Refined By:
Fulltext:  No Fulltext

Results 61-65 of 65 (Search time: 0.001 seconds).

Issue DateTitleAuthor(s)
61Jul-2005A Low-Power and High-Throughput implementation of the SHA-1 hash functionMichail, Harris ; Goutis, Costas E.; Koufopavlou, Odysseas ; Kakarountas, Athanasios P.
62Jul-2005Novel technique for high-throughput and power efficient cryptographic primitivesMichail, Harris ; Kakarountas, Athanasios P. ; Goutis, Costas E. 
63Jul-2005Case study and application of pre-computation technique for hashing cores aiming at high-throughput implementationsMichail, Harris ; Kakarountas, Athanasios P. ; Goutis, Costas E. 
64Jul-2005Speeded up and low-powered hardware implementation of the secure hash algorithm through partial unrollingMichail, Harris ; Kakarountas, Athanasios P. ; Theodoridis, Georgios A. 
65Dec-2004Efficient implementation of the Keyed-Hash Message Authentication Code (HMAC) using the SHA-1 hash functionMichail, Harris ; Kakarountas, Athanasios P. ; Milidonis, Athanasios S.