Please use this identifier to cite or link to this item: https://hdl.handle.net/20.500.14279/9295
DC FieldValueLanguage
dc.contributor.authorMichail, Harris-
dc.contributor.authorAthanasiou, George S.-
dc.contributor.authorKelefouras, Vasilios I.-
dc.contributor.authorTheodoridis, George-
dc.contributor.authorStouraitis, Thanos-
dc.contributor.authorGoutis, Costas E.-
dc.contributor.otherΜιχαήλ, Χάρης-
dc.date.accessioned2017-01-27T13:05:04Z-
dc.date.available2017-01-27T13:05:04Z-
dc.date.issued2016-04-01-
dc.identifier.citationJournal of Circuits, Systems and Computers, 2016, vol. 25, no. 4,en_US
dc.identifier.issn02181266-
dc.identifier.urihttps://hdl.handle.net/20.500.14279/9295-
dc.description.abstractHigh-throughput designs of hash functions are strongly demanded due to the need for security in every transmitted packet of worldwide e-transactions. Thus, optimized and non-optimized pipelined architectures have been proposed raising, however, important questions. Which is the optimum number of the pipeline stages? Is it worth to develop optimized designs or could the same results be achieved by increasing only the pipeline stages of the non-optimized designs? The paper answers the above questions studying extensively many pipelined architectures of SHA-1 and SHA-256 hashes, implemented in FPGAS, in terms of throughput/area (T/A) factor. Also, guides for developing efficient security schemes designs are provided.en_US
dc.formatpdfen_US
dc.language.isoenen_US
dc.relation.ispartofJournal of Circuits, Systems and Computersen_US
dc.rights© World Scientificen_US
dc.subjectHash functionen_US
dc.subjectPipelineen_US
dc.subjectMessage authentication codeen_US
dc.titleArea-throughput trade-offs for SHA-1 and SHA-256 hash functions' pipelined designsen_US
dc.typeArticleen_US
dc.collaborationUniversity of Patrasen_US
dc.collaborationCyprus University of Technologyen_US
dc.collaborationKhalifa Universityen_US
dc.subject.categoryElectrical Engineering - Electronic Engineering - Information Engineeringen_US
dc.journalsSubscriptionen_US
dc.countryUnited Arab Emiratesen_US
dc.countryGreeceen_US
dc.countryCyprusen_US
dc.subject.fieldEngineering and Technologyen_US
dc.publicationPeer Revieweden_US
dc.identifier.doi10.1142/S0218126616500328en_US
dc.relation.issue4en_US
dc.relation.volume25en_US
cut.common.academicyear2015-2016en_US
item.fulltextNo Fulltext-
item.cerifentitytypePublications-
item.grantfulltextnone-
item.openairecristypehttp://purl.org/coar/resource_type/c_6501-
item.openairetypearticle-
item.languageiso639-1en-
crisitem.journal.journalissn1793-6454-
crisitem.journal.publisherWorld Scientific-
crisitem.author.deptDepartment of Electrical Engineering, Computer Engineering and Informatics-
crisitem.author.facultyFaculty of Engineering and Technology-
crisitem.author.orcid0000-0002-8299-8737-
crisitem.author.parentorgFaculty of Engineering and Technology-
Appears in Collections:Άρθρα/Articles
CORE Recommender
Show simple item record

SCOPUSTM   
Citations

12
checked on Nov 9, 2023

WEB OF SCIENCETM
Citations

11
Last Week
0
Last month
0
checked on Oct 29, 2023

Page view(s)

436
Last Week
1
Last month
13
checked on May 14, 2024

Google ScholarTM

Check

Altmetric


Items in KTISIS are protected by copyright, with all rights reserved, unless otherwise indicated.