Intel® ISA-L Cryptographic Hashing | Intel Software

Subscribers:
257,000
Published on ● Video Link: https://www.youtube.com/watch?v=ORaRdZ9yMWg



Duration: 4:32
281 views
4


Cryptographic hashing is attractive for applications such as deduplication and encryption because it offers a very low probability of collision. Learn how the Intel® Intelligent Storage Acceleration Library (Intel ISA-L) implementation takes maximum advantage of Intel® architecture and the inherent parallelism of the execution pipeline to provide great performance using a technique called multi-buffer hashing.

Intel® Intelligent Storage Acceleration Library (Intel® ISA-L): http://intel.ly/2wngTMB

Code sample - Intel® Intelligent Storage Acceleration Library: Cryptographic Hashes for Cloud Storage: http://intel.ly/2wmSeYF

Intel® ISA-L on Github: https://github.com/01org/isa-l?utm_source=ISTV&utm_medium=Video&utm_campaign=ISTV_2017

and: https://github.com/01org/isa-l_crypto?utm_source=ISTV&utm_medium=Video&utm_campaign=ISTV_2017


SUBSCRIBE NOW: http://bit.ly/2iZTCsz

About Intel Software:
The Intel® Developer Zone encourages and supports software developers that are developing applications for Intel hardware and software products. The Intel Software YouTube channel is a place to learn tips and tricks, get the latest news, watch product demos from both Intel, and our many partners across multiple fields. You'll find videos covering the topics listed below, and to learn more you can follow the links provided!

Connect with Intel Software:
Visit INTEL SOFTWARE WEBSITE: https://software.intel.com/en-us
Like INTEL SOFTWARE on FACEBOOK: http://bit.ly/2z8MPFF
Follow INTEL SOFTWARE on TWITTER: http://bit.ly/2zahGSn

INTEL SOFTWARE GITHUB: http://bit.ly/2zaih6z
INTEL DEVELOPER ZONE LINKEDIN: http://bit.ly/2z979qs
INTEL DEVELOPER ZONE INSTAGRAM: http://bit.ly/2z9Xsby
INTEL GAME DEV TWITCH: http://bit.ly/2BkNshu

Intel® ISA-L Cryptographic Hashing | Intel SoftwareO
https://www.youtube.com/intelsoftware

#IntelSoftware




Other Videos By Intel Software


2017-10-03October 2017 | Intel® Developer Zone Update | Intel Software
2017-09-21Creating Key and Certificate Files for Encryption and Authentication | Intel Software
2017-09-21Demonstrating MRAA and UPM Examples | Intel Software
2017-09-21A Brief Exploration of the OSI 7 Layer Model | Intel Software
2017-09-07September 2017 | AI News | Intel Software
2017-09-06Introducing the Intel® Innovators of Tomorrow | Intel Software
2017-09-05September 2017 | Intel® Developer Zone Update | Intel Software
2017-08-31What is Intel® ISA-L? | Intel Software
2017-08-31Intel® ISA-L Compression Algorithms | Intel Software
2017-08-31Intel® ISA-L Semi-Dynamic Compression Code Sample Walk Through | Intel Software
2017-08-31Intel® ISA-L Cryptographic Hashing | Intel Software
2017-08-31Intel® ISA-L Cryptographic Hashing Code Sample Overview | Intel Software
2017-08-31Intel® ISA-L Erasure Coding | Intel Software
2017-08-31Intel® ISA-L Erasure Coding Sample Application Overview | Intel Software
2017-08-30How Developers Can Benefit from the DPDK Packet Framework | Intel Software
2017-08-30Deep Dive Into the Architecture of a Pipeline Stage | Intel Software
2017-08-03August 2017 | AI News | Intel Software
2017-08-01August 2017 | Intel® Developer Zone Update | Intel Software
2017-07-28Intel® Clear Containers: How We Made Them Smaller and Faster Part 1 | Intel Software
2017-07-28Intel® Clear Containers: How We Made Them Smaller and Faster Part 2 | Intel Software
2017-07-28Intel® Clear Containers Overview | Intel Software



Tags:
Intel® ISA-L
Software Tools
Software Developer
cryptographic
Developer
Intel Developer Zone
hashing
praveen kundurthy
SDS
code sample
IDZ
Intelligent Storage Acceleration Library
Storage
Developer Tools
Intel Software
Storage Training
Trained
cryptographic hashing
Software Defined Storage
cryptographic hashing code sample
Intel