Search Results - "Koufopavlou, O."
-
1
Architectures and VLSI implementations of the AES-Proposal Rijndael
Published in IEEE transactions on computers (01-12-2002)“…Two architectures and VLSI implementations of the AES Proposal, Rijndael, are presented in this paper. These alternative architectures are operated both for…”
Get full text
Journal Article -
2
Implementation of the SHA-2 Hash family standard using FPGAs
Published in The Journal of supercomputing (01-03-2005)Get full text
Journal Article -
3
Versatile multiplier architectures in GF ( 2 k ) fields using the Montgomery multiplication algorithm
Published in Integration (Amsterdam) (01-05-2008)“…Many sequential multipliers for polynomial basis GF ( 2 k ) fields have been proposed using the LSbit and MSbit multiplication algorithm. However, all those…”
Get full text
Journal Article -
4
Software and Hardware Issues in Smart Card Technology
Published in IEEE Communications surveys and tutorials (01-01-2009)“…An efficient and strongly secure smart card mechanism involves the use of a technological background taken from the fields of computers, VLSI design and…”
Get full text
Journal Article -
5
Analytical transient response and propagation delay evaluation of the CMOS inverter for short-channel devices
Published in IEEE journal of solid-state circuits (01-02-1998)“…In this paper an accurate, analytical model for the evaluation of the CMOS inverter transient response and propagation delay for short-channel devices is…”
Get full text
Journal Article -
6
High Speed Networking Security: Design and Implementation of Two New DDP-Based Ciphers
Published in Mobile networks and applications (01-02-2005)“…Using Data-Dependent (DD) Permutations (DDP) as main cryptographic primitive two new ciphers are presented: ten-round Cobra-H64, and twelve-round Cobra-H128…”
Get full text
Journal Article -
7
Efficient architecture and hardware implementation of the Whirlpool hash function
Published in IEEE transactions on consumer electronics (01-02-2004)“…The latest cryptographical applications demand both high speed and high security. In this paper, an architecture and VLSI implementation of the newest powerful…”
Get full text
Journal Article -
8
Applying systolic multiplication–inversion architectures based on modified extended Euclidean algorithm for GF(2 k ) in elliptic curve cryptography
Published in Computers & electrical engineering (01-09-2007)“…Elliptic curve cryptography is a very promising cryptographic method offering the same security level as traditional public key cryptosystems (RSA, El Gamal)…”
Get full text
Journal Article -
9
Full custom low-power/high performance DDP-based Cobra-H64 cipher
Published in Computers & electrical engineering (2010)“…This paper presents, for the first time, a full custom layout design for a Data Dependent Permutation (DDP)-Cobra H64-bit cipher, using pipelining techniques…”
Get full text
Journal Article -
10
On the hardware implementation of RIPEMD processor: Networking high speed hashing, up to 2 Gbps
Published in Computers & electrical engineering (01-09-2005)“…The continued growth of both wired and wireless communications has triggered the revolution for high speed security implementations. RIPEMD hash functions are…”
Get full text
Journal Article -
11
Design, architecture and performance evaluation of the wireless transport layer security
Published in The Journal of supercomputing (01-04-2006)Get full text
Journal Article -
12
Exploring the FPGA Implementations of the LBlock, Piccolo, Twine, and Klein Ciphers
Published in 2020 IFIP/IEEE 28th International Conference on Very Large Scale Integration (VLSI-SOC) (05-10-2020)“…In this work, the implementations of the LBlock, Piccolo, Twine, and Klein lightweight ciphers in FPGA technology are studied in terms of area, frequency,…”
Get full text
Conference Proceeding -
13
Hardware implementation of Bluetooth security
Published in IEEE pervasive computing (01-01-2003)“…Bluetooth can implement its security layer's key-generation mechanism and authentication in software or hardware. Software implementation usually satisfies…”
Get full text
Journal Article -
14
On the hardware implementation of RIPEMD processor: Networking high speed hashing, up to 2Gbps
Published in Computers & electrical engineering (01-09-2005)“…The continued growth of both wired and wireless communications has triggered the revolution for high speed security implementations. RIPEMD hash functions are…”
Get full text
Journal Article -
15
A new RSA encryption architecture and hardware implementation based on optimized Montgomery multiplication
Published in 2005 IEEE International Symposium on Circuits and Systems (ISCAS) (2005)“…RSA is a widely acceptable and well used algorithm in many security applications. Its main mathematical function is the demanding, in terms of speed, operation…”
Get full text
Conference Proceeding -
16
Data dependent rotations, a trustworthy approach for future encryption systems/ciphers: low cost and high performance
Published in Computers & security (01-01-2003)“…This work focuses an alternative direction of cryptography, based on Data Dependent Rotations (DDR). This methodology gives many promises for secure…”
Get full text
Journal Article -
17
Hardware implementation of the RC4 stream cipher
Published in 2003 46th Midwest Symposium on Circuits and Systems (2003)“…In this paper, an efficient hardware implementation of the RC4 stream-cipher is proposed. In contrary to previous designs, which support only fixed length key,…”
Get full text
Conference Proceeding -
18
A Low-Cost Inband FEC Scheme for SONET/SDH Optical Metro Networks
Published in IEEE photonics technology letters (15-12-2006)“…A novel inband forward-error correction (FEC) method, devised for the electronic-mitigation of physical optical transmission impairments, is implemented and…”
Get full text
Journal Article -
19
64-bit Block ciphers: hardware implementations and comparison analysis
Published in Computers & electrical engineering (01-11-2004)“…A performance comparison for the 64-bit block cipher (Triple-DES, IDEA, CAST-128, MISTY1, and KHAZAD) FPGA hardware implementations is given in this paper. All…”
Get full text
Journal Article -
20
A low-power and high-throughput implementation of the SHA-1 hash function
Published in 2005 IEEE International Symposium on Circuits and Systems (ISCAS) (2005)“…The main applications of the hash functions are met in the fields of communication integrity and signature authentication. A hash function is utilized in the…”
Get full text
Conference Proceeding