Please use this identifier to cite or link to this item:
https://hdl.handle.net/20.500.14279/13948
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Yiakoumis, Ioannis | - |
dc.contributor.author | Michail, Harris | - |
dc.contributor.author | Papadonikolakis, Markos | - |
dc.contributor.author | Goutis, Costas E. | - |
dc.contributor.author | Kakarountas, Athanasios P. | - |
dc.date.accessioned | 2019-05-31T09:32:27Z | - |
dc.date.available | 2019-05-31T09:32:27Z | - |
dc.date.issued | 2005-12-01 | - |
dc.identifier.citation | EUROCON 2005 - The International Conference on Computer as a Tool | en_US |
dc.identifier.isbn | 142440049X | - |
dc.identifier.uri | https://hdl.handle.net/20.500.14279/13948 | - |
dc.description.abstract | A design approach to create small-sized high-speed implementations of the Keyed-Hash Message Authentication Code (HMAC) is presented. The proposed implementation can either operate in HMAC-MD5 and/or in HMAC-SHA1 mode, The proposed implementations do not introduce significant area penalty. However the achieved throughput presents an increase compared to commercially available IP cores that range from 30%-390%. The main contribution of the paper is the increase of the HMAC throughput to the required level to be used in modern telecommunication applications, such as VPN and the oncoming 802.11n. © 2005 IEEE. | en_US |
dc.language.iso | en | en_US |
dc.subject | Hash function | High-speed HMAC | Message authentication | Security | VLSI implementation | en_US |
dc.title | Efficient small-sized implementation of the keyed-hash message authentication code | en_US |
dc.type | Conference Papers | en_US |
dc.subject.category | Electrical Engineering - Electronic Engineering - Information Engineering | en_US |
dc.subject.field | Engineering and Technology | en_US |
dc.relation.conference | EUROCON 2005 | en_US |
dc.identifier.scopus | 2-s2.0-33947304813 | en |
dc.identifier.url | https://api.elsevier.com/content/abstract/scopus_id/33947304813 | en |
dc.contributor.orcid | #NODATA# | en |
dc.contributor.orcid | #NODATA# | en |
dc.contributor.orcid | #NODATA# | en |
dc.contributor.orcid | #NODATA# | en |
dc.contributor.orcid | #NODATA# | en |
dc.relation.volume | II | en |
cut.common.academicyear | 2019-2020 | en_US |
item.openairetype | conferenceObject | - |
item.cerifentitytype | Publications | - |
item.fulltext | No Fulltext | - |
item.grantfulltext | none | - |
item.openairecristype | http://purl.org/coar/resource_type/c_c94f | - |
item.languageiso639-1 | en | - |
crisitem.author.dept | Department of Electrical Engineering, Computer Engineering and Informatics | - |
crisitem.author.faculty | Faculty of Engineering and Technology | - |
crisitem.author.orcid | 0000-0002-8299-8737 | - |
crisitem.author.parentorg | Faculty of Engineering and Technology | - |
Appears in Collections: | Δημοσιεύσεις σε συνέδρια /Conference papers or poster or presentation |
CORE Recommender
SCOPUSTM
Citations
20
8
checked on Nov 6, 2023
Page view(s) 20
272
Last Week
0
0
Last month
1
1
checked on Jan 31, 2025
Google ScholarTM
Check
Altmetric
Items in KTISIS are protected by copyright, with all rights reserved, unless otherwise indicated.