| Issue Date | Title | Author(s) |
| Jul-2005 | Case study and application of pre-computation technique for hashing cores aiming at high-throughput implementations | Michail, Harris ; Kakarountas, Athanasios P. ; Goutis, Costas E. |
| Dec-2004 | Efficient implementation of the Keyed-Hash Message Authentication Code (HMAC) using the SHA-1 hash function | Michail, Harris ; Kakarountas, Athanasios P. ; Milidonis, Athanasios S. |
| 30-Oct-2015 | Hardware implementation of the Totally Self-Checking SHA-256 hash core | Michail, Harris ; Kotsiolis, Apostolis ; Kakarountas, Athanasios P. ; Athanasiou, George S. ; Goutis, Costas E. |
| 1-Dec-2009 | High-throughput implementation of the RIPEMD-160 | Kakarountas, Athanasios P. ; Michail, Harris ; Goutis, Costas E. ; Rjoub, Abdoul M. |
| Nov-2005 | Novel hardware implementation for generating message authentication codes | Michail, Harris ; Kakarountas, Athanasios P. ; Fotopoulou, Eleni ; Goutis, G. E. |
| Dec-2005 | Novel high throughput implementation of SHA-256 hash function through pre-computation technique | Michail, Harris ; Milidonis, Athanasios S. ; Kakarountas, Athanasios P. |
| Jul-2005 | Novel technique for high-throughput and power efficient cryptographic primitives | Michail, Harris ; Kakarountas, Athanasios P. ; Goutis, Costas E. |
| Jul-2005 | Speeded up and low-powered hardware implementation of the secure hash algorithm through partial unrolling | Michail, Harris ; Kakarountas, Athanasios P. ; Theodoridis, Georgios A. |
| Dec-2006 | Temporal and system level modifications for high speed VLSI implementations of cryptographic core | Michail, Harris ; Kakarountas, Athanasios P. ; Milidonis, Athanasios S. |
| Oct-2009 | A top-down design methodology for ultrahigh-performance hashing cores | Michail, Harris ; Kakarountas, Athanasios P. ; Milidonis, Athanasios S. ; Goutis, Costas E. |