Browsing by Author Michail, Harris


Or, select a letter below to browse by last name
0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Showing results 1 to 20 of 68  next >
Issue DateTitleAuthor(s)
29-Dec-2008Application of novel technique in RIPEMD-160 aiming at high-throughputMichail, Harris ; Thnanasoulis, V. N. ; Schinianakis, D. M. ; Panagiotakopoulos, G. A. ; Goutis, C. E. 
1-Apr-2016Area-throughput trade-offs for SHA-1 and SHA-256 hash functions' pipelined designsMichail, Harris ; Athanasiou, George S. ; Kelefouras, Vasilios I. ; Theodoridis, George ; Stouraitis, Thanos ; Goutis, Costas E. 
Jul-2005Case study and application of pre-computation technique for hashing cores aiming at high-throughput implementationsMichail, Harris ; Kakarountas, Athanasios P. ; Goutis, Costas E. 
Apr-2011Cipher block based authentication module: A hardware design perspectiveKakarountas, Athanasios P.; Selimis, Georgios ; Michail, Harris ; Schinianakis, Dimitrios ; Goutis, Costas E.
2012Combining traffic simulation with bayesian networks for improved quantification of accident risk indexMichail, Harris ; Mouskos, Kyriacos C. ; Gregoriades, Andreas 
Feb-2012A data locality methodology for matrix-matrix multiplication algorithmAthanasiou, George S.; Kritikakou, Angeliki S.; Goutis, Costas E.; Kelefouras, Vasileios I. ; Alachiotis, Nicolaos ; Michail, Harris 
Apr-2007A decoupled architecture of processors with scratch-pad memory hierarchyMichail, Harris ; Milidonis, Athanasios S. ; Alachiotis, Nikolaos 
Jun-2010Decoupled processors architecture for accelerating data intensive applications using scratch-pad memory hierarchyMichail, Harris ; Milidonis, Athanasios S. ; Alachiotis, Nikolaos 
Mar-2012Design and implementation of a SHA-3 candidate Skein-512 hash/MAC hardware architectureMichail, Harris ; Athanasiou, George S. ; Tsingkas, Elias N. ; Chalkou, Chara I. ; Theodoridis, G. ; Goutis, Costas E. 
Sep-2016Design and implementation of totally-self checking SHA-1 and SHA-256 hash functions’ architecturesMichail, Harris ; Athanasiou, George S. ; Theodoridis, George ; Gregoriades, Andreas ; Goutis, Costas E. 
Jul-2018Design and validation of an agent-based driving simulatorGregoriades, Andreas ; Pampaka, Maria ; Michail, Harris ; Viugova, Maria 
Dec-2010Designs and comparisons of authentication modules for IPSec in configurable and extensible embedded processorMichail, Harris ; Athanasiou, George S. ; Makridakis, George 
Nov-2014Distribution of cultural content through exploitation of cryptographic algorithms and hardware identificationMichail, Harris ; Louca, Constantinos ; Gavrilis, Dimitris ; Gregoriades, Andreas ; Anastasiou, Lazaros ; Ioannides, Marinos 
1-Jan-2015A driving simulator for discovering requirements in complex systemsMichail, Harris ; Gregoriades, Andreas; Pampaka, Maria; Hadjicosti, Jack ; Florides, Christos 
Aug-2005Efficient design of high-level mechanisms for hard safety-critical low-power devicesKakarountas, A. P. ; Michail, Harris ; Goutis, C. A. ; Spiliotopoulos, V. ; Nikolaidis, S. ; Kokkinos, V. 
Dec-2004Efficient implementation of the Keyed-Hash Message Authentication Code (HMAC) using the SHA-1 hash functionMichail, Harris ; Kakarountas, Athanasios P. ; Milidonis, Athanasios S. 
Nov-2005Efficient small-sized implementation of the keyed-hash message authentication codMichail, Harris ; Yiakoumis, Ioannis I. ; Papadonikolakis, Markos E. 
1-Dec-2005Efficient small-sized implementation of the keyed-hash message authentication codeYiakoumis, Ioannis ; Michail, Harris ; Papadonikolakis, Markos ; Goutis, Costas E.; Kakarountas, Athanasios P.
Oct-2012Evolution of the e-Museum concept through exploitation of cryptographic algorithmsIoannides, Marinos ; Michail, Harris ; Athanasiou, George S. ; Gregoriades, Andreas 
30-Oct-2015Hardware implementation of the Totally Self-Checking SHA-256 hash coreMichail, Harris ; Kotsiolis, Apostolis ; Kakarountas, Athanasios P. ; Athanasiou, George S. ; Goutis, Costas E.