Hardware-based encryption: Difference between revisions

Content deleted Content added
Cite web on web citation
Line 22:
* [[IBM 4764]] and [[IBM 4765]], identical except for the connection used.<ref name="NIST approval" /> The former uses [[PCI-X]], while the latter uses [[PCI-e]].<ref name="IBM 4764" /> Both are [[peripheral devices]] that plug into the [[motherboard]].
=== Proliferation ===
Note that [[Advanced Micro Devices|Advanced Micro Devices]] (AMD)]] processors are also x86 devices, and have supported the [[AES instruction set|AES instructions]] since the 2011 [[Bulldozer (microarchitecture)|Bulldozer]] processor iteration. <ref name="Arecibo Bulldozer" />
Due to the existence of encryption instructions on modern processors provided by both [[Intel]] and [[Advanced Micro Devices|AMD]], the instructions are present on most modern computers.<ref name="Haifa" /> They also exist on many tablets and smartphones due to their implementation in [[ARM architecture|ARM processors]].<ref name="Haifa" />
 
== Advantages ==