, enhancing the security of embedded systems. (v.001, Nov. 2010)

High Performance DEFLATE Decompression on Intel® Architecture

White Paper: Performance characteristics of an optimized implementation of DEFLATE decompression on Intel® processors. (v.001, Nov. 2010)

Preview | Download

High-Performance Storage Encryption on Intel® Architecture

White Paper: Describes the performance benefits of optimizing storage encryption on Intel® architecture. (v.1, Aug. 2010)

Preview | Download

Advanced Encryption Standard Instructions Set

White Paper: Provides an overview of the Advanced Encryption Standard algorithm, including instructions to secure processing. (v.1, July 2008)

Preview | Download

Fast SHA512 Implementations on Intel® Architecture: White Paper

White Paper: Describes family of highly optimized implementations of the SHA512 cryptographic hash algorithm on Intel® processors (v.001, Nov. 2012).

Preview | Download

Fast SHA-256 Implementations on Intel® Architecture Processors

White Paper: Describes highly-optimized Fast SHA-256 cryptographic hash algorithm implementations for Intel® processors. (v.001, May 2012)

Preview | Download

Enabling High-Performance Galois-Counter Mode on Intel® Processors

Intel improves data security with Galois-Counter Mode (GCM) implementations on Intel® processors, which perform high-speed GCM encryption.

Preview | Download

Improve IPSec Performance Using Intel® AES Instructions

White Paper: Demos IPSec performance capabilities in Linux* using Intel® AES New Instructions and Galois Counter Mode* algorithm combination.

Preview | Download

Fast Cryptographic Computation Via Function Stitching

White Paper: Describes how stitching pairs of cryptographic computation functions together improves performance over sequential execution. (Apr. 2010)

Preview | Download