Please use this identifier to cite or link to this item:
Title: Efficient implementation of the Keyed-Hash Message Authentication Code (HMAC) using the SHA-1 hash function
Authors: Michail, Harris 
Kakarountas, Athanasios P.
Milidonis, Athanasios S.
Keywords: Computational complexity;Computer hardware;Field programmable gate arrays
Issue Date: 2004
Publisher: IEEE
Source: 11th IEEE International Conference on Electronics, Circuits and Systems ICECS, 2004, Pages 567-570
Abstract: In this paper an efficient implementation, in terms of performance, of the Keyed-Hash Message Authentication Code (HMAC) using the SHA-1 hash function is presented. This mechanism is used for message authentication in combination with a shared secret key. The proposed hardware implementation can be synthesized easily for a variety of FPGA and ASIC technologies. Simulation results, using commercial tools, verified the efficiency of the HMAC implementation in terms of performance and throughput Special care has been taken so that the proposed implementation doesn't introduce extra design complexity; while in parallel functionality was kept to the required levels.
ISBN: 0780387155
DOI: 10.1109/ICECS.2004.1399744
Rights: © 2004 IEEE
Type: Book Chapter
Appears in Collections:Κεφάλαια βιβλίων/Book chapters

Show full item record

Page view(s)

Last Week
Last month
checked on Dec 11, 2018

Google ScholarTM



Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.