Please use this identifier to cite or link to this item: https://hdl.handle.net/20.500.14279/13955
DC FieldValueLanguage
dc.contributor.authorKakarountas, Athanasios P.-
dc.contributor.authorSelimis, Georgios-
dc.contributor.authorMichail, Harris-
dc.contributor.authorSchinianakis, Dimitrios-
dc.contributor.authorGoutis, Costas E.-
dc.date.accessioned2019-05-31T09:36:03Z-
dc.date.available2019-05-31T09:36:03Z-
dc.date.issued2011-04-
dc.identifier.citationJournal of Circuits, Systems and Computers, 2011, vol. 20, no.2, pp. 163-184en_US
dc.identifier.issn17936454-
dc.description.abstractMessage Authentication Codes (MACs) are widely used in order to authenticate data packets, which are transmitted thought networks. Typically MACs are implemented using modules like hash functions and in conjunction with encryption algorithms (like Block Ciphers), which are used to encrypt the transmitted data. However NIST in May 2005 issued a standard, addressing certain applications and their needs, defining a way to implement MACs through FIPS-approved and secure block cipher algorithms. In this paper the best performing implementation of the CMAC standard is presented, in terms of throughput, along with an efficient AES design and implementation. © 2011 World Scientific Publishing Company.en_US
dc.language.isoenen_US
dc.relation.ispartofJournal of Circuits, Systems and Computersen_US
dc.rights© World Scientific Publishing Company.en_US
dc.subjectCryptographyen_US
dc.subjectMessage authentication codeen_US
dc.subjectVLSIen_US
dc.titleCipher block based authentication module: A hardware design perspectiveen_US
dc.typeArticleen_US
dc.collaborationUniversity of Patrasen_US
dc.collaborationUniversity of Central Greeceen_US
dc.collaborationIMECen_US
dc.subject.categoryElectrical Engineering - Electronic Engineering - Information Engineeringen_US
dc.journalsSubscriptionen_US
dc.countryGreeceen_US
dc.countryNetherlandsen_US
dc.subject.fieldEngineering and Technologyen_US
dc.publicationPeer Revieweden_US
dc.identifier.doi10.1142/S0218126611007189en_US
dc.identifier.scopus2-s2.0-79952591748en
dc.identifier.urlhttps://api.elsevier.com/content/abstract/scopus_id/79952591748en
dc.contributor.orcid#NODATA#en
dc.contributor.orcid#NODATA#en
dc.contributor.orcid#NODATA#en
dc.contributor.orcid#NODATA#en
dc.contributor.orcid#NODATA#en
dc.relation.issue2en_US
dc.relation.volume20en_US
cut.common.academicyear2010-2011en_US
dc.identifier.spage163en_US
dc.identifier.epage184en_US
item.fulltextNo Fulltext-
item.cerifentitytypePublications-
item.grantfulltextnone-
item.openairecristypehttp://purl.org/coar/resource_type/c_6501-
item.openairetypearticle-
item.languageiso639-1en-
crisitem.journal.journalissn1793-6454-
crisitem.journal.publisherWorld Scientific-
crisitem.author.deptDepartment of Electrical Engineering, Computer Engineering and Informatics-
crisitem.author.facultyFaculty of Engineering and Technology-
crisitem.author.orcid0000-0002-8299-8737-
crisitem.author.parentorgFaculty of Engineering and Technology-
Appears in Collections:Άρθρα/Articles
CORE Recommender
Show simple item record

SCOPUSTM   
Citations

2
checked on Mar 14, 2024

WEB OF SCIENCETM
Citations

2
Last Week
0
Last month
0
checked on Oct 29, 2023

Page view(s)

277
Last Week
1
Last month
12
checked on May 11, 2024

Google ScholarTM

Check

Altmetric


Items in KTISIS are protected by copyright, with all rights reserved, unless otherwise indicated.