2011
MICHAIL, HARRIS E; SCHINIANAKIS, DIMITRIOS; GOUTIS, COSTAS E; KAKAROUNTAS, ATHANASIOS P; SELIMIS, GEORGIOS
Cipher Block based Authentication Module: A Hardware Design Perspective Journal Article
In: Journal of Circuits, Systems and Computers, vol. 20, no. 02, pp. 163-184, 2011.
Abstract | Links | BibTeX | Tags: Cryptography, Hardware, security, VLSI
@article{doi:10.1142/S0218126611007189,
title = {Cipher Block based Authentication Module: A Hardware Design Perspective},
author = {HARRIS E MICHAIL and DIMITRIOS SCHINIANAKIS and COSTAS E GOUTIS and ATHANASIOS P KAKAROUNTAS and GEORGIOS SELIMIS},
url = {https://doi.org/10.1142/S0218126611007189},
doi = {10.1142/S0218126611007189},
year = {2011},
date = {2011-01-01},
journal = {Journal of Circuits, Systems and Computers},
volume = {20},
number = {02},
pages = {163-184},
abstract = {Message Authentication Codes (MACs) are widely used in order to authenticate data packets, which are transmitted thought networks. Typically MACs are implemented using modules like hash functions and in conjunction with encryption algorithms (like Block Ciphers), which are used to encrypt the transmitted data. However NIST in May 2005 issued a standard, addressing certain applications and their needs, defining a way to implement MACs through FIPS-approved and secure block cipher algorithms. In this paper the best performing implementation of the CMAC standard is presented, in terms of throughput, along with an efficient AES design and implementation.},
keywords = {Cryptography, Hardware, security, VLSI},
pubstate = {published},
tppubtype = {article}
}
2009
Kakarountas, Athanasios; Michail, Harris E; Goutis, Costas E; Rjoub, Abdoul M
High-Throughput Implementation of the RIPEMD-160 Journal Article
In: Int. J. Internet Technol. Secur. Syst., vol. 1, no. 3/4, pp. 309–316, 2009, ISSN: 1748-569X.
Abstract | Links | BibTeX | Tags: Cryptography, security, VLSI
@article{10.1504/IJITST.2009.023910,
title = {High-Throughput Implementation of the RIPEMD-160},
author = {Athanasios Kakarountas and Harris E Michail and Costas E Goutis and Abdoul M Rjoub},
url = {https://doi.org/10.1504/IJITST.2009.023910},
doi = {10.1504/IJITST.2009.023910},
issn = {1748-569X},
year = {2009},
date = {2009-01-01},
journal = {Int. J. Internet Technol. Secur. Syst.},
volume = {1},
number = {3/4},
pages = {309–316},
publisher = {Inderscience Publishers},
address = {Geneva 15, CHE},
abstract = {One-way hash functions are the main cryptographic primitives which are used in the network protocols for user authentication and message integration. In the literature, implementations have been proposed either in hardware or software. The rich number of implementations is expected considering the number of constraints of a target application. When the target is to service more and more users-clients and thus the increase of their throughput, a hardware accelerator is dictated. In this paper, RIPEMD-160 hash function is considered and a technique to increase its throughput. This technique involves the application of algorithmic transformations in space and time. The proposed technique leads to an increased throughput by 35% when compared to conventional implementations.},
keywords = {Cryptography, security, VLSI},
pubstate = {published},
tppubtype = {article}
}
2002
Papadomanolakis, K S; Kakarountas, Athanasios; Sklavos, Nicolas; Goutis, C E
A Fast Johnson-Mobius Encoding Scheme for Fault Secure Binary Counters Proceedings Article
In: 2002.
BibTeX | Tags: Circuits, Safety, VLSI
@inproceedings{inproceedingsb,
title = {A Fast Johnson-Mobius Encoding Scheme for Fault Secure Binary Counters},
author = {K S Papadomanolakis and Athanasios Kakarountas and Nicolas Sklavos and C E Goutis},
year = {2002},
date = {2002-01-01},
keywords = {Circuits, Safety, VLSI},
pubstate = {published},
tppubtype = {inproceedings}
}
MICHAIL, HARRIS E; SCHINIANAKIS, DIMITRIOS; GOUTIS, COSTAS E; KAKAROUNTAS, ATHANASIOS P; SELIMIS, GEORGIOS
Cipher Block based Authentication Module: A Hardware Design Perspective Journal Article
In: Journal of Circuits, Systems and Computers, vol. 20, no. 02, pp. 163-184, 2011.
@article{doi:10.1142/S0218126611007189,
title = {Cipher Block based Authentication Module: A Hardware Design Perspective},
author = {HARRIS E MICHAIL and DIMITRIOS SCHINIANAKIS and COSTAS E GOUTIS and ATHANASIOS P KAKAROUNTAS and GEORGIOS SELIMIS},
url = {https://doi.org/10.1142/S0218126611007189},
doi = {10.1142/S0218126611007189},
year = {2011},
date = {2011-01-01},
journal = {Journal of Circuits, Systems and Computers},
volume = {20},
number = {02},
pages = {163-184},
abstract = {Message Authentication Codes (MACs) are widely used in order to authenticate data packets, which are transmitted thought networks. Typically MACs are implemented using modules like hash functions and in conjunction with encryption algorithms (like Block Ciphers), which are used to encrypt the transmitted data. However NIST in May 2005 issued a standard, addressing certain applications and their needs, defining a way to implement MACs through FIPS-approved and secure block cipher algorithms. In this paper the best performing implementation of the CMAC standard is presented, in terms of throughput, along with an efficient AES design and implementation.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
Kakarountas, Athanasios; Michail, Harris E; Goutis, Costas E; Rjoub, Abdoul M
High-Throughput Implementation of the RIPEMD-160 Journal Article
In: Int. J. Internet Technol. Secur. Syst., vol. 1, no. 3/4, pp. 309–316, 2009, ISSN: 1748-569X.
@article{10.1504/IJITST.2009.023910,
title = {High-Throughput Implementation of the RIPEMD-160},
author = {Athanasios Kakarountas and Harris E Michail and Costas E Goutis and Abdoul M Rjoub},
url = {https://doi.org/10.1504/IJITST.2009.023910},
doi = {10.1504/IJITST.2009.023910},
issn = {1748-569X},
year = {2009},
date = {2009-01-01},
journal = {Int. J. Internet Technol. Secur. Syst.},
volume = {1},
number = {3/4},
pages = {309–316},
publisher = {Inderscience Publishers},
address = {Geneva 15, CHE},
abstract = {One-way hash functions are the main cryptographic primitives which are used in the network protocols for user authentication and message integration. In the literature, implementations have been proposed either in hardware or software. The rich number of implementations is expected considering the number of constraints of a target application. When the target is to service more and more users-clients and thus the increase of their throughput, a hardware accelerator is dictated. In this paper, RIPEMD-160 hash function is considered and a technique to increase its throughput. This technique involves the application of algorithmic transformations in space and time. The proposed technique leads to an increased throughput by 35% when compared to conventional implementations.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
Papadomanolakis, K S; Kakarountas, Athanasios; Sklavos, Nicolas; Goutis, C E
A Fast Johnson-Mobius Encoding Scheme for Fault Secure Binary Counters Proceedings Article
In: 2002.
@inproceedings{inproceedingsb,
title = {A Fast Johnson-Mobius Encoding Scheme for Fault Secure Binary Counters},
author = {K S Papadomanolakis and Athanasios Kakarountas and Nicolas Sklavos and C E Goutis},
year = {2002},
date = {2002-01-01},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
