Please use this identifier to cite or link to this item: https://hdl.handle.net/20.500.14279/14000
DC FieldValueLanguage
dc.contributor.authorKakarountas, Athanasios P.-
dc.contributor.authorMichail, Harris-
dc.contributor.authorGoutis, Costas E.-
dc.contributor.authorRjoub, Abdoul M.-
dc.date.accessioned2019-06-03T08:22:02Z-
dc.date.available2019-06-03T08:22:02Z-
dc.date.issued2009-12-01-
dc.identifier.citationInternational Journal of Internet Technology and Secured Transactions, 2009, vol. 1, no. 3-4, pp. 309-316en_US
dc.identifier.issn17485703-
dc.identifier.urihttps://hdl.handle.net/20.500.14279/14000-
dc.description.abstractOne-way hash functions are the main cryptographic primitives which are used in the network protocols for user authentication and message integration. In the literature, implementations have been proposed either in hardware or software. The rich number of implementations is expected considering the number of constraints of a target application. When the target is to service more and more users-clients and thus the increase of their throughput, a hardware implementation is dictated. In this paper, RIPEMD-160 hash function is considered and a technique to increase its throughput. This technique involves the application of algorithmic transformations in space and time. The proposed technique leads to an increased throughput by 35% when compared to conventional implementations. Copyright © 2009 Inderscience Enterprises Ltd.en_US
dc.formatpdfen_US
dc.language.isoenen_US
dc.relation.ispartofInternational Journal of Internet Technology and Secured Transactionsen_US
dc.rights© Inderscienceen_US
dc.subjectSecurityen_US
dc.subjectCMACen_US
dc.subjectMessage authentication codeen_US
dc.subjectSecured transactionsen_US
dc.subjectVLSI implementationen_US
dc.titleHigh-throughput implementation of the RIPEMD-160en_US
dc.typeArticleen_US
dc.collaborationUniversity of Patrasen_US
dc.collaborationJordan University of Science and Technologyen_US
dc.subject.categoryElectrical Engineering - Electronic Engineering - Information Engineeringen_US
dc.journalsSubscriptionen_US
dc.countryGreeceen_US
dc.countryJordanen_US
dc.subject.fieldEngineering and Technologyen_US
dc.publicationPeer Revieweden_US
dc.identifier.doi10.1504/IJITST.2009.023910en_US
dc.identifier.scopus2-s2.0-84878636433en
dc.identifier.urlhttps://api.elsevier.com/content/abstract/scopus_id/84878636433en
dc.contributor.orcid#NODATA#en
dc.contributor.orcid#NODATA#en
dc.contributor.orcid#NODATA#en
dc.contributor.orcid#NODATA#en
dc.relation.issue3-4en_US
dc.relation.volume1en_US
cut.common.academicyear2009-2010en_US
dc.identifier.spage309en_US
dc.identifier.epage316en_US
item.openairecristypehttp://purl.org/coar/resource_type/c_6501-
item.grantfulltextnone-
item.cerifentitytypePublications-
item.fulltextNo Fulltext-
item.languageiso639-1en-
item.openairetypearticle-
crisitem.author.deptDepartment of Electrical Engineering, Computer Engineering and Informatics-
crisitem.author.facultyFaculty of Engineering and Technology-
crisitem.author.orcid0000-0002-8299-8737-
crisitem.author.parentorgFaculty of Engineering and Technology-
crisitem.journal.journalissn1748-5703-
crisitem.journal.publisherInderscience-
Appears in Collections:Άρθρα/Articles
CORE Recommender
Show simple item record

Page view(s)

285
Last Week
0
Last month
13
checked on May 21, 2024

Google ScholarTM

Check

Altmetric


Items in KTISIS are protected by copyright, with all rights reserved, unless otherwise indicated.