Please use this identifier to cite or link to this item:
https://hdl.handle.net/20.500.14279/13944
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Michail, Harris | - |
dc.contributor.author | Kakarountas, Athanasios P. | - |
dc.date.accessioned | 2019-05-31T09:30:30Z | - |
dc.date.available | 2019-05-31T09:30:30Z | - |
dc.date.issued | 2011-01 | - |
dc.identifier.citation | Computer Security: Intrusion, Detection and Prevention, January 2011, pp. 91-106 | en_US |
dc.identifier.isbn | 978-160692781-6 | - |
dc.description.abstract | Cryptography can be considered as a special application of coding schemes. High speed execution of Encoding and Decoding processes is crucial in the majority of the so-called security schemes. In fact, the characteristics of a cryptographic algorithm in terms of throughput are usually the most important requirement to adopt the algorithm in a security scheme. As the need for higher security increases, the market urges for strong cryptographic protocols that will offer the desired degree of privacy. However, most of the algorithms now and forthcoming are complex and do not seem to be efficient for performance-oriented purposes. In this chapter, an algorithmic approach for designing high-speed cryptographic primitives is presented. Setting as target the high throughput, a complete methodology for developing various types of cryptographic primitives, focusing on hardware (without however excluding software, or a combination of them) is offered. The application of the proposed design approach also highlights the effect of designing for supercomputing on a critical application, such as cryptography. Parallelism and code transformation are few of the techniques that will be used for achieving the desired target, the implementation of the ever best proposed cryptographic primitives in terms of speed and throughput. © 2009 Nova Science Publishers, Inc. All rights reserved. | en_US |
dc.language.iso | en | en_US |
dc.rights | © 2009 Nova Science Publishers | en_US |
dc.subject | Hash functions | en_US |
dc.subject | Cryptographic hash | en_US |
dc.title | Performance for cryptography: Ahardware approach | en_US |
dc.type | Book Chapter | en_US |
dc.collaboration | University of Central Greece | en_US |
dc.collaboration | University of Patras | en_US |
dc.subject.category | Electrical Engineering - Electronic Engineering - Information Engineering | en_US |
dc.country | Greece | en_US |
dc.subject.field | Engineering and Technology | en_US |
dc.publication | Peer Reviewed | en_US |
dc.identifier.scopus | 2-s2.0-84892035222 | en |
dc.identifier.url | https://api.elsevier.com/content/abstract/scopus_id/84892035222 | en |
dc.contributor.orcid | #NODATA# | en |
dc.contributor.orcid | #NODATA# | en |
cut.common.academicyear | 2010-2011 | en_US |
item.languageiso639-1 | en | - |
item.cerifentitytype | Publications | - |
item.fulltext | No Fulltext | - |
item.grantfulltext | none | - |
item.openairetype | bookPart | - |
item.openairecristype | http://purl.org/coar/resource_type/c_3248 | - |
crisitem.author.dept | Department of Electrical Engineering, Computer Engineering and Informatics | - |
crisitem.author.faculty | Faculty of Engineering and Technology | - |
crisitem.author.orcid | 0000-0002-8299-8737 | - |
crisitem.author.parentorg | Faculty of Engineering and Technology | - |
Appears in Collections: | Κεφάλαια βιβλίων/Book chapters |
CORE Recommender
Page view(s) 50
266
Last Week
0
0
Last month
1
1
checked on Oct 5, 2024
Google ScholarTM
Check
Altmetric
Items in KTISIS are protected by copyright, with all rights reserved, unless otherwise indicated.