Please use this identifier to cite or link to this item:
https://hdl.handle.net/20.500.14279/3066
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Michail, Harris | - |
dc.contributor.author | Athanasiou, George S. | - |
dc.contributor.author | Makridakis, George | - |
dc.contributor.other | Μιχαήλ, Χάρης | - |
dc.date.accessioned | 2013-02-21T13:22:41Z | en |
dc.date.accessioned | 2013-05-17T05:33:59Z | - |
dc.date.accessioned | 2015-12-02T12:33:17Z | - |
dc.date.available | 2013-02-21T13:22:41Z | en |
dc.date.available | 2013-05-17T05:33:59Z | - |
dc.date.available | 2015-12-02T12:33:17Z | - |
dc.date.issued | 2010-12 | - |
dc.identifier.citation | (2010) 2010 IEEE International Conference on Electronics, Circuits, and Systems, ICECS 2010 - Proceedings, art. no. 5724499, pp. 243-246; IEEE International Conference on Electronics, Circuits, and Systems, ICECS, 2010, Athens | en_US |
dc.identifier.isbn | 978-142448157-6 | - |
dc.description.abstract | In this paper, a performance analysis of two alternative designs of SHA-1 hash function and a pure software version, implemented in a configurable and extensible embedded processor (Tensilica's Xtensa LX2) is presented. The first alternative is exploiting extensibility of incorporated platform; the second one is exploiting configurability and extensibility. These two alternatives are compared to the pure software implementation in the same processor. The results showed that exploiting both configurability and extensibility leads to high performance SHA-1 implementation. Up to 490% increase in terms of throughput is observed, while the area is significantly reduced by 28%. This work aims to offer base implementations for comparisons with future opts that authors are already working on. | en_US |
dc.format | en_US | |
dc.language.iso | en | en_US |
dc.rights | ©2010 IEEE | en_US |
dc.subject | Cryptography | en_US |
dc.subject | Lead | en_US |
dc.subject | Embedded computer systems | en_US |
dc.subject | Security | en_US |
dc.title | Designs and comparisons of authentication modules for IPSec in configurable and extensible embedded processor | en_US |
dc.type | Conference Papers | en_US |
dc.affiliation | University of Patras | en |
dc.collaboration | University of Patras | en_US |
dc.subject.category | Electrical Engineering - Electronic Engineering - Information Engineering | en_US |
dc.subject.field | Engineering and Technology | en_US |
dc.publication | Peer Reviewed | en_US |
dc.relation.conference | IEEE International Conference on Electronics, Circuits, and Systems | en_US |
dc.identifier.doi | 10.1109/ICECS.2010.5724499 | en_US |
dc.dept.handle | 123456789/54 | en |
cut.common.academicyear | 2010-2011 | en_US |
item.openairecristype | http://purl.org/coar/resource_type/c_c94f | - |
item.openairetype | conferenceObject | - |
item.cerifentitytype | Publications | - |
item.grantfulltext | none | - |
item.languageiso639-1 | en | - |
item.fulltext | No Fulltext | - |
crisitem.author.dept | Department of Electrical Engineering, Computer Engineering and Informatics | - |
crisitem.author.faculty | Faculty of Engineering and Technology | - |
crisitem.author.orcid | 0000-0002-8299-8737 | - |
crisitem.author.parentorg | Faculty of Engineering and Technology | - |
Appears in Collections: | Δημοσιεύσεις σε συνέδρια /Conference papers or poster or presentation |
CORE Recommender
Page view(s) 50
420
Last Week
0
0
Last month
1
1
checked on Nov 23, 2024
Google ScholarTM
Check
Altmetric
Items in KTISIS are protected by copyright, with all rights reserved, unless otherwise indicated.