Please use this identifier to cite or link to this item:
https://hdl.handle.net/20.500.14279/1870
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Michail, Harris | - |
dc.contributor.author | Kakarountas, Athanasios P. | - |
dc.contributor.author | Goutis, Costas E. | - |
dc.contributor.other | Μιχαήλ, Χάρης | - |
dc.date.accessioned | 2013-02-22T14:15:45Z | - |
dc.date.accessioned | 2013-05-17T05:22:34Z | - |
dc.date.accessioned | 2015-12-02T09:53:30Z | - |
dc.date.available | 2013-02-22T14:15:45Z | - |
dc.date.available | 2013-05-17T05:22:34Z | - |
dc.date.available | 2015-12-02T09:53:30Z | - |
dc.date.issued | 2005-07 | - |
dc.identifier.citation | WSEAS Transactions on Computers, 2005, vol. 4, no. 7, Pages 787-795 | en_US |
dc.identifier.issn | 11092750 | - |
dc.identifier.uri | https://hdl.handle.net/20.500.14279/1870 | - |
dc.description.abstract | Hash functions are forming a special family of cryptographic algorithms, which are applied wherever message integrity and authentication issues are critical. Implementations of these functions are cryptographic primitives to the most widely used cryptographic schemes and security protocols such as SET, PKI, IPSec and VPN's. As time passes it seems that all these applications call for higher throughput due to their rapid acceptance by the market. In this work a new technique is presented for increasing frequency and throughput of all widely used hash functions - and those that will be used in the future- hash functions such as MD-5, SHA-1, RIPEMD (all versions), SHA-256, SHA-384, and SHA-512 etc. Comparing to conventional pipelined implementations of hash functions the proposed pre-computation technique leads to a 40%-25% higher throughput. | en_US |
dc.format | en_US | |
dc.language.iso | en | en_US |
dc.relation.ispartof | WSEAS Transactions on Computers | en_US |
dc.rights | © WSEAS | en_US |
dc.subject | Hardware | en_US |
dc.subject | Cryptography | en_US |
dc.subject | Extranets (Computer networks) | en_US |
dc.title | Case study and application of pre-computation technique for hashing cores aiming at high-throughput implementations | en_US |
dc.type | Article | en_US |
dc.affiliation | University of Patras | - |
dc.subject.category | Electrical Engineering - Electronic Engineering - Information Engineering | en_US |
dc.journals | Subscription Journal | en_US |
dc.country | Cyprus | en_US |
dc.subject.field | Engineering and Technology | en_US |
dc.publication | Peer Reviewed | en_US |
dc.identifier.scopus | 2-s2.0-22944486713 | - |
dc.dept.handle | 123456789/54 | - |
dc.identifier.url | https://api.elsevier.com/content/abstract/scopus_id/22944486713 | - |
dc.contributor.orcid | #NODATA# | - |
dc.contributor.orcid | #NODATA# | - |
dc.contributor.orcid | #NODATA# | - |
dc.relation.issue | 7 | - |
dc.relation.volume | 4 | - |
cut.common.academicyear | 2004-2005 | en_US |
item.openairecristype | http://purl.org/coar/resource_type/c_6501 | - |
item.openairetype | article | - |
item.cerifentitytype | Publications | - |
item.grantfulltext | none | - |
item.languageiso639-1 | en | - |
item.fulltext | No Fulltext | - |
crisitem.journal.journalissn | 2224-2872 | - |
crisitem.journal.publisher | World Scientific and Engineering Academy and Society | - |
crisitem.author.dept | Department of Electrical Engineering, Computer Engineering and Informatics | - |
crisitem.author.faculty | Faculty of Engineering and Technology | - |
crisitem.author.orcid | 0000-0002-8299-8737 | - |
crisitem.author.parentorg | Faculty of Engineering and Technology | - |
Appears in Collections: | Άρθρα/Articles |
CORE Recommender
Items in KTISIS are protected by copyright, with all rights reserved, unless otherwise indicated.