Please use this identifier to cite or link to this item: https://hdl.handle.net/20.500.14279/4274
DC FieldValueLanguage
dc.contributor.authorMichail, Harris-
dc.contributor.authorAthanasiou, George S.-
dc.contributor.authorTsingkas, Elias N.-
dc.contributor.authorChalkou, Chara I.-
dc.contributor.authorTheodoridis, G.-
dc.contributor.authorGoutis, Costas E.-
dc.contributor.otherΜιχαήλ, Χάρης-
dc.date.accessioned2013-02-21T13:39:57Zen
dc.date.accessioned2013-05-17T10:38:38Z-
dc.date.accessioned2015-12-09T12:04:17Z-
dc.date.available2013-02-21T13:39:57Zen
dc.date.available2013-05-17T10:38:38Z-
dc.date.available2015-12-09T12:04:17Z-
dc.date.issued2012-03-
dc.identifier.citation2012 IEEE International Conference on Industrial Technology, ICIT 2012, Proceedings, art. no. 6209998, pp. 561-566; 2012 IEEE International Conference on Industrial Technology, ICIT 2012; Athens; Greece; 19 March 2012 through 21 March 2012en_US
dc.identifier.isbn978-146730342-2-
dc.description.abstractMany cryptographic primitives that are used in crucial cryptographic schemes and commercial security protocols utilize hash functions. Recently, the National Institute of Standards and Technology (NIST) launched an international competition for establishing the new hash standard, SHA-3. One of the semifinalists is the Skein algorithm. In this paper, an 8-round unrolled architecture of the complete Skein algorithm is presented, implemented in Xilinx Spartan-3 and Virtex-5 FPGAs. The design is able to perform both as simple Hash and MAC module. The performance metrics, such as Frequency and Area, that are gathered, show that the proposed implementation is more efficient in terms of Throughput/Area, compared to other similar ones, proposed by academia.en_US
dc.description.sponsorshipThe Institute of Electrical andElectronics Engineers, Inc.,Industrial Electronics Society,University of Patrasen_US
dc.formatpdfen_US
dc.language.isoenen_US
dc.rights© 2012 IEEEen_US
dc.subjectCryptographyen_US
dc.subjectAlgorithmsen_US
dc.subjectHardwareen_US
dc.titleDesign and implementation of a SHA-3 candidate Skein-512 hash/MAC hardware architectureen_US
dc.typeConference Papersen_US
dc.collaborationUniversity of Patrasen_US
dc.collaborationCyprus University of Technologyen_US
dc.subject.categoryElectrical Engineering - Electronic Engineering - Information Engineeringen_US
dc.reviewpeer reviewed-
dc.countryGreeceen_US
dc.countryCyprusen_US
dc.subject.fieldEngineering and Technologyen_US
dc.publicationPeer Revieweden_US
dc.relation.conferenceIEEE International Conference on Industrial Technologyen_US
dc.identifier.doi10.1109/ICIT.2012.6209998en_US
dc.dept.handle123456789/134en
cut.common.academicyear2011-2012en_US
item.fulltextNo Fulltext-
item.languageiso639-1en-
item.grantfulltextnone-
item.openairecristypehttp://purl.org/coar/resource_type/c_c94f-
item.cerifentitytypePublications-
item.openairetypeconferenceObject-
crisitem.author.deptDepartment of Electrical Engineering, Computer Engineering and Informatics-
crisitem.author.facultyFaculty of Engineering and Technology-
crisitem.author.orcid0000-0002-8299-8737-
crisitem.author.parentorgFaculty of Engineering and Technology-
Appears in Collections:Κεφάλαια βιβλίων/Book chapters
CORE Recommender
Show simple item record

Page view(s) 50

426
Last Week
0
Last month
27
checked on Mar 13, 2025

Google ScholarTM

Check

Altmetric


Items in KTISIS are protected by copyright, with all rights reserved, unless otherwise indicated.