Please use this identifier to cite or link to this item:
https://hdl.handle.net/20.500.14279/1505
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Michail, Harris | - |
dc.contributor.author | Kakarountas, Athanasios P. | - |
dc.contributor.author | Fotopoulou, Eleni | - |
dc.contributor.author | Goutis, G. E. | - |
dc.date.accessioned | 2013-02-22T14:11:53Z | en |
dc.date.accessioned | 2013-05-17T05:22:31Z | - |
dc.date.accessioned | 2015-12-02T10:07:01Z | - |
dc.date.available | 2013-02-22T14:11:53Z | en |
dc.date.available | 2013-05-17T05:22:31Z | - |
dc.date.available | 2015-12-02T10:07:01Z | - |
dc.date.issued | 2005-11 | - |
dc.identifier.citation | WSEAS Transactions on Communications, 2005, vol. 4, no. 11, pp. 1276-1283 | en_US |
dc.identifier.issn | 22242864 | - |
dc.identifier.uri | https://hdl.handle.net/20.500.14279/1505 | - |
dc.description.abstract | HMAC mechanism rely his security in the underlying hash function. This mechanism is used for authentication codes between two parties that share a secret key in order to authenticate information transmitted between these parties. Currently used HMAC implementations utilize MD-5 or SHA-1 hash functions that both have now been proved to be vulnerable. This affects the security level provided by the HMAC mechanism and thus in the near future a more secure hash function will be used. One of them is the SHA-256 hash function which is used the HMAC implementation presented in this paper. The proposed hardware implementation, invokes a partially unrolled implementation for the underlying hash function leading to a high-throughput and low-power implementation for the whole HMAC construction. | en_US |
dc.format | en_US | |
dc.language.iso | en | en_US |
dc.relation.ispartof | WSEAS Transactions on Communications | en_US |
dc.rights | © WSEAS | en_US |
dc.rights.uri | http://creativecommons.org/licenses/by-nc-nd/3.0/us/ | * |
dc.subject | Computer networks | en_US |
dc.subject | Public key cryptography | en_US |
dc.subject | Security | en_US |
dc.title | Novel hardware implementation for generating message authentication codes | en_US |
dc.type | Article | en_US |
dc.affiliation | University of Patras | en |
dc.collaboration | University of Patras | en_US |
dc.subject.category | Computer and Information Sciences | en_US |
dc.journals | Open Access | en_US |
dc.country | Greece | en_US |
dc.subject.field | Natural Sciences | en_US |
dc.publication | Peer Reviewed | en_US |
dc.dept.handle | 123456789/54 | en |
dc.relation.issue | 11 | en_US |
dc.relation.volume | 4 | en_US |
cut.common.academicyear | 2005-2006 | en_US |
dc.identifier.spage | 1276 | en_US |
dc.identifier.epage | 1283 | en_US |
item.openairecristype | http://purl.org/coar/resource_type/c_6501 | - |
item.openairetype | article | - |
item.cerifentitytype | Publications | - |
item.grantfulltext | none | - |
item.languageiso639-1 | en | - |
item.fulltext | No Fulltext | - |
crisitem.journal.journalissn | 2224-2864 | - |
crisitem.journal.publisher | World Scientific and Engineering Academy and Society | - |
crisitem.author.dept | Department of Electrical Engineering, Computer Engineering and Informatics | - |
crisitem.author.faculty | Faculty of Engineering and Technology | - |
crisitem.author.orcid | 0000-0002-8299-8737 | - |
crisitem.author.parentorg | Faculty of Engineering and Technology | - |
Appears in Collections: | Άρθρα/Articles |
CORE Recommender
This item is licensed under a Creative Commons License