Please use this identifier to cite or link to this item:
https://hdl.handle.net/20.500.14279/14000
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Kakarountas, Athanasios P. | - |
dc.contributor.author | Michail, Harris | - |
dc.contributor.author | Goutis, Costas E. | - |
dc.contributor.author | Rjoub, Abdoul M. | - |
dc.date.accessioned | 2019-06-03T08:22:02Z | - |
dc.date.available | 2019-06-03T08:22:02Z | - |
dc.date.issued | 2009-12-01 | - |
dc.identifier.citation | International Journal of Internet Technology and Secured Transactions, 2009, vol. 1, no. 3-4, pp. 309-316 | en_US |
dc.identifier.issn | 17485703 | - |
dc.identifier.uri | https://hdl.handle.net/20.500.14279/14000 | - |
dc.description.abstract | One-way hash functions are the main cryptographic primitives which are used in the network protocols for user authentication and message integration. In the literature, implementations have been proposed either in hardware or software. The rich number of implementations is expected considering the number of constraints of a target application. When the target is to service more and more users-clients and thus the increase of their throughput, a hardware implementation is dictated. In this paper, RIPEMD-160 hash function is considered and a technique to increase its throughput. This technique involves the application of algorithmic transformations in space and time. The proposed technique leads to an increased throughput by 35% when compared to conventional implementations. Copyright © 2009 Inderscience Enterprises Ltd. | en_US |
dc.format | en_US | |
dc.language.iso | en | en_US |
dc.relation.ispartof | International Journal of Internet Technology and Secured Transactions | en_US |
dc.rights | © Inderscience | en_US |
dc.subject | Security | en_US |
dc.subject | CMAC | en_US |
dc.subject | Message authentication code | en_US |
dc.subject | Secured transactions | en_US |
dc.subject | VLSI implementation | en_US |
dc.title | High-throughput implementation of the RIPEMD-160 | en_US |
dc.type | Article | en_US |
dc.collaboration | University of Patras | en_US |
dc.collaboration | Jordan University of Science and Technology | en_US |
dc.subject.category | Electrical Engineering - Electronic Engineering - Information Engineering | en_US |
dc.journals | Subscription | en_US |
dc.country | Greece | en_US |
dc.country | Jordan | en_US |
dc.subject.field | Engineering and Technology | en_US |
dc.publication | Peer Reviewed | en_US |
dc.identifier.doi | 10.1504/IJITST.2009.023910 | en_US |
dc.identifier.scopus | 2-s2.0-84878636433 | en |
dc.identifier.url | https://api.elsevier.com/content/abstract/scopus_id/84878636433 | en |
dc.contributor.orcid | #NODATA# | en |
dc.contributor.orcid | #NODATA# | en |
dc.contributor.orcid | #NODATA# | en |
dc.contributor.orcid | #NODATA# | en |
dc.relation.issue | 3-4 | en_US |
dc.relation.volume | 1 | en_US |
cut.common.academicyear | 2009-2010 | en_US |
dc.identifier.spage | 309 | en_US |
dc.identifier.epage | 316 | en_US |
item.openairecristype | http://purl.org/coar/resource_type/c_6501 | - |
item.grantfulltext | none | - |
item.cerifentitytype | Publications | - |
item.fulltext | No Fulltext | - |
item.languageiso639-1 | en | - |
item.openairetype | article | - |
crisitem.author.dept | Department of Electrical Engineering, Computer Engineering and Informatics | - |
crisitem.author.faculty | Faculty of Engineering and Technology | - |
crisitem.author.orcid | 0000-0002-8299-8737 | - |
crisitem.author.parentorg | Faculty of Engineering and Technology | - |
crisitem.journal.journalissn | 1748-5703 | - |
crisitem.journal.publisher | Inderscience | - |
Appears in Collections: | Άρθρα/Articles |
CORE Recommender
Items in KTISIS are protected by copyright, with all rights reserved, unless otherwise indicated.