Please use this identifier to cite or link to this item:
https://hdl.handle.net/20.500.14279/2908
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Michail, Harris | - |
dc.contributor.author | Yiakoumis, Ioannis I. | - |
dc.contributor.author | Papadonikolakis, Markos E. | - |
dc.contributor.other | Μιχαήλ, Χάρης | - |
dc.date.accessioned | 2013-02-22T14:07:12Z | en |
dc.date.accessioned | 2013-05-17T05:34:05Z | - |
dc.date.accessioned | 2015-12-02T12:26:22Z | - |
dc.date.available | 2013-02-22T14:07:12Z | en |
dc.date.available | 2013-05-17T05:34:05Z | - |
dc.date.available | 2015-12-02T12:26:22Z | - |
dc.date.issued | 2005-11 | - |
dc.identifier.citation | EUROCON - The International Conference on Computer as a Tool, 2005, Vol. II, pp. 1875-1878 | en_US |
dc.identifier.isbn | 978-142440049-2 | - |
dc.description.abstract | A design approach to create small-sized high-speed implementations of the Keyed-Hash Message Authentication Code (HMAC) is presented. The proposed implementation can either operate in HMAC-MD5 and/or in HMAC-SHA1 mode, The proposed implementations do not introduce significant area penalty. However the achieved throughput presents an increase compared to commercially available IP cores that range from 30%-390%. The main contribution of the paper is the increase of the HMAC throughput to the required level to be used in modern telecommunication applications, such as VPN and the oncoming 802.11n. | en_US |
dc.format | en_US | |
dc.language.iso | en | en_US |
dc.relation.ispartof | EUROCON | en_US |
dc.rights | © 2005 IEEE | en_US |
dc.subject | Integrated circuits--Very large scale integration | en_US |
dc.subject | Extranets (Computer networks) | en_US |
dc.subject | Authentication | en_US |
dc.title | Efficient small-sized implementation of the keyed-hash message authentication cod | en_US |
dc.type | Book Chapter | en_US |
dc.affiliation | University of Patras | en |
dc.collaboration | University of Patras | en_US |
dc.subject.category | Electrical Engineering - Electronic Engineering - Information Engineering | en_US |
dc.country | Greece | en_US |
dc.subject.field | Engineering and Technology | en_US |
dc.publication | Peer Reviewed | en_US |
dc.relation.conference | International Conference on Computer as a Tool | en_US |
dc.identifier.doi | 10.1109/EURCON.2005.1630347 | en_US |
dc.dept.handle | 123456789/54 | en |
cut.common.academicyear | 2005-2006 | en_US |
item.openairecristype | http://purl.org/coar/resource_type/c_3248 | - |
item.openairetype | bookPart | - |
item.cerifentitytype | Publications | - |
item.grantfulltext | none | - |
item.languageiso639-1 | en | - |
item.fulltext | No Fulltext | - |
crisitem.author.dept | Department of Electrical Engineering, Computer Engineering and Informatics | - |
crisitem.author.faculty | Faculty of Engineering and Technology | - |
crisitem.author.orcid | 0000-0002-8299-8737 | - |
crisitem.author.parentorg | Faculty of Engineering and Technology | - |
Appears in Collections: | Κεφάλαια βιβλίων/Book chapters |
CORE Recommender
SCOPUSTM
Citations
50
6
checked on Mar 21, 2021
Page view(s) 50
328
Last Week
0
0
Last month
1
1
checked on Nov 21, 2024
Google ScholarTM
Check
Altmetric
Items in KTISIS are protected by copyright, with all rights reserved, unless otherwise indicated.