Cryptographic Performance on the
2nd Generation Intel® Core™ processor family
4
Contents
Multi-Buffer via Data Dependency Hiding .................................................. 6
Private-Key and Secure Hashing Performance ............................................ 8
Public Key Encryption Performance ........................................................... 8