Zobrazeno 1 - 10
of 44
pro vyhledávání: '"Harris E. Michail"'
Publikováno v:
International E-Conference on Computer Science 2005
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::98bd57ce014e462e9314d1efa0cc81fa
https://doi.org/10.1201/9780429076893-40
https://doi.org/10.1201/9780429076893-40
Publikováno v:
IET Computers & Digital Techniques. 8:70-82
In this study, novel pipelined architectures, optimised in terms of throughput and throughput/area factors, for the SHA-512 cryptographic hash function, are proposed. To achieve this, algorithmic- and circuit-level optimisation techniques such as loo
Autor:
Costas E. Goutis, Harris E. Michail, George Theodoridis, George Athanasiou, Elias N. Tsingkas
Publikováno v:
Computer Science & Engineering: An International Journal. 3:1-21
Publikováno v:
IET Computers & Digital Techniques. 7:29-40
Hash functions are included in almost all cryptographic schemes and security protocols for providing authentication services. JH is a new hash function, introduced in 2008 and it is among the five finalists of the international competition for develo
Autor:
George Theodoridis, George Athanasiou, Harris E. Michail, Andreas Gregoriades, Costas E. Goutis
Many cryptographic primitives that are used in cryptographic schemes and security protocols such as SET, PKI, IPSec and VPN's utilize hash functions - a special family of cryptographic algorithms. Hardware implementations of cryptographic hash functi
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::d99ca8a199345a9cec47be98b0585577
https://hdl.handle.net/20.500.14279/9346
https://hdl.handle.net/20.500.14279/9346
Autor:
George Athanasiou, George Theodoridis, Costas E. Goutis, Thanos Stouraitis, Vasileios I. Kelefouras, Harris E. Michail
High-throughput designs of hash functions are strongly demanded due to the need for security in every transmitted packet of worldwide e-transactions. Thus, optimized and non-optimized pipelined architectures have been proposed raising, however, impor
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::1233d9a17a0d647e40829a071d229000
https://hdl.handle.net/20.500.14279/9295
https://hdl.handle.net/20.500.14279/9295
Autor:
Vasilios Kelefouras, Angeliki Kritikakou, N. Alachiotis, Constantinos E. Goutis, George Athanasiou, Harris E. Michail
Publikováno v:
IEEE Transactions on Signal Processing. 59:6217-6226
Several SOA (state of the art) self-tuning software libraries exist, such as the Fastest Fourier Transform in the West (FFTW) for fast Fourier transform (FFT). FFT is a highly important kernel and the performance of its software implementations depen
Autor:
G. Selimis, Dimitrios Schinianakis, Harris E. Michail, Athanasios Kakarountas, Costas E. Goutis
Publikováno v:
Journal of Circuits, Systems and Computers. 20:163-184
Message Authentication Codes (MACs) are widely used in order to authenticate data packets, which are transmitted thought networks. Typically MACs are implemented using modules like hash functions and in conjunction with encryption algorithms (like Bl
Publikováno v:
IEEE Transactions on Dependable and Secure Computing. 6:255-268
Many cryptographic primitives that are used in cryptographic schemes and security protocols such as SET, PKI, IPSec, and VPNs utilize hash functions, which form a special family of cryptographic algorithms. Applications that use these security scheme
Autor:
Constantinos E. Goutis, G. Selimis, Harris E. Michail, Michalis D. Galanis, Dimitrios Schinianakis
Publikováno v:
Journal of Computer Systems, Networks, and Communications, Vol 2008 (2008)
A new algorithm for producing message authenticating codes (MACs) was recently proposed by NIST. The MAC protects both a message's integrity—by ensuring that a different MAC will be produced if the message has changed—as well as its authenticity