Please use this identifier to cite or link to this item: https://hdl.handle.net/20.500.14279/13932
DC FieldValueLanguage
dc.contributor.authorMichail, Harris-
dc.contributor.authorGoutis, Costas E.-
dc.contributor.authorKoufopavlou, Odysseas-
dc.contributor.authorKakarountas, Athanasios P.-
dc.date.accessioned2019-05-31T09:23:35Z-
dc.date.available2019-05-31T09:23:35Z-
dc.date.issued2005-07-
dc.identifier.citation(2005) Proceedings - IEEE International Symposium on Circuits and Systems, art. no. 1465529, pp. 4086-4089en_US
dc.identifier.issn0271-4310-
dc.description.abstractThe main applications of the hash functions are met in the fields of communication integrity and signature authentication. A hash function is utilized in the security layer of every communication protocol. However, as protocols evolve and new high-performance applications appear, the throughput of most hash functions seems to reach to a limit. Furthermore, due to the tendency of the market to minimize devices' size and increase their autonomy to make them portable, power issues have also to be considered. The existing SHA-1 Hash Function implementations (SHA-1 is common in many protocols e.g. IPSec) limit throughput to a maximum of 2 Gbps. In this paper, a new implementation comes to exceed this limit improving the throughput by 53%. Furthermore, power dissipation is kept low compared to previous works. © 2005 IEEE.en_US
dc.description.sponsorshipThe Institute of Electrical and Electronics Engineers, Inc., IEEE,Circuits and Systems Society, IEEE CASS,Science Council of Japan,The Inst. of Electronics, Inf. and Communication Engineers, IEICEen_US
dc.formatpdfen_US
dc.language.isoenen_US
dc.rights© 2005 IEEEen_US
dc.subjectCommunication integrityen_US
dc.subjectHash Functionsen_US
dc.subjectCommunication protocolsen_US
dc.titleA Low-Power and High-Throughput implementation of the SHA-1 hash functionen_US
dc.typeConference Papersen_US
dc.collaborationUniversity of Patrasen_US
dc.subject.categoryElectrical Engineering - Electronic Engineering - Information Engineeringen_US
dc.countryGreeceen_US
dc.subject.fieldEngineering and Technologyen_US
dc.publicationPeer Revieweden_US
dc.relation.conferenceIEEE International Symposium on Circuits and Systemsen_US
dc.identifier.doi10.1109/ISCAS.2005.1465529en_US
dc.identifier.scopus2-s2.0-34548828765en
dc.identifier.urlhttps://api.elsevier.com/content/abstract/scopus_id/34548828765en
dc.contributor.orcid#NODATA#en
dc.contributor.orcid#NODATA#en
dc.contributor.orcid#NODATA#en
dc.contributor.orcid#NODATA#en
cut.common.academicyear2004-2005en_US
item.grantfulltextnone-
item.openairecristypehttp://purl.org/coar/resource_type/c_c94f-
item.fulltextNo Fulltext-
item.languageiso639-1en-
item.cerifentitytypePublications-
item.openairetypeconferenceObject-
crisitem.author.deptDepartment of Electrical Engineering, Computer Engineering and Informatics-
crisitem.author.facultyFaculty of Engineering and Technology-
crisitem.author.orcid0000-0002-8299-8737-
crisitem.author.parentorgFaculty of Engineering and Technology-
Appears in Collections:Δημοσιεύσεις σε συνέδρια /Conference papers or poster or presentation
CORE Recommender
Show simple item record

Google ScholarTM

Check

Altmetric


Items in KTISIS are protected by copyright, with all rights reserved, unless otherwise indicated.