Παρακαλώ χρησιμοποιήστε αυτό το αναγνωριστικό για να παραπέμψετε ή να δημιουργήσετε σύνδεσμο προς αυτό το τεκμήριο:
https://hdl.handle.net/20.500.14279/1515
Πεδίο DC | Τιμή | Γλώσσα |
---|---|---|
dc.contributor.author | Michail, Harris | - |
dc.contributor.author | Kakarountas, Athanasios P. | - |
dc.contributor.author | Goutis, Costas E. | - |
dc.contributor.other | Μιχαήλ, Χάρης | - |
dc.date.accessioned | 2013-02-22T14:12:17Z | en |
dc.date.accessioned | 2013-05-17T05:22:31Z | - |
dc.date.accessioned | 2015-12-02T10:07:31Z | - |
dc.date.available | 2013-02-22T14:12:17Z | en |
dc.date.available | 2013-05-17T05:22:31Z | - |
dc.date.available | 2015-12-02T10:07:31Z | - |
dc.date.issued | 2005-07 | - |
dc.identifier.citation | WSEAS Transactions on Circuits and Systems, 2005, vol. 4, no. 7, pp. 748-755 | en_US |
dc.identifier.issn | 2224266X | - |
dc.identifier.uri | https://hdl.handle.net/20.500.14279/1515 | - |
dc.description.abstract | Most of internet applications incorporate a security layer in which a hash function is found. These applications are addressing to more and more clients and thus the corresponding server accepts a great number of service requests. In order to indulge these requests the security schemes must have a high-throughput. Furthermore, due to the tendency of the market to minimize devices' size and increase their autonomy to make them portable, power issues have also to be considered as long as the client-side is concerned. In this work the parallelism (or partial unrolling) technique is presented for increasing frequency and throughput of all widely used hash functions - and those that will be used in the future- hash functions such as MD-5, SHA-1, RIPEMD (all versions), SHA-256, SHA-384, and SHA-512 etc. The proposed parallelism technique leads to a 33%- 50% higher throughput comparing to the most competitive implementations and to much lower power dissipation. | en_US |
dc.format | en_US | |
dc.language.iso | en | en_US |
dc.relation.ispartof | WSEAS Transactions on Circuits and Systems | en_US |
dc.rights | © WSEAS | en_US |
dc.rights | Attribution-NonCommercial-NoDerivs 3.0 United States | * |
dc.rights.uri | http://creativecommons.org/licenses/by-nc-nd/3.0/us/ | * |
dc.subject | Algorithms | en_US |
dc.subject | Security | en_US |
dc.subject | Field programmable gate arrays | en_US |
dc.title | Novel technique for high-throughput and power efficient cryptographic primitives | en_US |
dc.type | Article | en_US |
dc.affiliation | University of Patras | en |
dc.collaboration | University of Patras | en_US |
dc.subject.category | Electrical Engineering - Electronic Engineering - Information Engineering | en_US |
dc.journals | Open Access | en_US |
dc.country | Greece | en_US |
dc.subject.field | Engineering and Technology | en_US |
dc.publication | Peer Reviewed | en_US |
dc.dept.handle | 123456789/54 | en |
dc.relation.issue | 7 | en_US |
dc.relation.volume | 4 | en_US |
cut.common.academicyear | 2004-2005 | en_US |
dc.identifier.spage | 748 | en_US |
dc.identifier.epage | 755 | en_US |
item.fulltext | No Fulltext | - |
item.cerifentitytype | Publications | - |
item.grantfulltext | none | - |
item.openairecristype | http://purl.org/coar/resource_type/c_6501 | - |
item.openairetype | article | - |
item.languageiso639-1 | en | - |
crisitem.journal.journalissn | 2224-266X | - |
crisitem.journal.publisher | World Scientific and Engineering Academy and Society | - |
crisitem.author.dept | Department of Electrical Engineering, Computer Engineering and Informatics | - |
crisitem.author.faculty | Faculty of Engineering and Technology | - |
crisitem.author.orcid | 0000-0002-8299-8737 | - |
crisitem.author.parentorg | Faculty of Engineering and Technology | - |
Εμφανίζεται στις συλλογές: | Άρθρα/Articles |
CORE Recommender
Αυτό το τεκμήριο προστατεύεται από άδεια Άδεια Creative Commons