Dashboard

Find Content

Related Content

Active Tags

  • 41 Results
  • Items Per Page

Mobile Device Security with Windows* 8.1 Begins in the Hardware

Solution Brief: Strengthen your mobile device security with hardware-enhanced protections on devices powered by Intel® processors with Windows 8.1*."

Preview | Download

Enhanced Data Protection with Hardware-Assisted Security

Intel ensures data protection by consulting with global security experts, supporting key security standards, security innovations and secure systems.

High-Performance Storage Encryption on Intel® Architecture

White Paper: Describes the performance benefits of optimizing storage encryption on Intel® architecture. (v.1, Aug. 2010)

Preview | Download

Intel® Technology Enables Fast and Secure Data Encryption

Introduces Intel® Advanced Encryption Standard New Instructions, which enable data encryption and support AES key expansion. (Aug. 2012)

Examining Intel® AES-NI Performance on Intel® Core™ i7 Processor

Mandarin, Platform Brief: With low voltage options, the Intel® Xeon® processor 5100 series provides efficient balanced power. (v.006, June 2009)

Intel® Data Protection Technology with AES-NI and Secure Key

Intel® AES-NI is a new encryption instruction set, improving on the previous algorithm and accelerating data encryption.

Processing Multiple Buffers in Parallel for Performance

White Paper: How processing multiple independent data buffers in parallel dramatically increases performance without SIMD on Intel® processors.

Preview | Download

Secure the Enterprise with Intel® AES-NI: White Paper

Covers Intel® AES New Instructions, its usage models, performance improvements, and cryptographic libraries.

Preview | Download

Fast SHA-256 Implementations on Intel® Architecture Processors

White Paper: Describes highly-optimized Fast SHA-256 cryptographic hash algorithm implementations for Intel® processors. (v.001, May 2012)

Preview | Download

Haswell Cryptographic Performance

White Paper: Discusses Haswell Intel® Core™ processor family features for cryptographic algorithm implementations such as Secure Hash Algorithm.

Preview | Download