Browsing by Author Michail, Harris


Or, select a letter below to browse by last name
0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Showing results 1 to 20 of 48  next >
Issue DateTitleAuthor(s)
2008Application of novel technique in RIPEMD-160 aiming at high-throughputMichail, Harris ; Thnanasoulis, V. N.; Schinianakis, Dimitrios M.
1-Apr-2016Area-throughput trade-offs for SHA-1 and SHA-256 hash functions' pipelined designsMichail, Harris ; Athanasiou, George S. ; Kelefouras, Vasilios I. ; Theodoridis, George ; Stouraitis, Thanos ; Goutis, Costas E. 
2005Case study and application of pre-computation technique for hashing cores aiming at high-throughput implementationsMichail, Harris ; Kakarountas, Athanasios P.; Goutis, Costas E.
2011Cipher block based authentication module: a hardware design perspectiveMichail, Harris ; Schinianakis, Dimitrios M.; Goutis, Costas E.
2012Combining traffic simulation with bayesian networks for improved quantification of accident risk indexMichail, Harris ; Mouskos, Kyriacos C. ; Gregoriades, Andreas 
2010A data locality methodology for matrix-matrix multiplication algorithmMichail, Harris ; Alachiotis, Nikolaos; Kelefouras, Vasileios I.
2007A decoupled architecture of processors with scratch-pad memory hierarchyMichail, Harris ; Milidonis, Athanasios S.; Alachiotis, Nikolaos
2010Decoupled processors architecture for accelerating data intensive applications using scratch-pad memory hierarchyMichail, Harris ; Milidonis, Athanasios S.; Alachiotis, Nikolaos
2012Design and implementation of a SHA-3 candidate Skein-512 hash/MAC hardware architectureMichail, Harris ; Athanasiou, George S. ; Tsingkas, Elias N.; Chalkou, Chara I.; Theodoridis, G.; Goutis, Costas E.
1-Sep-2016Design and implementation of totally-self checking SHA-1 and SHA-256 hash functions’ architecturesMichail, Harris ; Athanasiou, George S. ; Theodoridis, George ; Gregoriades, Andreas ; Goutis, Costas E. 
2010Designs and comparisons of authentication modules for IPSec in configurable and extensible embedded processorMichail, Harris ; Athanasiou, George S. ; Makridakis, George 
2014Distribution of cultural content through exploitation of cryptographic algorithms and hardware identificationMichail, Harris ; Louca, Constantinos ; Gavrilis, Dimitris ; Gregoriades, Andreas ; Anastasiou, Lazaros ; Ioannides, Marinos 
2005Efficient design of high-level mechanisms for hard safety-critical low-power devicesMichail, Harris ; Kakarountas, Athanasios P.; Kokkinos, Vasileios
2004Efficient implementation of the Keyed-Hash Message Authentication Code (HMAC) using the SHA-1 hash functionMichail, Harris ; Kakarountas, Athanasios P.; Milidonis, Athanasios S.
2005Efficient small-sized implementation of the keyed-hash message authentication codMichail, Harris ; Yiakoumis, Ioannis I.; Papadonikolakis, Markos E.
2012Evolution of the e-Museum concept through exploitation of cryptographic algorithmsIoannides, Marinos ; Michail, Harris ; Athanasiou, George S. ; Gregoriades, Andreas 
30-Oct-2015Hardware implementation of the Totally Self-Checking SHA-256 hash coreMichail, Harris ; Kotsiolis, Apostolis ; Kakarountas, Athanasios P. ; Athanasiou, George S. ; Goutis, Costas E. 
6-Aug-2015High performance pipelined FPGA implementation of the SHA-3 hash algorithmIoannou, Lenos ; Michail, Harris ; Voyiatzis, Artemios G. 
31-Jul-2013High-performance FPGA implementations of the cryptographic hash function JHAthanasiou, George S. ; Michail, Harris ; Theodoridis, G. ; Goutis, Costas E. 
2012High-throughput hardware architectures of the JH round-three SHA-3 candidate: An FPGA design and implementation approachGoutis, Costas E.; Athanasiou, George S. ; Chalkou, Chara I.; Bardis, D.; Michail, Harris ; Theodoridis, George