Contents
Overview ................................................................................................................ 5
Performance ............................................................................................................ 7
Conclusion .............................................................................................................. 9
References .............................................................................................................. 9
4
Cryptographic Performance on the
2nd Generation Intel® Core™ processor family