Refined By:
Type:  Article
Fulltext:  No Fulltext

Results 21-26 of 26 (Search time: 0.001 seconds).

Issue DateTitleAuthor(s)
21Mar-2006Maximizing the hash function of authentication codesMichail, Harris ; Yiakoumis, Ioannis I. ; Papadonikolakis, Markos E. 
22Nov-2005Novel hardware implementation for generating message authentication codesMichail, Harris ; Kakarountas, Athanasios P. ; Fotopoulou, Eleni ; Goutis, G. E. 
231-Oct-2005A performance efficient hardware implementation for the encrypted shared storage media standardMichail, Harris ; Fotopoulou, E. ; Goutis, C. E. ; Milidonis, A. ; Theodoridis, G.; Kakarountas, A. P. 
24Jul-2005Novel technique for high-throughput and power efficient cryptographic primitivesMichail, Harris ; Kakarountas, Athanasios P. ; Goutis, Costas E. 
25Jul-2005Case study and application of pre-computation technique for hashing cores aiming at high-throughput implementationsMichail, Harris ; Kakarountas, Athanasios P. ; Goutis, Costas E. 
26Jul-2005Speeded up and low-powered hardware implementation of the secure hash algorithm through partial unrollingMichail, Harris ; Kakarountas, Athanasios P. ; Theodoridis, Georgios A.