Please use this identifier to cite or link to this item: https://hdl.handle.net/20.500.14279/13944
DC FieldValueLanguage
dc.contributor.authorMichail, Harris-
dc.contributor.authorKakarountas, Athanasios P.-
dc.date.accessioned2019-05-31T09:30:30Z-
dc.date.available2019-05-31T09:30:30Z-
dc.date.issued2011-01-
dc.identifier.citationComputer Security: Intrusion, Detection and Prevention, January 2011, pp. 91-106en_US
dc.identifier.isbn978-160692781-6-
dc.description.abstractCryptography can be considered as a special application of coding schemes. High speed execution of Encoding and Decoding processes is crucial in the majority of the so-called security schemes. In fact, the characteristics of a cryptographic algorithm in terms of throughput are usually the most important requirement to adopt the algorithm in a security scheme. As the need for higher security increases, the market urges for strong cryptographic protocols that will offer the desired degree of privacy. However, most of the algorithms now and forthcoming are complex and do not seem to be efficient for performance-oriented purposes. In this chapter, an algorithmic approach for designing high-speed cryptographic primitives is presented. Setting as target the high throughput, a complete methodology for developing various types of cryptographic primitives, focusing on hardware (without however excluding software, or a combination of them) is offered. The application of the proposed design approach also highlights the effect of designing for supercomputing on a critical application, such as cryptography. Parallelism and code transformation are few of the techniques that will be used for achieving the desired target, the implementation of the ever best proposed cryptographic primitives in terms of speed and throughput. © 2009 Nova Science Publishers, Inc. All rights reserved.en_US
dc.language.isoenen_US
dc.rights© 2009 Nova Science Publishersen_US
dc.subjectHash functionsen_US
dc.subjectCryptographic hashen_US
dc.titlePerformance for cryptography: Ahardware approachen_US
dc.typeBook Chapteren_US
dc.collaborationUniversity of Central Greeceen_US
dc.collaborationUniversity of Patrasen_US
dc.subject.categoryElectrical Engineering - Electronic Engineering - Information Engineeringen_US
dc.countryGreeceen_US
dc.subject.fieldEngineering and Technologyen_US
dc.publicationPeer Revieweden_US
dc.identifier.scopus2-s2.0-84892035222en
dc.identifier.urlhttps://api.elsevier.com/content/abstract/scopus_id/84892035222en
dc.contributor.orcid#NODATA#en
dc.contributor.orcid#NODATA#en
cut.common.academicyear2010-2011en_US
item.fulltextNo Fulltext-
item.cerifentitytypePublications-
item.grantfulltextnone-
item.openairecristypehttp://purl.org/coar/resource_type/c_3248-
item.openairetypebookPart-
item.languageiso639-1en-
crisitem.author.deptDepartment of Electrical Engineering, Computer Engineering and Informatics-
crisitem.author.facultyFaculty of Engineering and Technology-
crisitem.author.orcid0000-0002-8299-8737-
crisitem.author.parentorgFaculty of Engineering and Technology-
Appears in Collections:Κεφάλαια βιβλίων/Book chapters
CORE Recommender
Show simple item record

Page view(s) 50

253
Last Week
1
Last month
9
checked on May 12, 2024

Google ScholarTM

Check

Altmetric


Items in KTISIS are protected by copyright, with all rights reserved, unless otherwise indicated.