Dashboard

Find Content

Refine Results
Related Content

Selected Filters

  • 15 Results
  • Items Per Page

Itanium® Processor Enables Superior System Security

White Paper: Itanium® processor system security characteristics, capabilities, and how to prevent attacks via Secure64’s server software product.

Preview | Download

Pattern Matching Performance with HyperScan* Software: Brief

Solution Brief: Discusses pattern matching performance optimization of Sensory Networks HyperScan* software with Intel® Xeon® processors.

Preview | Download

Optimized Galois-Counter-Mode Implementation

White Paper: Optimized Galois-Counter-Mode execution combines stitching with polynomial multiplication, increasing performance on Intel® processors.

Preview | Download

Zlib* Sample Patch: Download Instructions

Download Instructions: Links to the zlib* sample patch for Intel® QuickAssist Technology. (v.L.0.4.4_001, Oct. 2013)

Libcrypto* Sample Patch: Download Instructions

Download Instructions: Links to the libcrypto* sample patch for Intel® QuickAssist Technology. (v.L.0.4.4_007, Nov. 2013)

Enhance Embedded System Security with Intel® AES-NI

Advanced encryption in Intel® AES New Instructions prevents delays and avoids errors, enhancing the security of embedded systems. (v.001, Nov. 2010)

Improving Cryptographic Processing with Intel® Technology

White Paper: Examines options to improve cryptographic processing using Intel® technology, including algorithm performance results. (v.1, Jan. 2011)

Preview | Download

Improve Linux* Secure Storage Performance with Intel® AES-NI

White Paper: Cipher algorithms optimized for Intel® AES-NI can deliver up to 6x performance gain in the Linux* storage subsystem (v.1, Feb. 2013).

Preview | Download

Improve IPSec Performance Using Intel® AES Instructions

White Paper: Demos IPSec performance capabilities in Linux* using Intel® AES New Instructions and Galois Counter Mode* algorithm combination.

Preview | Download

Fast Cryptographic Computation Via Function Stitching

White Paper: Describes how stitching pairs of cryptographic computation functions together improves performance over sequential execution. (Apr. 2010)

Preview | Download