Please use this identifier to cite or link to this item: https://hdl.handle.net/20.500.14279/3077
DC FieldValueLanguage
dc.contributor.authorMichail, Harris-
dc.contributor.authorMilidonis, Athanasios S.-
dc.contributor.authorKakarountas, Athanasios P.-
dc.contributor.otherΜιχαήλ, Χάρης-
dc.date.accessioned2013-02-22T14:09:09Z-
dc.date.accessioned2013-05-17T05:34:05Z-
dc.date.accessioned2015-12-02T12:33:47Z-
dc.date.available2013-02-22T14:09:09Z-
dc.date.available2013-05-17T05:34:05Z-
dc.date.available2015-12-02T12:33:47Z-
dc.date.issued2005-12-
dc.identifier.citation(2005) Proceedings of the IEEE International Conference on Electronics, Circuits, and Systems, art. no. 4633433en_US
dc.identifier.isbn978-997261100-1-
dc.identifier.urihttps://hdl.handle.net/20.500.14279/3077-
dc.description.abstractHash functions are utilized in the security layer of every communication protocol and in signature authentication schemes for electronic transactions. As time passes more sophisticated applications-that invoke a security layer-arise and address to more users-clients. This means that all these applications demand for higher throughput. In this work a pre-computation technique has been developed for optimizing SHA-256 which has already started replacing both SHA-l and MD-5. Comparing to conventional pipelined implementations of SHA-256 hash function the applied pre-computation technique leads to about 30% higher throughput with only an area penalty of approximately 9.5%.-
dc.formatpdf-
dc.language.isoenen_US
dc.rights© 2005 IEEE-
dc.subjectCommunication-
dc.subjectFunctions-
dc.subjectApplication software-
dc.subjectAuthentication-
dc.subjectExtranets (Computer networks)-
dc.titleNovel high throughput implementation of SHA-256 hash function through pre-computation techniqueen_US
dc.typeConference Papersen_US
dc.affiliationUniversity of Patras-
dc.collaborationUniversity of Patrasen_US
dc.subject.categoryElectrical Engineering - Electronic Engineering - Information Engineering-
dc.subject.fieldEngineering and Technology-
dc.publicationPeer Reviewed-
dc.relation.conferenceIEEE International Conference on Electronics, Circuits, and Systemsen_US
dc.identifier.doi10.1109/ICECS.2005.4633433en_US
dc.identifier.scopus2-s2.0-56749139600-
dc.dept.handle123456789/54-
dc.identifier.urlhttps://api.elsevier.com/content/abstract/scopus_id/56749139600-
dc.contributor.orcid#NODATA#-
dc.contributor.orcid#NODATA#-
dc.contributor.orcid#NODATA#-
dc.contributor.orcid#NODATA#-
cut.common.academicyear2005-2006en_US
item.fulltextNo Fulltext-
item.openairecristypehttp://purl.org/coar/resource_type/c_c94f-
item.openairetypeconferenceObject-
item.grantfulltextnone-
item.languageiso639-1en-
item.cerifentitytypePublications-
crisitem.author.deptDepartment of Electrical Engineering, Computer Engineering and Informatics-
crisitem.author.facultyFaculty of Engineering and Technology-
crisitem.author.orcid0000-0002-8299-8737-
crisitem.author.parentorgFaculty of Engineering and Technology-
Appears in Collections:Κεφάλαια βιβλίων/Book chapters
CORE Recommender
Show simple item record

SCOPUSTM   
Citations 50

13
checked on Mar 14, 2024

Page view(s) 50

413
Last Week
1
Last month
3
checked on Feb 8, 2025

Google ScholarTM

Check

Altmetric


Items in KTISIS are protected by copyright, with all rights reserved, unless otherwise indicated.