Refined By:
Date Issued:  [2000 TO 2009]

Results 21-33 of 33 (Search time: 0.003 seconds).

Issue DateTitleAuthor(s)
21Dec-2005Novel high throughput implementation of SHA-256 hash function through pre-computation techniqueMichail, Harris ; Milidonis, Athanasios S. ; Kakarountas, Athanasios P. 
22Dec-2005VLSI design and implementation of reconfigurable cryptographic systems for symmetric encryptionMichail, Harris ; Selimis, George N. ; Koufopavlou, Odysseas G. 
23Nov-2005High throughput implementation of the new Secure Hash Algorithm through partial unrollingMichail, Harris ; Goutis, Costas E.; Aisopos, Konstantinos; Kakarountas, Athanasios P.
24Nov-2005Efficient small-sized implementation of the keyed-hash message authentication codMichail, Harris ; Yiakoumis, Ioannis I. ; Papadonikolakis, Markos E. 
25Nov-2005Novel hardware implementation for generating message authentication codesMichail, Harris ; Kakarountas, Athanasios P. ; Fotopoulou, Eleni ; Goutis, G. E. 
261-Oct-2005A performance efficient hardware implementation for the encrypted shared storage media standardMichail, Harris ; Fotopoulou, E. ; Goutis, C. E. ; Milidonis, A. ; Theodoridis, G.; Kakarountas, A. P. 
27Sep-2005Optimizing SHA-1 hash function for high throughput with a partial unrolling studyMichail, Harris ; Kakarountas, A. P. ; Selimis, George N. ; Goutis, Costas E.
28Aug-2005Efficient design of high-level mechanisms for hard safety-critical low-power devicesKakarountas, A. P. ; Michail, Harris ; Goutis, C. A. ; Spiliotopoulos, V. ; Nikolaidis, S. ; Kokkinos, V. 
29Jul-2005A Low-Power and High-Throughput implementation of the SHA-1 hash functionMichail, Harris ; Goutis, Costas E.; Koufopavlou, Odysseas ; Kakarountas, Athanasios P.
30Jul-2005Novel technique for high-throughput and power efficient cryptographic primitivesMichail, Harris ; Kakarountas, Athanasios P. ; Goutis, Costas E. 
31Jul-2005Case study and application of pre-computation technique for hashing cores aiming at high-throughput implementationsMichail, Harris ; Kakarountas, Athanasios P. ; Goutis, Costas E. 
32Jul-2005Speeded up and low-powered hardware implementation of the secure hash algorithm through partial unrollingMichail, Harris ; Kakarountas, Athanasios P. ; Theodoridis, Georgios A. 
33Dec-2004Efficient implementation of the Keyed-Hash Message Authentication Code (HMAC) using the SHA-1 hash functionMichail, Harris ; Kakarountas, Athanasios P. ; Milidonis, Athanasios S.