Search Results - "Milidonis, A.S."
-
1
A Top-Down Design Methodology for Ultrahigh-Performance Hashing Cores
Published in IEEE transactions on dependable and secure computing (01-10-2009)“…Many cryptographic primitives that are used in cryptographic schemes and security protocols such as SET, PKI, IPSec, and VPNs utilize hash functions, which…”
Get full text
Journal Article -
2
Temporal and System Level Modifications for High Speed VLSI Implementations of Cryptographic Core
Published in 2006 13th IEEE International Conference on Electronics, Circuits and Systems (01-12-2006)“…Hash functions are forming a special family of cryptographic algorithms, which are applied wherever message integrity and authentication issues are critical…”
Get full text
Conference Proceeding