Search Results - "Milidonis, A.S."

  • Showing 1 - 2 results of 2
Refine Results
  1. 1

    A Top-Down Design Methodology for Ultrahigh-Performance Hashing Cores by Michail, H.E., Kakarountas, A.P., Milidonis, A.S., Goutis, C.E.

    “…Many cryptographic primitives that are used in cryptographic schemes and security protocols such as SET, PKI, IPSec, and VPNs utilize hash functions, which…”
    Get full text
    Journal Article
  2. 2

    Temporal and System Level Modifications for High Speed VLSI Implementations of Cryptographic Core by Michail, H.E., Kakarountas, A.P., Milidonis, A.S., Panagiotakopoulos, G.A., Thanasoulis, V.N., Goutis, C.E.

    “…Hash functions are forming a special family of cryptographic algorithms, which are applied wherever message integrity and authentication issues are critical…”
    Get full text
    Conference Proceeding