Browsing by Authors Michail, Harris


Or, select a letter below to browse by last name
0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Showing results 7 to 26 of 68 < previous   next >
Issue DateTitleAuthor(s)
7-Sep-2010A Data Locality Methodology for Matrix-matrix Multiplication AlgorithmAthanasiou, George S. ; Kritikakou, Angeliki S. ; Goutis, Costas E. ; Kelefouras, Vasileios I. ; Alachiotis, Nikolaos ; Michail, Harris 
Apr-2007A decoupled architecture of processors with scratch-pad memory hierarchyMichail, Harris ; Milidonis, Athanasios S. ; Alachiotis, Nikolaos 
Jun-2010Decoupled processors architecture for accelerating data intensive applications using scratch-pad memory hierarchyMichail, Harris ; Milidonis, Athanasios S. ; Alachiotis, Nikolaos 
Mar-2012Design and implementation of a SHA-3 candidate Skein-512 hash/MAC hardware architectureMichail, Harris ; Athanasiou, George S. ; Tsingkas, Elias N. ; Chalkou, Chara I. ; Theodoridis, G. ; Goutis, Costas E. 
Sep-2016Design and implementation of totally-self checking SHA-1 and SHA-256 hash functions’ architecturesMichail, Harris ; Athanasiou, George S. ; Theodoridis, George ; Gregoriades, Andreas ; Goutis, Costas E. 
Jul-2018Design and validation of an agent-based driving simulatorGregoriades, Andreas ; Pampaka, Maria ; Michail, Harris ; Viugova, Maria 
Dec-2010Designs and comparisons of authentication modules for IPSec in configurable and extensible embedded processorMichail, Harris ; Athanasiou, George S. ; Makridakis, George 
Nov-2014Distribution of cultural content through exploitation of cryptographic algorithms and hardware identificationMichail, Harris ; Louca, Constantinos ; Gavrilis, Dimitris ; Gregoriades, Andreas ; Anastasiou, Lazaros ; Ioannides, Marinos 
2015A driving simulator for discovering requirements in complex systemsMichail, Harris ; Gregoriades, Andreas ; Pampaka, Maria ; Hadjicosti, Jack ; Florides, Christos 
Aug-2005Efficient design of high-level mechanisms for hard safety-critical low-power devicesKakarountas, A. P. ; Michail, Harris ; Goutis, C. A. ; Spiliotopoulos, V. ; Nikolaidis, S. ; Kokkinos, V. 
Dec-2004Efficient implementation of the Keyed-Hash Message Authentication Code (HMAC) using the SHA-1 hash functionMichail, Harris ; Kakarountas, Athanasios P. ; Milidonis, Athanasios S. 
Nov-2005Efficient small-sized implementation of the keyed-hash message authentication codMichail, Harris ; Yiakoumis, Ioannis I. ; Papadonikolakis, Markos E. 
1-Dec-2005Efficient small-sized implementation of the keyed-hash message authentication codeYiakoumis, Ioannis ; Michail, Harris ; Papadonikolakis, Markos ; Goutis, Costas E.; Kakarountas, Athanasios P.
Oct-2012Evolution of the e-Museum concept through exploitation of cryptographic algorithmsIoannides, Marinos ; Michail, Harris ; Athanasiou, George S. ; Gregoriades, Andreas 
30-Oct-2015Hardware implementation of the Totally Self-Checking SHA-256 hash coreMichail, Harris ; Kotsiolis, Apostolis ; Kakarountas, Athanasios P. ; Athanasiou, George S. ; Goutis, Costas E. 
6-Aug-2015High performance pipelined FPGA implementation of the SHA-3 hash algorithmIoannou, Lenos ; Michail, Harris ; Voyiatzis, Artemios G. 
Jun-2010High Throughput Hardware/Software Co-Design Approach for SHA-256 Hashing Cryptographic Module In IPSec/IPv6Michail, Harris ; Athanasiou, George S. ; Gregoriades, Andreas ; Panagiotou, C. L. 
Nov-2005High throughput implementation of the new Secure Hash Algorithm through partial unrollingMichail, Harris ; Goutis, Costas E.; Aisopos, Konstantinos; Kakarountas, Athanasios P.
Jan-2013High-performance FPGA implementations of the cryptographic hash function JHAthanasiou, George S. ; Michail, Harris ; Theodoridis, G. ; Goutis, Costas E. 
Aug-2006High-speed FPGA implementation of secure hash algorithm for IPSec and VPN applicationsKakarountas, Athanasios P.; Theodoridis, George; Milidonis, Athanasios ; Goutis, Costas E.; Michail, Harris