text
hidden text to trigger early load of fonts ПродукцияПродукцияПродукцияПродукция Các sản phẩmCác sản phẩmCác sản phẩmCác sản phẩm المنتجاتالمنتجاتالمنتجاتالمنتجات מוצריםמוצריםמוצריםמוצרים
Banner Image

Document Library

Reference architectures, white papers, and solutions briefs to help build and enhance your network infrastructure, at any level of deployment.

Related Content

Advanced Encryption Standard Galois Counter Mode - Optimized GHASH Function Technology Guide

Last Updated: Aug 29, 2023

Galois/Counter Mode (GCM) is a mode of operation for authenticated encryption. In this mode, data is encrypted via Advanced Encryption Standard (AES) block cipher and an authentication tag is generated by applying a hash function (GHASH) to the entire ciphertext. This paper introduces novel techniques to further improve the performance of GHASH. These techniques present algorithmic improvements, which can be utilized in any setting for GCM implementation.

Download PDF

Your browser does not support PDFs. Download the PDF.

Categories
Categories - Hardware Platforms Categories - NFVI Hardware Categories - NFVI OS/Virtualization Categories - Open Source Solutions Categories - Security and Confidential Computing Categories - Software Platforms Intel Technologies and Platforms - 3rd gen Intel Xeon Scalable processor Intel Technologies and Platforms - 3rd generation Intel Xeon D Processor Family Intel Technologies and Platforms - 4th gen Intel Xeon Scalable processor Network Location - Core Network Network Location - Data Center Network Location - Device Edge Network Location - Hybrid Cloud Network Location - On Premises Network Location - Radio Access Network (RAN) Network Technologies - Cloud Native/NFV Network Technologies - Containers/Kubernetes Network Technologies - Network Edge Network Technologies - Network Security Optimizations - DPDK Orchestration and Network Management - Virtualized Infrastructure Manager (VIM) System Integrators - System Integrators Verticals/Industries - Automotive Verticals/Industries - Cloud Service Providers Verticals/Industries - Enterprise Verticals/Industries - Financial Services Verticals/Industries - Government Verticals/Industries - Hospitality Verticals/Industries - Industrial Verticals/Industries - Manufacturing Verticals/Industries - Media and Entertainment Verticals/Industries - Medical and Healthcare Verticals/Industries - Retail Verticals/Industries - System Integration Verticals/Industries - Telecommunications Verticals/Industries - Transportation VNFS and CNFs - Content Delivery Networks (CDN) Workloads and Use cases - Artificial Intelligence (AI) Workloads and Use cases - Augmented/Virtual Reality (AR/VR) Workloads and Use cases - Cloud Gaming Workloads and Use cases - Computer Vision Workloads and Use cases - Connected Cars Workloads and Use cases - Content Distribution (CDN) Workloads and Use cases - Emergency Response Workloads and Use cases - Media Analytics Workloads and Use cases - SD-WAN and uCPE Workloads and Use cases - Secure Access Service Edge (SASE) Workloads and Use cases - Security Workloads and Use cases - Smart Cities Workloads and Use cases - Smart Factory Workloads and Use cases - Smart Retail Workloads and Use cases - Storage as a Service (SaaS) Workloads and Use cases - Video Surveillance Workloads and Use cases - Virtualized Small Cell Gateway