Please use this identifier to cite or link to this item:
https://hdl.handle.net/20.500.14279/13951
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Michail, Harris | - |
dc.contributor.author | Goutis, C. | - |
dc.date.accessioned | 2019-05-31T09:34:00Z | - |
dc.date.available | 2019-05-31T09:34:00Z | - |
dc.date.issued | 2008-12-01 | - |
dc.identifier.citation | (2008) IEEE International Conference on Electron Devices and Solid-State Circuits, EDSSC, art. no. 4760668 | en_US |
dc.identifier.isbn | 978-142442540-2 | - |
dc.description.abstract | Nowadays security is a critical issue as long as electronic transactions are concerned. Moreover taking into consideration the rapid growth of e-commerce and the future needs, it is essential to achieve higher throughput rates for the incorporated security schemes. The most common components in such security schemes are a cipher block and a hash function, with the second one being hard to compete with the throughput achieved by cipher blocks. In this paper a top-down methodology is presented which manages to increase throughput of SHA-1 hash function hardware design about 160% comparing to conventional implementations with a minor area penalty. © 2008 IEEE. | en_US |
dc.format | en_US | |
dc.language.iso | en | en_US |
dc.rights | © 2008 IEEE | en_US |
dc.subject | Hash functions | en_US |
dc.subject | Field programmable gate arrays (FPGA) | en_US |
dc.subject | Cryptographic hash | en_US |
dc.title | Holistic methodology for designing ultra high-speed SHA-1 hashing cryptographic module in hardware | en_US |
dc.type | Conference Papers | en_US |
dc.collaboration | University of Patras | en_US |
dc.subject.category | Electrical Engineering - Electronic Engineering - Information Engineering | en_US |
dc.country | Greece | en_US |
dc.subject.field | Engineering and Technology | en_US |
dc.publication | Peer Reviewed | en_US |
dc.relation.conference | IEEE International Conference on Electron Devices and Solid-State Circuits, EDSSC | en_US |
dc.identifier.doi | 10.1109/EDSSC.2008.4760668 | en_US |
dc.identifier.scopus | 2-s2.0-63249117705 | en |
dc.identifier.url | https://api.elsevier.com/content/abstract/scopus_id/63249117705 | en |
dc.contributor.orcid | #NODATA# | en |
dc.contributor.orcid | #NODATA# | en |
cut.common.academicyear | 2008-2009 | en_US |
item.fulltext | No Fulltext | - |
item.openairecristype | http://purl.org/coar/resource_type/c_c94f | - |
item.openairetype | conferenceObject | - |
item.grantfulltext | none | - |
item.languageiso639-1 | en | - |
item.cerifentitytype | Publications | - |
crisitem.author.dept | Department of Electrical Engineering, Computer Engineering and Informatics | - |
crisitem.author.faculty | Faculty of Engineering and Technology | - |
crisitem.author.orcid | 0000-0002-8299-8737 | - |
crisitem.author.parentorg | Faculty of Engineering and Technology | - |
Appears in Collections: | Δημοσιεύσεις σε συνέδρια /Conference papers or poster or presentation |
CORE Recommender
SCOPUSTM
Citations
50
9
checked on Mar 14, 2024
Page view(s) 50
275
Last Week
1
1
Last month
3
3
checked on Feb 3, 2025
Google ScholarTM
Check
Altmetric
Items in KTISIS are protected by copyright, with all rights reserved, unless otherwise indicated.