Please use this identifier to cite or link to this item: https://hdl.handle.net/20.500.14279/1745
DC FieldValueLanguage
dc.contributor.authorMichail, Harris-
dc.contributor.authorYiakoumis, Ioannis I.-
dc.contributor.authorPapadonikolakis, Markos E.-
dc.date.accessioned2013-02-22T14:15:19Zen
dc.date.accessioned2013-05-17T05:22:33Z-
dc.date.accessioned2015-12-02T09:54:11Z-
dc.date.available2013-02-22T14:15:19Zen
dc.date.available2013-05-17T05:22:33Z-
dc.date.available2015-12-02T09:54:11Z-
dc.date.issued2006-03-
dc.identifier.citationIEEE Potentials, 2006, vol. 25, no. 2, pp. 9-12en_US
dc.identifier.issn02786648-
dc.identifier.urihttps://hdl.handle.net/20.500.14279/1745-
dc.description.abstractA novel design approach for the development of small sized and high speed implementation of the keyed-hash message authentication code (HMAC) is discussed. The design is developed to increase the HMAC throughput to a level that can be used in modern telecommunication application such as virtual private networks (VPN). Hash functions are used to produce a fingerprint of a message or some other block of data that will provide a high level of security for communication protocols. The purpose of HMAC is to authenticate the source of message and its integrity. The use of hash functions can help in reducing the critical path by including the special properties of the hash functions. HMAC offers a significant benefit concerning the maximum achieved operation frequency. As a result, a negligible area penalty was introduced to achieve an increase in throughput up to 390% compared to the competing implementations.en_US
dc.formatpdfen_US
dc.language.isoenen_US
dc.relation.ispartofIEEE Potentialsen_US
dc.rights© 2006 IEEEen_US
dc.subjectAuthenticationen_US
dc.subjectExtranets (Computer networks)en_US
dc.subjectTelecommunication systemsen_US
dc.subjectVirtual realityen_US
dc.titleMaximizing the hash function of authentication codesen_US
dc.typeArticleen_US
dc.collaborationUniversity of Patrasen_US
dc.subject.categoryElectrical Engineering - Electronic Engineering - Information Engineeringen_US
dc.countryGreeceen_US
dc.subject.fieldEngineering and Technologyen_US
dc.publicationPeer Revieweden_US
dc.identifier.doi10.1109/MP.2006.1649004en_US
dc.dept.handle123456789/54en
cut.common.academicyear2005-2006en_US
item.grantfulltextnone-
item.openairecristypehttp://purl.org/coar/resource_type/c_6501-
item.fulltextNo Fulltext-
item.languageiso639-1en-
item.cerifentitytypePublications-
item.openairetypearticle-
crisitem.author.deptDepartment of Electrical Engineering, Computer Engineering and Informatics-
crisitem.author.facultyFaculty of Engineering and Technology-
crisitem.author.orcid0000-0002-8299-8737-
crisitem.author.parentorgFaculty of Engineering and Technology-
Appears in Collections:Άρθρα/Articles
CORE Recommender
Show simple item record

SCOPUSTM   
Citations

13
checked on Nov 9, 2023

Page view(s)

428
Last Week
0
Last month
5
checked on Dec 23, 2024

Google ScholarTM

Check

Altmetric


Items in KTISIS are protected by copyright, with all rights reserved, unless otherwise indicated.