Dashboard

Inhoud zoeken

Gerelateerde inhoud

Actieve tags

  • 36 Resultaten
  • Items per pagina

Intel® Data Protection Technologie met AES-NI en Secure Key

Intel® AES-NI is een nieuwe set encryptie-instructies die het vorige algoritme verbetert en zorgt voor een snellere encryptie van gegevens.

Tier 3 Strengthens Cloud Security with Intel® AES-NI

Case Study: Tier 3 uses Intel® Advanced Encryption Standard New Instructions for companies to cost-effectively expand security in customers’ cloud.

Preview | Download

Haswell Cryptographic Performance

White Paper: Discusses Haswell Intel® Core™ processor family features for cryptographic algorithm implementations such as Secure Hash Algorithm.

Preview | Download

Secure the Enterprise with Intel® AES-NI: White Paper

Covers Intel® AES New Instructions, its usage models, performance improvements, and cryptographic libraries.

Preview | Download

New Instructions Support Large Integer Arithmetic

White Paper: Describes critical operations required in large integer arithmetic and efficient implementations of new instructions. (v.001, Aug. 2012)

Preview | Download

Fast SHA-256 Implementations on Intel® Architecture Processors

White Paper: Describes highly-optimized Fast SHA-256 cryptographic hash algorithm implementations for Intel® processors. (v.001, May 2012)

Preview | Download

Fast Cryptographic Computation Via Function Stitching

White Paper: Describes how stitching pairs of cryptographic computation functions together improves performance over sequential execution. (Apr. 2010)

Preview | Download

Enterprise Security with Data Encryption Performance

Data Encryption performance with Intel AES-NI

Preview | Download

Accelerate McAfee Endpoint Encryption* with Intel® AES-NI

McAfee and Intel optimize full-disk encryption using Intel® AES New Instructions with software-based encryption for better performance and security.

Preview | Download

Video: Boost Cloud Security with Intel AES New Instructions

Including Intel® AES-NI in your cloud strategy reduces code size, execution cycles, and vulnerability to attack while boosting performance.