Please use this identifier to cite or link to this item:
https://hdl.handle.net/20.500.14279/1898
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Michail, Harris | - |
dc.contributor.author | Kakarountas, Athanasios P. | - |
dc.contributor.author | Theodoridis, Georgios A. | - |
dc.contributor.other | Μιχαήλ, Χάρης | - |
dc.date.accessioned | 2013-02-22T14:12:41Z | en |
dc.date.accessioned | 2013-05-17T05:22:33Z | - |
dc.date.accessioned | 2015-12-02T09:38:52Z | - |
dc.date.available | 2013-02-22T14:12:41Z | en |
dc.date.available | 2013-05-17T05:22:33Z | - |
dc.date.available | 2015-12-02T09:38:52Z | - |
dc.date.issued | 2005-07 | - |
dc.identifier.citation | WSEAS Transactions on Computers, 2005, vol. 4, no. 7, pp. 814-821 | en_US |
dc.identifier.issn | 11092750 | - |
dc.identifier.uri | https://hdl.handle.net/20.500.14279/1898 | - |
dc.description.abstract | Applications that call for data integrity and signature authentication at electronic transactions invoke cryptographic primitives like hash functions. A hash function is utilized in the security layer of every communication protocol. However, as protocols evolve and new high-performance applications appear, the throughput of hash functions seems to reach to a limit. Market is asking for new implementations with higher throughputs respecting the tendency of the market to minimize devices' size and increase their autonomy to make them portable. The existing SHA-1 Hash Function implementations (SHA-1 is common in many protocols e.g. IPSec) limit throughput to a maximum of 2 Gbps. In this paper, a new a partially unrolled implementation is presented that comes to exceed this limit improving the throughput by 53%. Power issues have also been taken in consideration, in such way that the proposed implementation can be characterized as low-power. | en_US |
dc.format | en_US | |
dc.language.iso | en | en_US |
dc.relation.ispartof | WSEAS Transactions on Computers | en_US |
dc.rights | © WSEAS | en_US |
dc.rights.uri | http://creativecommons.org/licenses/by-nc-nd/3.0/us/ | * |
dc.subject | Algorithms | en_US |
dc.subject | Electronic commerce | en_US |
dc.subject | Data integrity | en_US |
dc.subject | Hardware | en_US |
dc.title | Speeded up and low-powered hardware implementation of the secure hash algorithm through partial unrolling | en_US |
dc.type | Article | en_US |
dc.affiliation | University of Patras | en |
dc.collaboration | University of Patras | en_US |
dc.collaboration | Aristotle University of Thessaloniki | en_US |
dc.subject.category | Electrical Engineering - Electronic Engineering - Information Engineering | en_US |
dc.country | Greece | en_US |
dc.subject.field | Engineering and Technology | en_US |
dc.publication | Peer Reviewed | en_US |
dc.dept.handle | 123456789/54 | en |
dc.relation.issue | 7 | en_US |
dc.relation.volume | 4 | en_US |
cut.common.academicyear | 2004-2005 | en_US |
dc.identifier.spage | 814 | en_US |
dc.identifier.epage | 821 | en_US |
item.grantfulltext | none | - |
item.openairecristype | http://purl.org/coar/resource_type/c_6501 | - |
item.fulltext | No Fulltext | - |
item.languageiso639-1 | en | - |
item.cerifentitytype | Publications | - |
item.openairetype | article | - |
crisitem.journal.journalissn | 2224-2872 | - |
crisitem.journal.publisher | World Scientific and Engineering Academy and Society | - |
crisitem.author.dept | Department of Electrical Engineering, Computer Engineering and Informatics | - |
crisitem.author.faculty | Faculty of Engineering and Technology | - |
crisitem.author.orcid | 0000-0002-8299-8737 | - |
crisitem.author.parentorg | Faculty of Engineering and Technology | - |
Appears in Collections: | Άρθρα/Articles |
CORE Recommender
Google ScholarTM
Check
This item is licensed under a Creative Commons License