Browsing by Authors Michail, Harris


Or, select a letter below to browse by last name
0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Showing results 10 to 29 of 68 < previous   next >
Issue DateTitleAuthor(s)
Mar-2012Design and implementation of a SHA-3 candidate Skein-512 hash/MAC hardware architectureMichail, Harris ; Athanasiou, George S. ; Tsingkas, Elias N. ; Chalkou, Chara I. ; Theodoridis, G. ; Goutis, Costas E. 
Sep-2016Design and implementation of totally-self checking SHA-1 and SHA-256 hash functions’ architecturesMichail, Harris ; Athanasiou, George S. ; Theodoridis, George ; Gregoriades, Andreas ; Goutis, Costas E. 
Jul-2018Design and validation of an agent-based driving simulatorGregoriades, Andreas ; Pampaka, Maria ; Michail, Harris ; Viugova, Maria 
Dec-2010Designs and comparisons of authentication modules for IPSec in configurable and extensible embedded processorMichail, Harris ; Athanasiou, George S. ; Makridakis, George 
Nov-2014Distribution of cultural content through exploitation of cryptographic algorithms and hardware identificationMichail, Harris ; Louca, Constantinos ; Gavrilis, Dimitris ; Gregoriades, Andreas ; Anastasiou, Lazaros ; Ioannides, Marinos 
2015A driving simulator for discovering requirements in complex systemsMichail, Harris ; Gregoriades, Andreas ; Pampaka, Maria ; Hadjicosti, Jack ; Florides, Christos 
Aug-2005Efficient design of high-level mechanisms for hard safety-critical low-power devicesKakarountas, A. P. ; Michail, Harris ; Goutis, C. A. ; Spiliotopoulos, V. ; Nikolaidis, S. ; Kokkinos, V. 
Dec-2004Efficient implementation of the Keyed-Hash Message Authentication Code (HMAC) using the SHA-1 hash functionMichail, Harris ; Kakarountas, Athanasios P. ; Milidonis, Athanasios S. 
Nov-2005Efficient small-sized implementation of the keyed-hash message authentication codMichail, Harris ; Yiakoumis, Ioannis I. ; Papadonikolakis, Markos E. 
1-Dec-2005Efficient small-sized implementation of the keyed-hash message authentication codeYiakoumis, Ioannis ; Michail, Harris ; Papadonikolakis, Markos ; Goutis, Costas E.; Kakarountas, Athanasios P.
Oct-2012Evolution of the e-Museum concept through exploitation of cryptographic algorithmsIoannides, Marinos ; Michail, Harris ; Athanasiou, George S. ; Gregoriades, Andreas 
30-Oct-2015Hardware implementation of the Totally Self-Checking SHA-256 hash coreMichail, Harris ; Kotsiolis, Apostolis ; Kakarountas, Athanasios P. ; Athanasiou, George S. ; Goutis, Costas E. 
6-Aug-2015High performance pipelined FPGA implementation of the SHA-3 hash algorithmIoannou, Lenos ; Michail, Harris ; Voyiatzis, Artemios G. 
Jun-2010High Throughput Hardware/Software Co-Design Approach for SHA-256 Hashing Cryptographic Module In IPSec/IPv6Michail, Harris ; Athanasiou, George S. ; Gregoriades, Andreas ; Panagiotou, C. L. 
Nov-2005High throughput implementation of the new Secure Hash Algorithm through partial unrollingMichail, Harris ; Goutis, Costas E.; Aisopos, Konstantinos; Kakarountas, Athanasios P.
Jan-2013High-performance FPGA implementations of the cryptographic hash function JHAthanasiou, George S. ; Michail, Harris ; Theodoridis, G. ; Goutis, Costas E. 
Aug-2006High-speed FPGA implementation of secure hash algorithm for IPSec and VPN applicationsKakarountas, Athanasios P.; Theodoridis, George; Milidonis, Athanasios ; Goutis, Costas E.; Michail, Harris 
Jul-2012High-throughput hardware architectures of the JH round-three SHA-3 candidate: An FPGA design and implementation approachAthanasiou, George S.; Theodoridis, George; Chalkou, Chara I. ; Goutis, Costas E.; Michail, Harris ; Bardis, D. 
1-Dec-2009High-throughput implementation of the RIPEMD-160Kakarountas, Athanasios P. ; Michail, Harris ; Goutis, Costas E. ; Rjoub, Abdoul M. 
1-Dec-2008Holistic methodology for designing ultra high-speed SHA-1 hashing cryptographic module in hardwareMichail, Harris ; Goutis, C.