Please use this identifier to cite or link to this item:
https://hdl.handle.net/20.500.14279/1515
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Michail, Harris | - |
dc.contributor.author | Kakarountas, Athanasios P. | - |
dc.contributor.author | Goutis, Costas E. | - |
dc.contributor.other | Μιχαήλ, Χάρης | - |
dc.date.accessioned | 2013-02-22T14:12:17Z | en |
dc.date.accessioned | 2013-05-17T05:22:31Z | - |
dc.date.accessioned | 2015-12-02T10:07:31Z | - |
dc.date.available | 2013-02-22T14:12:17Z | en |
dc.date.available | 2013-05-17T05:22:31Z | - |
dc.date.available | 2015-12-02T10:07:31Z | - |
dc.date.issued | 2005-07 | - |
dc.identifier.citation | WSEAS Transactions on Circuits and Systems, 2005, vol. 4, no. 7, pp. 748-755 | en_US |
dc.identifier.issn | 2224266X | - |
dc.identifier.uri | https://hdl.handle.net/20.500.14279/1515 | - |
dc.description.abstract | Most of internet applications incorporate a security layer in which a hash function is found. These applications are addressing to more and more clients and thus the corresponding server accepts a great number of service requests. In order to indulge these requests the security schemes must have a high-throughput. Furthermore, due to the tendency of the market to minimize devices' size and increase their autonomy to make them portable, power issues have also to be considered as long as the client-side is concerned. In this work the parallelism (or partial unrolling) technique is presented for increasing frequency and throughput of all widely used hash functions - and those that will be used in the future- hash functions such as MD-5, SHA-1, RIPEMD (all versions), SHA-256, SHA-384, and SHA-512 etc. The proposed parallelism technique leads to a 33%- 50% higher throughput comparing to the most competitive implementations and to much lower power dissipation. | en_US |
dc.format | en_US | |
dc.language.iso | en | en_US |
dc.relation.ispartof | WSEAS Transactions on Circuits and Systems | en_US |
dc.rights | © WSEAS | en_US |
dc.rights | Attribution-NonCommercial-NoDerivs 3.0 United States | * |
dc.rights.uri | http://creativecommons.org/licenses/by-nc-nd/3.0/us/ | * |
dc.subject | Algorithms | en_US |
dc.subject | Security | en_US |
dc.subject | Field programmable gate arrays | en_US |
dc.title | Novel technique for high-throughput and power efficient cryptographic primitives | en_US |
dc.type | Article | en_US |
dc.affiliation | University of Patras | en |
dc.collaboration | University of Patras | en_US |
dc.subject.category | Electrical Engineering - Electronic Engineering - Information Engineering | en_US |
dc.journals | Open Access | en_US |
dc.country | Greece | en_US |
dc.subject.field | Engineering and Technology | en_US |
dc.publication | Peer Reviewed | en_US |
dc.dept.handle | 123456789/54 | en |
dc.relation.issue | 7 | en_US |
dc.relation.volume | 4 | en_US |
cut.common.academicyear | 2004-2005 | en_US |
dc.identifier.spage | 748 | en_US |
dc.identifier.epage | 755 | en_US |
item.grantfulltext | none | - |
item.languageiso639-1 | en | - |
item.cerifentitytype | Publications | - |
item.openairecristype | http://purl.org/coar/resource_type/c_6501 | - |
item.openairetype | article | - |
item.fulltext | No Fulltext | - |
crisitem.journal.journalissn | 2224-266X | - |
crisitem.journal.publisher | World Scientific and Engineering Academy and Society | - |
crisitem.author.dept | Department of Electrical Engineering, Computer Engineering and Informatics | - |
crisitem.author.faculty | Faculty of Engineering and Technology | - |
crisitem.author.orcid | 0000-0002-8299-8737 | - |
crisitem.author.parentorg | Faculty of Engineering and Technology | - |
Appears in Collections: | Άρθρα/Articles |
CORE Recommender
This item is licensed under a Creative Commons License