Παρακαλώ χρησιμοποιήστε αυτό το αναγνωριστικό για να παραπέμψετε ή να δημιουργήσετε σύνδεσμο προς αυτό το τεκμήριο:
https://hdl.handle.net/20.500.14279/4223
Πεδίο DC | Τιμή | Γλώσσα |
---|---|---|
dc.contributor.author | Goutis, Costas E. | - |
dc.contributor.author | Michail, Harris | - |
dc.contributor.author | Athanasiou, George S. | - |
dc.contributor.author | Theodoridis, George | - |
dc.contributor.author | Gregoriades, Andreas | - |
dc.contributor.other | Μιχαήλ, Χάρης | - |
dc.contributor.other | Ανδρέας Γρηγοριάδης | - |
dc.date.accessioned | 2014-07-09T07:56:58Z | - |
dc.date.accessioned | 2015-12-09T12:01:45Z | - |
dc.date.available | 2014-07-09T07:56:58Z | - |
dc.date.available | 2015-12-09T12:01:45Z | - |
dc.date.issued | 2012-07 | - |
dc.identifier.citation | (2012) SECRYPT 2012 - Proceedings of the International Conference on Security and Cryptography, pp. 270-275; International Conference on Security and Cryptography, Rome, Italy, 24-27 July, 2012 | en_US |
dc.identifier.isbn | 978-989856524-2 | - |
dc.description.abstract | Hash functions are among the major blocks of modern security schemes, used in many applications to provide authentication services. To meet the applications' real-time constraints, they are implemented in hardware offering high-performance and increased security solutions. However, faults occurred during their operation result in the collapse of the authentication procedure, especially when they are used in securitycritical applications such as military or space ones. In this paper, a Totally Self-Checking (TSC) design is introduced for the currently most-used hash function, namely the SHA-1. A detailed description concerning the TSC development of the data- and control-path is provided. To the best of authors' knowledge, it is the first time that a TSC hashing core is presented. The proposed design has been implemented in 0.18mm CMOS technology and experiments on fault caverage, performance, and area have been performed. It achieves 100% coverage in the case of odd erroneous bits. The same coverage is also achieved for even erroneous bits, if they are appropriately spread. Compared to the corresponding Duplicated-with-Checking (DWC) design, the proposed one is more area-efficient by almost 15% keeping the same frequency. | en_US |
dc.description.sponsorship | Inst. Syst. Technol. Inf., Control Commun. (INSTICC) | en_US |
dc.language.iso | en | en_US |
dc.subject | Area efficient | en_US |
dc.subject | Authentication services | en_US |
dc.subject | CMOS technology | en_US |
dc.subject | Concurrent error detection | en_US |
dc.subject | Erroneous bits | en_US |
dc.subject | Hardware design | en_US |
dc.subject | Real time constraints | en_US |
dc.subject | Security scheme | en_US |
dc.subject | Security solutions | en_US |
dc.subject | Self checking | en_US |
dc.subject | SHA-1 | en_US |
dc.subject | Authentication | en_US |
dc.subject | CMOS integrated circuits | en_US |
dc.subject | Cryptography | en_US |
dc.subject | Design | en_US |
dc.subject | Military applications | en_US |
dc.subject | Hardware | en_US |
dc.subject | Hash functions | en_US |
dc.title | On the development of totally self-checking hardware design for the SHA-1 hash function | en_US |
dc.type | Conference Papers | en_US |
dc.collaboration | Cyprus University of Technology | en_US |
dc.collaboration | University of Patras | en_US |
dc.collaboration | European University Cyprus | en_US |
dc.subject.category | Electrical Engineering - Electronic Engineering - Information Engineering | en_US |
dc.country | Cyprus | en_US |
dc.country | Greece | en_US |
dc.subject.field | Engineering and Technology | en_US |
dc.publication | Peer Reviewed | en_US |
dc.relation.conference | International Conference on Security and Cryptography | en_US |
dc.identifier.doi | 10.5220/0004059302700275 | en_US |
dc.identifier.scopus | 2-s2.0-84867638119 | - |
dc.dept.handle | 123456789/134 | - |
dc.identifier.url | https://api.elsevier.com/content/abstract/scopus_id/84867638119 | - |
dc.contributor.orcid | #NODATA# | - |
dc.contributor.orcid | #NODATA# | - |
dc.contributor.orcid | #NODATA# | - |
dc.contributor.orcid | #NODATA# | - |
dc.contributor.orcid | #NODATA# | - |
cut.common.academicyear | 2011-2012 | en_US |
item.fulltext | No Fulltext | - |
item.languageiso639-1 | en | - |
item.grantfulltext | none | - |
item.openairecristype | http://purl.org/coar/resource_type/c_c94f | - |
item.cerifentitytype | Publications | - |
item.openairetype | conferenceObject | - |
crisitem.author.dept | Department of Electrical Engineering, Computer Engineering and Informatics | - |
crisitem.author.dept | Department of Communication and Marketing | - |
crisitem.author.faculty | Faculty of Engineering and Technology | - |
crisitem.author.faculty | Faculty of Communication and Media Studies | - |
crisitem.author.orcid | 0000-0002-8299-8737 | - |
crisitem.author.orcid | 0000-0002-7422-1514 | - |
crisitem.author.parentorg | Faculty of Engineering and Technology | - |
crisitem.author.parentorg | Faculty of Communication and Media Studies | - |
Εμφανίζεται στις συλλογές: | Δημοσιεύσεις σε συνέδρια /Conference papers or poster or presentation |
CORE Recommender
Όλα τα τεκμήρια του δικτυακού τόπου προστατεύονται από πνευματικά δικαιώματα