Browsing by Authors Athanasiou, George S.


Or, select a letter below to browse by last name
0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Showing results 1 to 20 of 21  next >
Issue DateTitleAuthor(s)
1-Apr-2016Area-throughput trade-offs for SHA-1 and SHA-256 hash functions' pipelined designsMichail, Harris ; Athanasiou, George S. ; Kelefouras, Vasilios I. ; Theodoridis, George ; Stouraitis, Thanos ; Goutis, Costas E. 
1-Mar-2010Authentication with RIPEMD-160 and Other Alternatives: A Hardware Design PerspectiveMichail, H. ; Gregoriades, Andreas ; Kelefouras, V. ; Athanasiou, George S. ; Kritikakou, A. ; Goutis, C. 
7-Sep-2010A Data Locality Methodology for Matrix-matrix Multiplication AlgorithmAthanasiou, George S. ; Kritikakou, Angeliki S. ; Goutis, Costas E. ; Kelefouras, Vasileios I. ; Alachiotis, Nikolaos ; Michail, Harris 
Mar-2012Design and implementation of a SHA-3 candidate Skein-512 hash/MAC hardware architectureMichail, Harris ; Athanasiou, George S. ; Tsingkas, Elias N. ; Chalkou, Chara I. ; Theodoridis, G. ; Goutis, Costas E. 
Sep-2016Design and implementation of totally-self checking SHA-1 and SHA-256 hash functions’ architecturesMichail, Harris ; Athanasiou, George S. ; Theodoridis, George ; Gregoriades, Andreas ; Goutis, Costas E. 
Dec-2010Designs and comparisons of authentication modules for IPSec in configurable and extensible embedded processorMichail, Harris ; Athanasiou, George S. ; Makridakis, George 
Oct-2012Evolution of the e-Museum concept through exploitation of cryptographic algorithmsIoannides, Marinos ; Michail, Harris ; Athanasiou, George S. ; Gregoriades, Andreas 
30-Oct-2015Hardware implementation of the Totally Self-Checking SHA-256 hash coreMichail, Harris ; Kotsiolis, Apostolis ; Kakarountas, Athanasios P. ; Athanasiou, George S. ; Goutis, Costas E. 
Jun-2010High Throughput Hardware/Software Co-Design Approach for SHA-256 Hashing Cryptographic Module In IPSec/IPv6Michail, Harris ; Athanasiou, George S. ; Gregoriades, Andreas ; Panagiotou, C. L. 
Jan-2013High-performance FPGA implementations of the cryptographic hash function JHAthanasiou, George S. ; Michail, Harris ; Theodoridis, G. ; Goutis, Costas E. 
21-Jun-2017Human object detection using very low resolution thermal cameras for urban search and rescueDoulamis, Nikolaos D. ; Agrafiotis, Panagiotis ; Athanasiou, George S. ; Amditis, Angelos 
Dec-2011A methodology for speeding up fast fourier transform focusing on memory architecture utilizationMichail, Harris ; Kelefouras, Vasileios I. ; Athanasiou, George S. ; Alachiotis, Nikolaos ; Kritikakou, Angeliki S. ; Goutis, Costas E. 
Sep-2014On the development of high-throughput and area-efficient multi-mode cryptographic hash designs in FPGAsMichail, Harris ; Athanasiou, George S. ; Theodoridis, George ; Goutis, Costas E. 
Jul-2012On the development of totally self-checking hardware design for the SHA-1 hash functionGoutis, Costas E. ; Michail, Harris ; Athanasiou, George S. ; Theodoridis, George ; Gregoriades, Andreas 
Mar-2012On the Exploitation of a High-throughput SHA-256 FPGA Design for HMACMichail, Harris ; Athanasiou, George S. ; Kelefouras, Vassilis ; Theodoridis, George ; Goutis, Costas E. 
Mar-2012On the Exploitation of a High-throughput SHA-256 FPGA Design for HMACGoutis, Costas E. ; Michail, Harris ; Athanasiou, George S. ; Kelefouras, Vasilis ; Theodoridis, George 
Mar-2014Optimising the SHA-512 cryptographic hash function on FPGAsAthanasiou, George S. ; Michail, Harris ; Theodoridis, George ; Goutis, Costas E. 
29-Jun-2016Real time earthquake's survivor detection using a miniaturized LWIR cameraAgrafiotis, Panagiotis ; Doulamis, Anastasios ; Athanasiou, George S. ; Amditis, Angelos 
Jul-2013A systematic flow for developing totally self-checking architectures for SHA-1 and SHA-2 cryptographic hash familiesAthanasiou, George S. ; Theodoridis, G. ; Goutis, Costas E. ; Michail, Harris ; Kasparis, Takis 
Jul-2010Ultra high speed SHA-256 hashing cryptographic module for IPSEC hardware/software codesignMichail, Harris ; Athanasiou, George S. ; Kritikakou, Angeliki S.