指令集架构扩展

英特尔的指令集架构 (ISA) 继续在发展,其功能不断扩展,用户体验不断丰富,并不断产生跨行业的协同效益。

英特尔® 安全哈希算法扩展(英特尔® SHA 扩展)

安全哈希算法 (SHA) 是最常用的加密算法之一。 安全哈希算法的主要用途包括数据完整性、消息验证、数字签名和重复数据删除。 随着安全解决方案日益广泛地使用,现在安全哈希算法在应用程序中的使用比以往任何时候都更普遍。 英特尔® 安全哈希算法扩展旨在提高在基于英特尔® 架构的处理器上的密集型计算算法的性能。

英特尔® 安全哈希算法扩展是基于一组七个英特尔® 流式 SIMD 扩展的指令,这些指令共同使用,可在基于英特尔架构的处理器上加速 SHA-1 和 SHA-256 的处理性能。 鉴于安全哈希算法在日常计算设备上的重要性日益提高,设计了新指令以壮大单一数据缓冲区的哈希性能。 性能优势不但有助于提高给定应用程序的响应性、降低能耗,还使开发人员能在新应用程序中实现用户体验目标的同时,采用安全哈希算法来保护数据。 这些指令的定义方式在于简化与大多数软件库的算法处理流的映射,从而便于开发。

How to properly use the PMC0 and PMC1 performance counters Hi all, I have a question regarding on how to use the PMC0 and PMC1 together with the APIC_LVTPC. I have developed 2 Linux* kernel modules. First, reads PEBS and second, reads LBR. I use PMC0 and PMC1 to count the event. My problem is that if I load PEBS module and than LBR reading module than...
Intel® Xeon® Processor E7 v3 Product Family Based on Intel® Core™ microarchitecture (formerly codenamed Haswell) and manufactured on 22-nanometer process technology, these processors provide significant performance over the previous-generation Intel Xeon processor E7 v2 product family. This is the first Intel® Xeon® processor product...
Intel® Xeon® E5-2600 v3 Product Family Based on Intel® Core™ microarchitecture (formerly codenamed Haswell) and manufactured on 22-nanometer process technology, these processors provide significant performance over the previous-generation Intel® Xeon® processor E5-2600 v2 product family. This is the first Intel® Xeon® processor family...
Innovative Instructions and Software Model for Isolated Execution
2013/08/14
Download white paper as PDF By:Frank McKeen, Ilya Alexandrovich, Alex Berenzon, Carlos Rozas, Hisham Shafi, Vedvyas Shanbhogue and Uday SavagaonkarIntel Corporation
Using Innovative Instructions to Create Trustworthy Software Solutions
2013/08/14
Download white paper as PDF By:Matthew Hoekstra, Reshma Lal, Pradeep Pappachan, Carlos Rozas, Vinay Phegade, Juan del Cuvillo Intel Corporation
Innovative Technology for CPU Based Attestation and Sealing
2013/08/14
Download white paper as PDF By:Ittai Anati, Shay Gueron, Simon P Johnson, Vincent R Scarlata Intel Corporation
Intel® SHA Extensions Implementations
2013/07/18
The Intel® Secure Hash Algorithm (SHA) Extensions are designed to improve the performance of SHA-1 and SHA-256 on Intel® Architecture (IA) processors. This code download provides optimized assembly and intrinsic routines using the Intel® SHA Extensions. A sample test application using published...
Intel® SHA Extensions
2013/07/17
Download PDF New Instructions Supporting the Secure Hash Algorithm on Intel® Architecture Processors July 2013
Intel® Intrinsics Guide
2012/10/30
Overview The Intel Intrinsics Guide is an interactive reference tool for Intel intrinsic instructions, which are C style functions that provide access to many Intel instructions – including Intel® Streaming SIMD Extensions (Intel® SSE), Intel® Advanced Vector Extensions (Intel® AVX), and more –...