Please use this identifier to cite or link to this item:
https://hdl.handle.net/20.500.14279/13896
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Selimis, G. | - |
dc.contributor.author | Michail, Harris | - |
dc.contributor.author | Kakarountas, A. P. | - |
dc.contributor.author | Goutis, C. E. | - |
dc.date.accessioned | 2019-05-31T08:47:37Z | - |
dc.date.available | 2019-05-31T08:47:37Z | - |
dc.date.issued | 2007-08 | - |
dc.identifier.citation | 2007 15th International Conference on Digital Signal Processing, DSP 2007, art. no. 4288627, pp. 495-498 | en_US |
dc.identifier.isbn | 978-142440882-5 | - |
dc.description.abstract | A new algorithm for producing message authenticating code (MAC) was recently proposed by NIST. The MAC protects both a message's integrity - by ensuring that a different MAC will be produced if the message has changed - as well as its authenticity - because only someone who knows the secret key could be able to generate a valid MAC. The proposed process incorporates a FIPS approved anti secure block cipher algorithm which was standardized by NIST in May, 2005. The first implementation of the CMAC is presented in this paper. Throughput has been the main design target. The proposed implementation goes one step further introducing an optimized ciphering core to achieve competitive throughput for CMAC, compared to alternative MACs. © 2007 IEEE. | en_US |
dc.language.iso | en | en_US |
dc.rights | © 2007 IEEE | en_US |
dc.subject | Hardware implementation | en_US |
dc.subject | Message authentication code | en_US |
dc.title | Throughput optimization of the cipher message authentication code | en_US |
dc.type | Conference Papers | en_US |
dc.collaboration | University of Patras | en_US |
dc.subject.category | Electrical Engineering - Electronic Engineering - Information Engineering | en_US |
dc.country | Greece | en_US |
dc.subject.field | Engineering and Technology | en_US |
dc.publication | Peer Reviewed | en_US |
dc.relation.conference | International Conference on Digital Signal Processing | en_US |
dc.identifier.doi | 10.1109/ICDSP.2007.4288627 | en_US |
dc.identifier.scopus | 2-s2.0-47649105192 | en |
dc.identifier.url | https://api.elsevier.com/content/abstract/scopus_id/47649105192 | en |
dc.contributor.orcid | #NODATA# | en |
dc.contributor.orcid | #NODATA# | en |
dc.contributor.orcid | #NODATA# | en |
dc.contributor.orcid | #NODATA# | en |
cut.common.academicyear | 2006-2007 | en_US |
item.grantfulltext | none | - |
item.languageiso639-1 | en | - |
item.cerifentitytype | Publications | - |
item.openairecristype | http://purl.org/coar/resource_type/c_c94f | - |
item.openairetype | conferenceObject | - |
item.fulltext | No Fulltext | - |
crisitem.author.dept | Department of Electrical Engineering, Computer Engineering and Informatics | - |
crisitem.author.faculty | Faculty of Engineering and Technology | - |
crisitem.author.orcid | 0000-0002-8299-8737 | - |
crisitem.author.parentorg | Faculty of Engineering and Technology | - |
Appears in Collections: | Δημοσιεύσεις σε συνέδρια /Conference papers or poster or presentation |
CORE Recommender
SCOPUSTM
Citations
50
5
checked on Mar 14, 2024
Page view(s)
288
Last Week
3
3
Last month
3
3
checked on Nov 7, 2024
Google ScholarTM
Check
Altmetric
Items in KTISIS are protected by copyright, with all rights reserved, unless otherwise indicated.