Zobrazeno 1 - 10
of 93
pro vyhledávání: '"Goutis, Costas E."'
Autor:
Michail, Harris E., Athanasiou, George S., Theodoridis, George, Gregoriades, Andreas, Goutis, Costas E.
Publikováno v:
In Microprocessors and Microsystems September 2016 45 Part B:227-240
Publikováno v:
In Microprocessors and Microsystems 2009 33(2):91-105
Publikováno v:
In Journal of Systems Architecture 2008 54(5):479-490
Publikováno v:
In Microelectronics Journal June 2006 37(6):554-564
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Autor:
Goutis, Costas E., Michail, Harris, Athanasiou, George S., Theodoridis, George, Gregoriades, Andreas
Hash functions are among the major blocks of modern security schemes, used in many applications to provide authentication services. To meet the applications' real-time constraints, they are implemented in hardware offering high-performance and increa
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od______1540::3e65bab8004e5a06a0bf5b189626f0c1
https://api.elsevier.com/content/abstract/scopus_id/84867638119
https://api.elsevier.com/content/abstract/scopus_id/84867638119
Autor:
Athanasiou, George S., Theodoridis, George, Chalkou, Chara I., Goutis, Costas E., Michail, Harris, Bardis, D.
Hash functions are exploited by many cryptographic primitives that are incorporated in crucial cryptographic schemes and commercial security protocols. Nowadays, there is an active international competition, launched by the National Institute of Stan
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od______1540::1a140f2e029b01896e660c4815b32f1d
https://api.elsevier.com/content/abstract/scopus_id/84867636718
https://api.elsevier.com/content/abstract/scopus_id/84867636718
Speedups from mapping four real-life DSP applications on an embedded system-on-chip that couples coarsegrained reconfigurable logic with an instruction-set processor are presented. The reconfigurable logic is realized by a 2-Dimensional Array of Proc
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::08466d3ab55053ba6fbbcbfd254c94d2
Most of internet applications incorporate a security layer in which a hash function is found. These applications are addressing to more and more clients and thus the corresponding server accepts a great number of service requests. In order to indulge
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od______1540::d146993cda92eabbca30ee4b9b7cc09a
https://hdl.handle.net/20.500.14279/1515
https://hdl.handle.net/20.500.14279/1515
Hash functions are forming a special family of cryptographic algorithms, which are applied wherever message integrity and authentication issues are critical. Implementations of these functions are cryptographic primitives to the most widely used cryp
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od______1540::cf7c705e87ed65b99b7c7f45a9382b73
https://api.elsevier.com/content/abstract/scopus_id/22944486713
https://api.elsevier.com/content/abstract/scopus_id/22944486713