Results 1-20 of 67 (Search time: 0.003 seconds).

Issue DateTitleAuthor(s)
129-Dec-2008Application of novel technique in RIPEMD-160 aiming at high-throughputMichail, Harris ; Thnanasoulis, V. N. ; Schinianakis, D. M. ; Panagiotakopoulos, G. A. ; Goutis, C. E. 
21-Apr-2016Area-throughput trade-offs for SHA-1 and SHA-256 hash functions' pipelined designsMichail, Harris ; Athanasiou, George S. ; Kelefouras, Vasilios I. ; Theodoridis, George ; Stouraitis, Thanos ; Goutis, Costas E. 
3Jul-2005Case study and application of pre-computation technique for hashing cores aiming at high-throughput implementationsMichail, Harris ; Kakarountas, Athanasios P. ; Goutis, Costas E. 
4Apr-2011Cipher block based authentication module: A hardware design perspectiveKakarountas, Athanasios P.; Selimis, Georgios ; Michail, Harris ; Schinianakis, Dimitrios ; Goutis, Costas E.
52012Combining traffic simulation with bayesian networks for improved quantification of accident risk indexMichail, Harris ; Mouskos, Kyriacos C. ; Gregoriades, Andreas 
6Feb-2012A data locality methodology for matrix-matrix multiplication algorithmAthanasiou, George S.; Kritikakou, Angeliki S.; Goutis, Costas E.; Kelefouras, Vasileios I. ; Alachiotis, Nicolaos ; Michail, Harris 
7Apr-2007A decoupled architecture of processors with scratch-pad memory hierarchyMichail, Harris ; Milidonis, Athanasios S. ; Alachiotis, Nikolaos 
8Jun-2010Decoupled processors architecture for accelerating data intensive applications using scratch-pad memory hierarchyMichail, Harris ; Milidonis, Athanasios S. ; Alachiotis, Nikolaos 
9Mar-2012Design and implementation of a SHA-3 candidate Skein-512 hash/MAC hardware architectureMichail, Harris ; Athanasiou, George S. ; Tsingkas, Elias N. ; Chalkou, Chara I. ; Theodoridis, G. ; Goutis, Costas E. 
10Sep-2016Design and implementation of totally-self checking SHA-1 and SHA-256 hash functions’ architecturesMichail, Harris ; Athanasiou, George S. ; Theodoridis, George ; Gregoriades, Andreas ; Goutis, Costas E. 
11Jul-2018Design and validation of an agent-based driving simulatorGregoriades, Andreas ; Pampaka, Maria ; Michail, Harris ; Viugova, Maria 
12Dec-2010Designs and comparisons of authentication modules for IPSec in configurable and extensible embedded processorMichail, Harris ; Athanasiou, George S. ; Makridakis, George 
13Nov-2014Distribution of cultural content through exploitation of cryptographic algorithms and hardware identificationMichail, Harris ; Louca, Constantinos ; Gavrilis, Dimitris ; Gregoriades, Andreas ; Anastasiou, Lazaros ; Ioannides, Marinos 
142015A driving simulator for discovering requirements in complex systemsMichail, Harris ; Gregoriades, Andreas ; Pampaka, Maria ; Hadjicosti, Jack ; Florides, Christos 
15Aug-2005Efficient design of high-level mechanisms for hard safety-critical low-power devicesKakarountas, A. P. ; Michail, Harris ; Goutis, C. A. ; Spiliotopoulos, V. ; Nikolaidis, S. ; Kokkinos, V. 
16Dec-2004Efficient implementation of the Keyed-Hash Message Authentication Code (HMAC) using the SHA-1 hash functionMichail, Harris ; Kakarountas, Athanasios P. ; Milidonis, Athanasios S. 
17Nov-2005Efficient small-sized implementation of the keyed-hash message authentication codMichail, Harris ; Yiakoumis, Ioannis I. ; Papadonikolakis, Markos E. 
181-Dec-2005Efficient small-sized implementation of the keyed-hash message authentication codeYiakoumis, Ioannis ; Michail, Harris ; Papadonikolakis, Markos ; Goutis, Costas E.; Kakarountas, Athanasios P.
19Oct-2012Evolution of the e-Museum concept through exploitation of cryptographic algorithmsIoannides, Marinos ; Michail, Harris ; Athanasiou, George S. ; Gregoriades, Andreas 
2030-Oct-2015Hardware implementation of the Totally Self-Checking SHA-256 hash coreMichail, Harris ; Kotsiolis, Apostolis ; Kakarountas, Athanasios P. ; Athanasiou, George S. ; Goutis, Costas E.