Please use this identifier to cite or link to this item: https://hdl.handle.net/20.500.14279/1505
DC FieldValueLanguage
dc.contributor.authorMichail, Harris-
dc.contributor.authorKakarountas, Athanasios P.-
dc.contributor.authorFotopoulou, Eleni-
dc.contributor.authorGoutis, G. E.-
dc.date.accessioned2013-02-22T14:11:53Zen
dc.date.accessioned2013-05-17T05:22:31Z-
dc.date.accessioned2015-12-02T10:07:01Z-
dc.date.available2013-02-22T14:11:53Zen
dc.date.available2013-05-17T05:22:31Z-
dc.date.available2015-12-02T10:07:01Z-
dc.date.issued2005-11-
dc.identifier.citationWSEAS Transactions on Communications, 2005, vol. 4, no. 11, pp. 1276-1283en_US
dc.identifier.issn22242864-
dc.identifier.urihttps://hdl.handle.net/20.500.14279/1505-
dc.description.abstractHMAC mechanism rely his security in the underlying hash function. This mechanism is used for authentication codes between two parties that share a secret key in order to authenticate information transmitted between these parties. Currently used HMAC implementations utilize MD-5 or SHA-1 hash functions that both have now been proved to be vulnerable. This affects the security level provided by the HMAC mechanism and thus in the near future a more secure hash function will be used. One of them is the SHA-256 hash function which is used the HMAC implementation presented in this paper. The proposed hardware implementation, invokes a partially unrolled implementation for the underlying hash function leading to a high-throughput and low-power implementation for the whole HMAC construction.en_US
dc.formatpdfen_US
dc.language.isoenen_US
dc.relation.ispartofWSEAS Transactions on Communicationsen_US
dc.rights© WSEASen_US
dc.rights.urihttp://creativecommons.org/licenses/by-nc-nd/3.0/us/*
dc.subjectComputer networksen_US
dc.subjectPublic key cryptographyen_US
dc.subjectSecurityen_US
dc.titleNovel hardware implementation for generating message authentication codesen_US
dc.typeArticleen_US
dc.affiliationUniversity of Patrasen
dc.collaborationUniversity of Patrasen_US
dc.subject.categoryComputer and Information Sciencesen_US
dc.journalsOpen Accessen_US
dc.countryGreeceen_US
dc.subject.fieldNatural Sciencesen_US
dc.publicationPeer Revieweden_US
dc.dept.handle123456789/54en
dc.relation.issue11en_US
dc.relation.volume4en_US
cut.common.academicyear2005-2006en_US
dc.identifier.spage1276en_US
dc.identifier.epage1283en_US
item.openairetypearticle-
item.cerifentitytypePublications-
item.languageiso639-1en-
item.fulltextNo Fulltext-
item.openairecristypehttp://purl.org/coar/resource_type/c_6501-
item.grantfulltextnone-
crisitem.author.deptDepartment of Electrical Engineering, Computer Engineering and Informatics-
crisitem.author.facultyFaculty of Engineering and Technology-
crisitem.author.orcid0000-0002-8299-8737-
crisitem.author.parentorgFaculty of Engineering and Technology-
crisitem.journal.journalissn2224-2864-
crisitem.journal.publisherWorld Scientific and Engineering Academy and Society-
Appears in Collections:Άρθρα/Articles
CORE Recommender
Show simple item record

Page view(s) 50

329
Last Week
2
Last month
6
checked on Aug 28, 2024

Google ScholarTM

Check


This item is licensed under a Creative Commons License Creative Commons