Refined By:
Type:  Article

Results 1-20 of 28 (Search time: 0.005 seconds).

Issue DateTitleAuthor(s)
1Sep-2016Design and implementation of totally-self checking SHA-1 and SHA-256 hash functions’ architecturesMichail, Harris ; Athanasiou, George S. ; Theodoridis, George ; Gregoriades, Andreas ; Goutis, Costas E. 
21-Apr-2016Area-throughput trade-offs for SHA-1 and SHA-256 hash functions' pipelined designsMichail, Harris ; Athanasiou, George S. ; Kelefouras, Vasilios I. ; Theodoridis, George ; Stouraitis, Thanos ; Goutis, Costas E. 
3Sep-2014On the development of high-throughput and area-efficient multi-mode cryptographic hash designs in FPGAsMichail, Harris ; Athanasiou, George S. ; Theodoridis, George ; Goutis, Costas E. 
4Mar-2014Optimising the SHA-512 cryptographic hash function on FPGAsAthanasiou, George S. ; Michail, Harris ; Theodoridis, George ; Goutis, Costas E. 
5Jul-2013A systematic flow for developing totally self-checking architectures for SHA-1 and SHA-2 cryptographic hash familiesAthanasiou, George S. ; Theodoridis, G. ; Goutis, Costas E. ; Michail, Harris ; Kasparis, Takis 
6Jan-2013High-performance FPGA implementations of the cryptographic hash function JHAthanasiou, George S. ; Michail, Harris ; Theodoridis, G. ; Goutis, Costas E. 
7Mar-2012On the Exploitation of a High-throughput SHA-256 FPGA Design for HMACMichail, Harris ; Athanasiou, George S. ; Kelefouras, Vassilis ; Theodoridis, George ; Goutis, Costas E. 
8Mar-2012On the Exploitation of a High-throughput SHA-256 FPGA Design for HMACGoutis, Costas E. ; Michail, Harris ; Athanasiou, George S. ; Kelefouras, Vasilis ; Theodoridis, George 
9Dec-2011A methodology for speeding up fast fourier transform focusing on memory architecture utilizationMichail, Harris ; Kelefouras, Vasileios I. ; Athanasiou, George S. ; Alachiotis, Nikolaos ; Kritikakou, Angeliki S. ; Goutis, Costas E. 
10Apr-2011Cipher block based authentication module: A hardware design perspectiveKakarountas, Athanasios P.; Selimis, Georgios ; Michail, Harris ; Schinianakis, Dimitrios ; Goutis, Costas E.
117-Sep-2010A Data Locality Methodology for Matrix-matrix Multiplication AlgorithmAthanasiou, George S. ; Kritikakou, Angeliki S. ; Goutis, Costas E. ; Kelefouras, Vasileios I. ; Alachiotis, Nikolaos ; Michail, Harris 
12Jun-2010Decoupled processors architecture for accelerating data intensive applications using scratch-pad memory hierarchyMichail, Harris ; Milidonis, Athanasios S. ; Alachiotis, Nikolaos 
13Jun-2010High Throughput Hardware/Software Co-Design Approach for SHA-256 Hashing Cryptographic Module In IPSec/IPv6Michail, Harris ; Athanasiou, George S. ; Gregoriades, Andreas ; Panagiotou, C. L. 
141-Dec-2009High-throughput implementation of the RIPEMD-160Kakarountas, Athanasios P. ; Michail, Harris ; Goutis, Costas E. ; Rjoub, Abdoul M. 
15Oct-2009A top-down design methodology for ultrahigh-performance hashing coresMichail, Harris ; Kakarountas, Athanasios P. ; Milidonis, Athanasios S. ; Goutis, Costas E. 
16Jun-2009An RNS implementation of an Fp elliptic curve point multiplierFournaris, Apostolos P. ; Kakarountas, Atharoutas P. ; Michail, Harris ; Stouraitis, Thanos ; Schinianakis, Dimitrios M. 
17Feb-2009Improved throughput bit-serial multiplier for GF(2m) fieldsMichail, Harris ; Selimis, George N. ; Fournaris, Apostolos P. 
18Jan-2009Low-power architecture with scratch-pad memory for accelerating embedded applications with run-time reuseMichail, Harris ; Milidonis, Athanasios S. ; Porpodas, Vasileios 
192009Assessing Students’ Learning in MIS using Concept MappingGregoriades, Andreas ; Pampaka, Maria ; Michail, Harris 
20Apr-2007Server side hashing core exceeding 3 Gbps of throughputMichail, Harris ; Goutis, Costas E.; Panagiotakopoulos, George A. ; Thanasoulis, Vasilis N. ; Kakarountas, Athanasios P.