Please use this identifier to cite or link to this item:
https://hdl.handle.net/20.500.14279/2413
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Michail, Harris | - |
dc.contributor.author | Athanasiou, George S. | - |
dc.contributor.author | Kritikakou, Angeliki S. | - |
dc.date.accessioned | 2013-02-21T13:29:34Z | en |
dc.date.accessioned | 2013-05-17T05:29:50Z | - |
dc.date.accessioned | 2015-12-02T11:22:18Z | - |
dc.date.available | 2013-02-21T13:29:34Z | en |
dc.date.available | 2013-05-17T05:29:50Z | - |
dc.date.available | 2015-12-02T11:22:18Z | - |
dc.date.issued | 2010-07 | - |
dc.identifier.citation | (2010) SECRYPT 2010 - Proceedings of the International Conference on Security and Cryptography, pp. 309-313; International Conference on Security and Cryptography, SECRYPT 2010; Athens; Greece; 26 July 2010 through 28 July 2010 | en_US |
dc.identifier.isbn | 978-989842518-8 | - |
dc.description.abstract | Nowadays, more than ever, security is considered to be critical issue for all electronic transactions. This is the reason why security services like those described in IPSec are mandatory to IPV6 which will be adopted as the new IP standard the next years. Moreover the need for security services in every data packet that is transmitted via IPv6, illustrates the need for designing security products able to achieve higher throughput rates for the incorporated security schemes. In this paper such a design is presented which manages to increase throughput of SHA-256 hash function enabling efficient software/hardware co-design. | en_US |
dc.description.sponsorship | Inst. Syst. Technol. Inf., Control Commun. (INSTICC),University of Piraeus,University of Piraeus - Research Center | en_US |
dc.format | en_US | |
dc.language.iso | en | en_US |
dc.rights | © 2010 IEEE | en_US |
dc.subject | Hardware | en_US |
dc.subject | Pipelines | en_US |
dc.subject | Security | en_US |
dc.title | Ultra high speed SHA-256 hashing cryptographic module for IPSEC hardware/software codesign | en_US |
dc.type | Conference Papers | en_US |
dc.collaboration | University of Patras | en_US |
dc.subject.category | Electrical Engineering - Electronic Engineering - Information Engineering | en_US |
dc.country | Greece | en_US |
dc.subject.field | Engineering and Technology | en_US |
dc.publication | Peer Reviewed | en_US |
dc.relation.conference | International Conference on Security and Cryptography | en_US |
dc.dept.handle | 123456789/54 | en |
cut.common.academicyear | 2009-2010 | en_US |
item.openairecristype | http://purl.org/coar/resource_type/c_c94f | - |
item.openairetype | conferenceObject | - |
item.cerifentitytype | Publications | - |
item.grantfulltext | none | - |
item.languageiso639-1 | en | - |
item.fulltext | No Fulltext | - |
crisitem.author.dept | Department of Electrical Engineering, Computer Engineering and Informatics | - |
crisitem.author.faculty | Faculty of Engineering and Technology | - |
crisitem.author.orcid | 0000-0002-8299-8737 | - |
crisitem.author.parentorg | Faculty of Engineering and Technology | - |
Appears in Collections: | Δημοσιεύσεις σε συνέδρια /Conference papers or poster or presentation |
CORE Recommender
Page view(s) 50
449
Last Week
0
0
Last month
0
0
checked on Nov 21, 2024
Google ScholarTM
Check
Altmetric
Items in KTISIS are protected by copyright, with all rights reserved, unless otherwise indicated.