Please use this identifier to cite or link to this item: https://hdl.handle.net/20.500.14279/13968
DC FieldValueLanguage
dc.contributor.authorMichail, Harris-
dc.contributor.authorGoutis, Costas E.-
dc.contributor.authorPanagiotakopoulos, George A.-
dc.contributor.authorThanasoulis, Vasilis N.-
dc.contributor.authorKakarountas, Athanasios P.-
dc.date.accessioned2019-05-31T10:01:26Z-
dc.date.available2019-05-31T10:01:26Z-
dc.date.issued2007-04-
dc.identifier.citationInternational Journal of Security and Networks, 2007, vol. 2, no. 3-4, pp. 228-238en_US
dc.identifier.issn17478405-
dc.description.abstractHash functions are forming a special family of cryptographic algorithms, which are applied wherever message integrity and authentication issues are critical. Implementations of these functions are cryptographic primitives to the most widely used cryptographic schemes and security protocols such as Secure Electronic Transactions (SET), Public Key Infrastructure (PKI), IPSec and Virtual Private Networks (VPN’s). As time passes it seems that all these applications call for higher throughput due to their rapid acceptance by the market especially to the corresponding servers of these applications. In this work a new technique is presented for increasing frequency and throughput of the currently most used hash function, which is SHA-1. This technique involves the application of spatial and temporal precomputation. Comparing to conventional pipelined implementations of hash functions the proposed technique leads to an implementation with more than 75% higher throughput. © 2007 Inderscience Enterprises Ltd.en_US
dc.language.isoenen_US
dc.relation.ispartofInternational Journal of Security and Networksen_US
dc.rights© Inderscienceen_US
dc.subjectHardware implementationen_US
dc.subjectHash functionsen_US
dc.subjectHigh-throughputen_US
dc.subjectSecurityen_US
dc.titleServer side hashing core exceeding 3 Gbps of throughputen_US
dc.typeArticleen_US
dc.collaborationUniversity of Patrasen_US
dc.subject.categoryElectrical Engineering - Electronic Engineering - Information Engineeringen_US
dc.journalsSubscriptionen_US
dc.countryGreeceen_US
dc.subject.fieldEngineering and Technologyen_US
dc.publicationPeer Revieweden_US
dc.identifier.scopus2-s2.0-79951645452en
dc.identifier.urlhttps://api.elsevier.com/content/abstract/scopus_id/79951645452en
dc.contributor.orcid#NODATA#en
dc.contributor.orcid#NODATA#en
dc.contributor.orcid#NODATA#en
dc.contributor.orcid#NODATA#en
dc.contributor.orcid#NODATA#en
dc.relation.issue3-4en_US
dc.relation.volume2en_US
cut.common.academicyear2006-2007en_US
dc.identifier.spage228en_US
dc.identifier.epage238en_US
item.languageiso639-1en-
item.cerifentitytypePublications-
item.openairetypearticle-
item.openairecristypehttp://purl.org/coar/resource_type/c_6501-
item.fulltextNo Fulltext-
item.grantfulltextnone-
crisitem.journal.journalissn1747-8413-
crisitem.journal.publisherInderscience Enterprises-
crisitem.author.deptDepartment of Electrical Engineering, Computer Engineering and Informatics-
crisitem.author.facultyFaculty of Engineering and Technology-
crisitem.author.orcid0000-0002-8299-8737-
crisitem.author.parentorgFaculty of Engineering and Technology-
Appears in Collections:Άρθρα/Articles
CORE Recommender
Show simple item record

SCOPUSTM   
Citations 50

8
checked on Nov 6, 2023

Page view(s)

295
Last Week
1
Last month
1
checked on Jan 3, 2025

Google ScholarTM

Check


Items in KTISIS are protected by copyright, with all rights reserved, unless otherwise indicated.