Search Results - "Kakarountas, A.P"
-
1
A Top-Down Design Methodology for Ultrahigh-Performance Hashing Cores
Published in IEEE transactions on dependable and secure computing (01-10-2009)“…Many cryptographic primitives that are used in cryptographic schemes and security protocols such as SET, PKI, IPSec, and VPNs utilize hash functions, which…”
Get full text
Journal Article -
2
Maximizing the hash function of authentication codes
Published in IEEE potentials (01-03-2006)“…A design approach to create small-sized, high-speed implementations of the keyed-hash message authentication code (HMAC) is the focus of this article. The…”
Get full text
Journal Article -
3
A low-power and high-throughput implementation of the SHA-1 hash function
Published in 2005 IEEE International Symposium on Circuits and Systems (ISCAS) (2005)“…The main applications of the hash functions are met in the fields of communication integrity and signature authentication. A hash function is utilized in the…”
Get full text
Conference Proceeding -
4
An RNS Implementation of an [Formula Omitted] Elliptic Curve Point Multiplier
Published in IEEE transactions on circuits and systems. I, Regular papers (01-06-2009)“…Designs for elliptic curve cryptography point multiplication are area demanding and time consuming. [...] the efficient realization of point multiplication is…”
Get full text
Journal Article -
5
Efficient High-Performance ASIC Implementation of JPEG-LS Encoder
Published in 2007 Design, Automation & Test in Europe Conference & Exhibition (01-04-2007)“…This paper introduces an innovative design which implements a high-performance JPEG-LS encoder. The encoding process follows the principles of the JPEG-LS…”
Get full text
Conference Proceeding -
6
An RNS Implementation of an F Elliptic Curve Point Multiplier
Published in IEEE transactions on circuits and systems. I, Regular papers (01-06-2009)“…Elliptic curve point multiplication is considered to be the most significant operation in all elliptic curve cryptography systems, as it forms the basis of the…”
Get full text
Journal Article -
7
An RNS architecture of an F/sub p/ elliptic curve point multiplier
Published in 2006 IEEE International Symposium on Circuits and Systems (ISCAS) (2006)“…An elliptic curve point multiplier (ECPM) is the main part of all elliptic curve cryptography (ECC) systems and its performance is decisive for the performance…”
Get full text
Conference Proceeding -
8
Implementation of HSSec: a High-Speed Cryptographic Co-Processor
Published in 2007 IEEE Conference on Emerging Technologies and Factory Automation (EFTA 2007) (01-09-2007)“…In this paper a high-speed cryptographic coprocessor, named HSSec, is presented. The core embeds two hash functions, SHA-1 and SHA-512, and the symmetric block…”
Get full text
Conference Proceeding -
9
A Decoupled Architecture of Processors with Scratch-Pad Memory Hierarchy
Published in 2007 Design, Automation & Test in Europe Conference & Exhibition (01-04-2007)“…This paper present a decoupled architecture of processors with a memory hierarchy of only scratch-pad memories, and a main memory. The decoupled architecture…”
Get full text
Conference Proceeding -
10
A new approach to elliptic curve cryptography: an RNS architecture
Published in MELECON 2006 - 2006 IEEE Mediterranean Electrotechnical Conference (2006)“…An elliptic curve point multiplier (ECPM) is the main part of all elliptic curve cryptography (ECC) systems and its performance is decisive for the performance…”
Get full text
Conference Proceeding -
11
High-Speed FPGA Implementation of the SHA-1 Hash Function
Published in 2005 IEEE Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (01-09-2005)“…The main applications of the Hash functions lie in the fields of communication integrity and authentication. In every communication protocol, especially in…”
Get full text
Conference Proceeding -
12
COSAFE:efficient safety-critical portable system design approach
Published in IEEE International Workshop on Biomedical Circuits and Systems, 2004 (2004)“…Safety-critical systems are becoming quite common nowadays, especially in medical and transportation applications. The targeted safe operation levels of this…”
Get full text
Conference Proceeding -
13
Throughput Optimization of the Cipher Message Authentication Code
Published in 2007 15th International Conference on Digital Signal Processing (01-07-2007)“…A new algorithm for producing message authenticating code (MAC) was recently proposed by NIST. The MAC protects both a message's integrity - by ensuring that a…”
Get full text
Conference Proceeding -
14
Confronting violations of the TSCG(T) in low-power design
Published in 2002 IEEE International Symposium on Circuits and Systems (ISCAS) (2002)“…The degradation of the Totally Self-Checking Goal (TSCG) on Totally Self-Checking (TSC) units caused by the application of low-power techniques is explored…”
Get full text
Conference Proceeding -
15
A high-throughput area efficient FPGA implementation of AES-128 Encryption
Published in IEEE Workshop on Signal Processing Systems Design and Implementation, 2005 (2005)“…Advanced Encryption Standard (AES) is used nowadays extensively in many network and multimedia applications to address security issues. In this paper, a high…”
Get full text
Conference Proceeding -
16
A novel high-throughput implementation of a partially unrolled SHA-512
Published in MELECON 2006 - 2006 IEEE Mediterranean Electrotechnical Conference (2006)“…A design approach to create small-sized high-speed implementation of the new version of secure hash algorithm is proposed. The resulted design can be easily…”
Get full text
Conference Proceeding -
17
Efficient implementation of the keyed-hash message authentication code (HMAC) using the SHA-1 hash function
Published in Proceedings of the 2004 11th IEEE International Conference on Electronics, Circuits and Systems, 2004. ICECS 2004 (2004)“…In this paper, an efficient implementation, in terms of performance, of the keyed-hash message authentication code (HMAC) using the SHA-1 hash function is…”
Get full text
Conference Proceeding -
18
Temporal and System Level Modifications for High Speed VLSI Implementations of Cryptographic Core
Published in 2006 13th IEEE International Conference on Electronics, Circuits and Systems (01-12-2006)“…Hash functions are forming a special family of cryptographic algorithms, which are applied wherever message integrity and authentication issues are critical…”
Get full text
Conference Proceeding -
19
Efficient Small-Sized Implementation of the Keyed-Hash Message Authentication Code
Published in EUROCON 2005 - The International Conference on "Computer as a Tool" (2005)“…A design approach to create small-sized highspeed implementations of the keyed-hash message authentication code (HMAC) is presented. The proposed…”
Get full text
Conference Proceeding -
20
High throughput implementation of the new secure hash algorithm through partial unrolling
Published in IEEE Workshop on Signal Processing Systems Design and Implementation, 2005 (2005)“…A design approach to create small-sized high-speed implementation of the new version of secure hash algorithm is proposed. The resulted design can be easily…”
Get full text
Conference Proceeding