Please use this identifier to cite or link to this item: https://hdl.handle.net/20.500.14279/14788
DC FieldValueLanguage
dc.contributor.authorMichail, Harris-
dc.contributor.authorAthanasiou, George S.-
dc.contributor.authorKritikakou, Angeliki S.-
dc.contributor.authorGoutis, Costas E.-
dc.contributor.authorGregoriades, Andreas-
dc.contributor.authorPapadopoulou, Vicky-
dc.date.accessioned2019-08-02T08:13:38Z-
dc.date.available2019-08-02T08:13:38Z-
dc.date.issued2010-12-01-
dc.identifier.citationSECRYPT 2010 - Proceedings of the International Conference on Security and Cryptography 2010, Pages 309-313 International Conference on Security and Cryptography, SECRYPT 2010; Athens; Greece; 26 July 2010 through 28 July 2010; Code 83484en_US
dc.identifier.isbn9789898425188-
dc.identifier.urihttps://hdl.handle.net/20.500.14279/14788-
dc.description.abstractNowadays, more than ever, security is considered to be critical issue for all electronic transactions. This is the reason why security services like those described in IPSec are mandatory to IPV6 which will be adopted as the new IP standard the next years. Moreover the need for security services in every data packet that is transmitted via IPv6, illustrates the need for designing security products able to achieve higher throughput rates for the incorporated security schemes. In this paper such a design is presented which manages to increase throughput of SHA-256 hash function enabling efficient software/hardware co-design.en_US
dc.formatpdfen_US
dc.language.isoenen_US
dc.subjectHardware designen_US
dc.subjectHash-Functionsen_US
dc.subjectHigh-Throughputen_US
dc.subjectIPSecen_US
dc.subjectSHA-256en_US
dc.subjectVLSIen_US
dc.titleUltra high speed SHA-256 hashing cryptographic module for IPSEC hardware/software codesignen_US
dc.typeConference Papersen_US
dc.collaborationUniversity of Patrasen_US
dc.collaborationEuropean University Cyprusen_US
dc.subject.categoryComputer and Information Sciencesen_US
dc.countryCyprusen_US
dc.countryGreeceen_US
dc.subject.fieldEngineering and Technologyen_US
dc.publicationPeer Revieweden_US
dc.relation.conferenceInternational Conference on Security and Cryptographyen_US
dc.identifier.scopus2-s2.0-78651456914-
dc.identifier.urlhttps://api.elsevier.com/content/abstract/scopus_id/78651456914-
cut.common.academicyear2019-2020en_US
item.grantfulltextnone-
item.openairecristypehttp://purl.org/coar/resource_type/c_c94f-
item.fulltextNo Fulltext-
item.languageiso639-1en-
item.cerifentitytypePublications-
item.openairetypeconferenceObject-
crisitem.author.deptDepartment of Electrical Engineering, Computer Engineering and Informatics-
crisitem.author.deptDepartment of Management, Entrepreneurship and Digital Business-
crisitem.author.facultyFaculty of Engineering and Technology-
crisitem.author.facultyFaculty of Tourism Management, Hospitality and Entrepreneurship-
crisitem.author.orcid0000-0002-8299-8737-
crisitem.author.orcid0000-0002-7422-1514-
crisitem.author.parentorgFaculty of Engineering and Technology-
crisitem.author.parentorgFaculty of Tourism Management, Hospitality and Entrepreneurship-
Appears in Collections:Δημοσιεύσεις σε συνέδρια /Conference papers or poster or presentation
CORE Recommender
Show simple item record

SCOPUSTM   
Citations

6
checked on Nov 6, 2023

Page view(s)

294
Last Week
0
Last month
2
checked on Dec 23, 2024

Google ScholarTM

Check

Altmetric


Items in KTISIS are protected by copyright, with all rights reserved, unless otherwise indicated.