Intel® SHA Extensions Implementations

Authored by admin

The Intel® Secure Hash Algorithm (SHA) Extensions are designed to improve the performance of SHA-1 and SHA-256 on Intel® Architecture (IA) processors.

Last updated on 07/23/2013 - 11:17

Intel® SHA Extensions

Authored by admin

Download PDF

Last updated on 07/23/2013 - 08:58

Improving the Performance of the Secure Hash Algorithm (SHA-1)

Authored by Max Locktyukhin (Intel)
Fast Secure Hash Algorithm (SHA-1) implementation for Intel Architecture. Last updated on 07/01/2013 - 13:26

Improving the Performance of the Secure Hash Algorithm (SHA-1)

Authored by Max Locktyukhin (Intel)

Improving the performance of the Secure Hash Algorithm (SHA-1) with Intel® Supplemental SSE3 instructions.

Introduction

Last updated on 08/31/2012 - 13:38

Using Intel® Streaming SIMD Extensions and Intel® Integrated Performance Primitives to Accelerate Algorithms

Authored by admin
This paper examines how to use Intel® SSE to accelerate an image processing application, how to take advantage of it using compiler directives for optimal SIMD code generation, and how to employ Intel® IPP to fully exploit SIMD acceleration. Last updated on 11/03/2014 - 11:27

Digital Security and Surveillance on 4th generation Intel® Core™ processors Using Intel® System Studio 2015

Authored by Naveen Gv (Intel)
This article presents the advantages of developing embedded digital video surveillance systems to run on 4th generation Intel® Core™ processor with Intel® HD Graphics, in combination with the Intel® System Studio 2015 software development suite. While Intel® HD Graphics is useful for developing many types of computer vision functionalities in video management software; Intel® System Studio... Last updated on 12/03/2014 - 11:35

INTRODUCTION TO INTEL® AES-NI AND INTEL® SECURE KEY INSTRUCTIONS

Authored by Gael Hofemeier (Intel)
Starting in 2010 with the Intel® Core™ processor family based on the 32nm Intel® microarchitecture, Intel introduced a set of new AES (Advanced Encryption Standard) instructions. This processor launch brought seven new instructions. Last updated on 05/08/2013 - 09:02

Secure your Web Services

Authored by Nitin Gupta (Intel)

by Nitin GruptaIntel Corporation

Last updated on 08/14/2012 - 12:07

Cilk++ Sets World Record for Crypto Hash Function Throughput

Authored by STEPHEN L. (Intel)
by Ilya Mirman Last updated on 08/13/2012 - 21:20

Wi-Fi and WiMAX Protocols of Security

Authored by Judy Hartley (Intel)
Abstract Last updated on 08/06/2013 - 10:36