La versione del browser in uso non è consigliata per questo sito.Prendere in considerazione l'aggiornamento alla versione più recente del proprio browser facendo clic su uno dei link seguenti.
Questo PDF è disponibile solo per il download
Fast Cryptographic Computation Via Function Stitching Executive SummaryCryptographic applications often run more than one independent algorithm such as encryption and authentication. This fact provides a high level of parallelism, which can be exploited by software and converted into instruction-level parallelism to improve overall performance on modern super-scalar processors. We present fast and efficient methods of computing such pairs of functions on Intel® architecture processors using a method called “function stitching.” Instead of computing pairs of functions sequentially as is done today in applications/libraries, we replace the function calls by a single call to a composite function that implements both algorithms. The execution time of this composite function can be made significantly shorter than the sums of the execution times for the individual functions and, in many cases, close to the execution time of the slower function.Read the full Fast Cryptographic Computation Via Function Stitching White Paper.
Download del PDF
Telecommunications computing architecture for industrial and military use. (v.1, Feb. 2011)
Processor array reduces image resolution time for radar analytics. (v.1, Feb. 2011)
Explains virtualization fundamentals, business impact, industry factors, model comparisons, and more.
Demos how virtualization and manageability improve network efficiency; Portuguese subtitles.
Explores Intel® Virtualization Technology, how it works, and common virtualization techniques.
First Intel® Atom™ processor-based system-on-chip offers embedded system integration and flexibility.