Please use this identifier to cite or link to this item: https://hdl.handle.net/20.500.14279/1870
DC FieldValueLanguage
dc.contributor.authorMichail, Harris-
dc.contributor.authorKakarountas, Athanasios P.-
dc.contributor.authorGoutis, Costas E.-
dc.contributor.otherΜιχαήλ, Χάρης-
dc.date.accessioned2013-02-22T14:15:45Z-
dc.date.accessioned2013-05-17T05:22:34Z-
dc.date.accessioned2015-12-02T09:53:30Z-
dc.date.available2013-02-22T14:15:45Z-
dc.date.available2013-05-17T05:22:34Z-
dc.date.available2015-12-02T09:53:30Z-
dc.date.issued2005-07-
dc.identifier.citationWSEAS Transactions on Computers, 2005, vol. 4, no. 7, Pages 787-795en_US
dc.identifier.issn11092750-
dc.identifier.urihttps://hdl.handle.net/20.500.14279/1870-
dc.description.abstractHash functions are forming a special family of cryptographic algorithms, which are applied wherever message integrity and authentication issues are critical. Implementations of these functions are cryptographic primitives to the most widely used cryptographic schemes and security protocols such as SET, PKI, IPSec and VPN's. As time passes it seems that all these applications call for higher throughput due to their rapid acceptance by the market. In this work a new technique is presented for increasing frequency and throughput of all widely used hash functions - and those that will be used in the future- hash functions such as MD-5, SHA-1, RIPEMD (all versions), SHA-256, SHA-384, and SHA-512 etc. Comparing to conventional pipelined implementations of hash functions the proposed pre-computation technique leads to a 40%-25% higher throughput.en_US
dc.formatpdfen_US
dc.language.isoenen_US
dc.relation.ispartofWSEAS Transactions on Computersen_US
dc.rights© WSEASen_US
dc.subjectHardwareen_US
dc.subjectCryptographyen_US
dc.subjectExtranets (Computer networks)en_US
dc.titleCase study and application of pre-computation technique for hashing cores aiming at high-throughput implementationsen_US
dc.typeArticleen_US
dc.affiliationUniversity of Patras-
dc.subject.categoryElectrical Engineering - Electronic Engineering - Information Engineeringen_US
dc.journalsSubscription Journalen_US
dc.countryCyprusen_US
dc.subject.fieldEngineering and Technologyen_US
dc.publicationPeer Revieweden_US
dc.identifier.scopus2-s2.0-22944486713-
dc.dept.handle123456789/54-
dc.identifier.urlhttps://api.elsevier.com/content/abstract/scopus_id/22944486713-
dc.contributor.orcid#NODATA#-
dc.contributor.orcid#NODATA#-
dc.contributor.orcid#NODATA#-
dc.relation.issue7-
dc.relation.volume4-
cut.common.academicyear2004-2005en_US
item.fulltextNo Fulltext-
item.languageiso639-1en-
item.openairecristypehttp://purl.org/coar/resource_type/c_6501-
item.grantfulltextnone-
item.openairetypearticle-
item.cerifentitytypePublications-
crisitem.author.deptDepartment of Electrical Engineering, Computer Engineering and Informatics-
crisitem.author.facultyFaculty of Engineering and Technology-
crisitem.author.orcid0000-0002-8299-8737-
crisitem.author.parentorgFaculty of Engineering and Technology-
crisitem.journal.journalissn2224-2872-
crisitem.journal.publisherWorld Scientific and Engineering Academy and Society-
Appears in Collections:Άρθρα/Articles
CORE Recommender
Show simple item record

Page view(s) 50

341
Last Week
3
Last month
3
checked on Jun 25, 2024

Google ScholarTM

Check


Items in KTISIS are protected by copyright, with all rights reserved, unless otherwise indicated.