Please use this identifier to cite or link to this item:
|Title:||Efficient implementation of the Keyed-Hash Message Authentication Code (HMAC) using the SHA-1 hash function||Authors:||Michail, Harris
Kakarountas, Athanasios P.
Milidonis, Athanasios S.
|Keywords:||Computational complexity;Computer hardware;Field programmable gate arrays||Issue Date:||2004||Publisher:||IEEE||Source:||11th IEEE International Conference on Electronics, Circuits and Systems ICECS, 2004, Pages 567-570||Abstract:||In this paper an efficient implementation, in terms of performance, of the Keyed-Hash Message Authentication Code (HMAC) using the SHA-1 hash function is presented. This mechanism is used for message authentication in combination with a shared secret key. The proposed hardware implementation can be synthesized easily for a variety of FPGA and ASIC technologies. Simulation results, using commercial tools, verified the efficiency of the HMAC implementation in terms of performance and throughput Special care has been taken so that the proposed implementation doesn't introduce extra design complexity; while in parallel functionality was kept to the required levels.||URI:||http://ktisis.cut.ac.cy/handle/10488/7374||ISBN:||0780387155||DOI:||10.1109/ICECS.2004.1399744||Rights:||© 2004 IEEE||Type:||Book Chapter|
|Appears in Collections:||Κεφάλαια βιβλίων/Book chapters|
Show full item record
checked on Nov 22, 2017
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.