Search Results - "Kakarountas, A.P"

Refine Results
  1. 1

    A Top-Down Design Methodology for Ultrahigh-Performance Hashing Cores by Michail, H.E., Kakarountas, A.P., Milidonis, A.S., Goutis, C.E.

    “…Many cryptographic primitives that are used in cryptographic schemes and security protocols such as SET, PKI, IPSec, and VPNs utilize hash functions, which…”
    Get full text
    Journal Article
  2. 2

    Maximizing the hash function of authentication codes by Yiakoumis, I.I., Papadonikolakis, M.E., Michail, H.E., Kakarountas, A.P., Goutis, C.E.

    Published in IEEE potentials (01-03-2006)
    “…A design approach to create small-sized, high-speed implementations of the keyed-hash message authentication code (HMAC) is the focus of this article. The…”
    Get full text
    Journal Article
  3. 3

    A low-power and high-throughput implementation of the SHA-1 hash function by Michail, H., Kakarountas, A.P., Koufopavlou, O., Goutis, C.E.

    “…The main applications of the hash functions are met in the fields of communication integrity and signature authentication. A hash function is utilized in the…”
    Get full text
    Conference Proceeding
  4. 4

    An RNS Implementation of an [Formula Omitted] Elliptic Curve Point Multiplier by Schinianakis, D.M, Fournaris, A.P, Michail, H.E, Kakarountas, A.P, Stouraitis, T

    “…Designs for elliptic curve cryptography point multiplication are area demanding and time consuming. [...] the efficient realization of point multiplication is…”
    Get full text
    Journal Article
  5. 5

    Efficient High-Performance ASIC Implementation of JPEG-LS Encoder by Papadonikolakis, M., Pantazis, V., Kakarountas, A.P.

    “…This paper introduces an innovative design which implements a high-performance JPEG-LS encoder. The encoding process follows the principles of the JPEG-LS…”
    Get full text
    Conference Proceeding
  6. 6

    An RNS Implementation of an F Elliptic Curve Point Multiplier by Schinianakis, D.M., Fournaris, A.P., Michail, H.E., Kakarountas, A.P., Stouraitis, T.

    “…Elliptic curve point multiplication is considered to be the most significant operation in all elliptic curve cryptography systems, as it forms the basis of the…”
    Get full text
    Journal Article
  7. 7

    An RNS architecture of an F/sub p/ elliptic curve point multiplier by Schinianakis, D.M., Fournaris, A.P., Kakarountas, A.P., Stouraitis, T.

    “…An elliptic curve point multiplier (ECPM) is the main part of all elliptic curve cryptography (ECC) systems and its performance is decisive for the performance…”
    Get full text
    Conference Proceeding
  8. 8

    Implementation of HSSec: a High-Speed Cryptographic Co-Processor by Kakarountas, A.P., Michail, H., Goutis, C.E., Efstathiou, C.

    “…In this paper a high-speed cryptographic coprocessor, named HSSec, is presented. The core embeds two hash functions, SHA-1 and SHA-512, and the symmetric block…”
    Get full text
    Conference Proceeding
  9. 9

    A Decoupled Architecture of Processors with Scratch-Pad Memory Hierarchy by Milidonis, A., Alachiotis, N., Porpodas, V., Michail, H., Kakarountas, A.P., Goutis, C.E.

    “…This paper present a decoupled architecture of processors with a memory hierarchy of only scratch-pad memories, and a main memory. The decoupled architecture…”
    Get full text
    Conference Proceeding
  10. 10

    A new approach to elliptic curve cryptography: an RNS architecture by Schinianakis, D.M., Kakarountas, A.P., Stouraitis, T.

    “…An elliptic curve point multiplier (ECPM) is the main part of all elliptic curve cryptography (ECC) systems and its performance is decisive for the performance…”
    Get full text
    Conference Proceeding
  11. 11

    High-Speed FPGA Implementation of the SHA-1 Hash Function by Kakarountas, A.P., Theodoridis, G., Laopoulos, T., Goutis, C.E.

    “…The main applications of the Hash functions lie in the fields of communication integrity and authentication. In every communication protocol, especially in…”
    Get full text
    Conference Proceeding
  12. 12

    COSAFE:efficient safety-critical portable system design approach by Kakarountas, A.P., Spiliotopoulos, V., Nikolaidis, S., Goutis, C.E.

    “…Safety-critical systems are becoming quite common nowadays, especially in medical and transportation applications. The targeted safe operation levels of this…”
    Get full text
    Conference Proceeding
  13. 13

    Throughput Optimization of the Cipher Message Authentication Code by Michail, H.E., Kakarountas, A.P., Selimis, G., Goutis, C.E.

    “…A new algorithm for producing message authenticating code (MAC) was recently proposed by NIST. The MAC protects both a message's integrity - by ensuring that a…”
    Get full text
    Conference Proceeding
  14. 14

    Confronting violations of the TSCG(T) in low-power design by Kakarountas, A.P., Papadomanolakis, K.S., Nikolaidis, S., Soudris, D., Goutis, C.

    “…The degradation of the Totally Self-Checking Goal (TSCG) on Totally Self-Checking (TSC) units caused by the application of low-power techniques is explored…”
    Get full text
    Conference Proceeding
  15. 15

    A high-throughput area efficient FPGA implementation of AES-128 Encryption by Brokalakis, A., Kakarountas, A.P., Goutis, C.E.

    “…Advanced Encryption Standard (AES) is used nowadays extensively in many network and multimedia applications to address security issues. In this paper, a high…”
    Get full text
    Conference Proceeding
  16. 16

    A novel high-throughput implementation of a partially unrolled SHA-512 by Aisopos, F., Aisopos, K., Schinianakis, D., Michail, H., Kakarountas, A.P.

    “…A design approach to create small-sized high-speed implementation of the new version of secure hash algorithm is proposed. The resulted design can be easily…”
    Get full text
    Conference Proceeding
  17. 17

    Efficient implementation of the keyed-hash message authentication code (HMAC) using the SHA-1 hash function by Michail, H.E., Kakarountas, A.P., Milidonis, A., Goutis, C.E.

    “…In this paper, an efficient implementation, in terms of performance, of the keyed-hash message authentication code (HMAC) using the SHA-1 hash function is…”
    Get full text
    Conference Proceeding
  18. 18

    Temporal and System Level Modifications for High Speed VLSI Implementations of Cryptographic Core by Michail, H.E., Kakarountas, A.P., Milidonis, A.S., Panagiotakopoulos, G.A., Thanasoulis, V.N., Goutis, C.E.

    “…Hash functions are forming a special family of cryptographic algorithms, which are applied wherever message integrity and authentication issues are critical…”
    Get full text
    Conference Proceeding
  19. 19

    Efficient Small-Sized Implementation of the Keyed-Hash Message Authentication Code by Yiakoumis, I., Papadonikolakis, M., Michail, H., Kakarountas, A.P., Goutis, C.E.

    “…A design approach to create small-sized highspeed implementations of the keyed-hash message authentication code (HMAC) is presented. The proposed…”
    Get full text
    Conference Proceeding
  20. 20

    High throughput implementation of the new secure hash algorithm through partial unrolling by Aisopos, K., Kakarountas, A.P., Michail, H., Goutis, C.E.

    “…A design approach to create small-sized high-speed implementation of the new version of secure hash algorithm is proposed. The resulted design can be easily…”
    Get full text
    Conference Proceeding