Kakarountas, Athanasios Safety and Security for Shared Storage Media Journal Article In: Journal of Engineering Science and Technology Review, vol. 9, pp. 142-144, 2016. Links | BibTeX | Tags: Cryptography, security MICHAIL, HARRIS E; SCHINIANAKIS, DIMITRIOS; GOUTIS, COSTAS E; KAKAROUNTAS, ATHANASIOS P; SELIMIS, GEORGIOS Cipher Block based Authentication Module: A Hardware Design Perspective Journal Article In: Journal of Circuits, Systems and Computers, vol. 20, no. 02, pp. 163-184, 2011. Abstract | Links | BibTeX | Tags: Cryptography, Hardware, security, VLSI Kakarountas, Athanasios; Michail, Harris E; Goutis, Costas E; Rjoub, Abdoul M High-Throughput Implementation of the RIPEMD-160 Journal Article In: Int. J. Internet Technol. Secur. Syst., vol. 1, no. 3/4, pp. 309–316, 2009, ISSN: 1748-569X. Abstract | Links | BibTeX | Tags: Cryptography, security, VLSI Schinianakis, D M; Fournaris, A P; Michail, H E; Kakarountas, A P; Stouraitis, T An RNS Implementation of an $F_p$ Elliptic Curve Point Multiplier Journal Article In: IEEE Transactions on Circuits and Systems I: Regular Papers, vol. 56, no. 6, pp. 1202-1213, 2009. Links | BibTeX | Tags: Algorithms, Cryptography, Hardware, security Michail, H; Kakarountas, A; Milidonis, A; Goutis, C A Top-Down Design Methodology for Ultrahigh-Performance Hashing Cores Journal Article In: IEEE Transactions on Dependable and Secure Computing, vol. 6, no. 4, pp. 255-268, 2009. Links | BibTeX | Tags: Cryptography, Hardware Accelerator, security Kakarountas, Athanasios; Michail, Harris Performance for Cryptography: hardware and software approach Book Chapter In: pp. 403-418, 2008, ISBN: 978-1-60456-186-9. BibTeX | Tags: Circuits, Cryptography, Hardware, Hardware Accelerator, security
2016
@article{articleb,
title = {Safety and Security for Shared Storage Media},
author = {Athanasios Kakarountas},
doi = {10.25103/jestr.095.22},
year = {2016},
date = {2016-01-01},
journal = {Journal of Engineering Science and Technology Review},
volume = {9},
pages = {142-144},
keywords = {Cryptography, security},
pubstate = {published},
tppubtype = {article}
}
2011
@article{doi:10.1142/S0218126611007189,
title = {Cipher Block based Authentication Module: A Hardware Design Perspective},
author = {HARRIS E MICHAIL and DIMITRIOS SCHINIANAKIS and COSTAS E GOUTIS and ATHANASIOS P KAKAROUNTAS and GEORGIOS SELIMIS},
url = {https://doi.org/10.1142/S0218126611007189},
doi = {10.1142/S0218126611007189},
year = {2011},
date = {2011-01-01},
journal = {Journal of Circuits, Systems and Computers},
volume = {20},
number = {02},
pages = {163-184},
abstract = {Message Authentication Codes (MACs) are widely used in order to authenticate data packets, which are transmitted thought networks. Typically MACs are implemented using modules like hash functions and in conjunction with encryption algorithms (like Block Ciphers), which are used to encrypt the transmitted data. However NIST in May 2005 issued a standard, addressing certain applications and their needs, defining a way to implement MACs through FIPS-approved and secure block cipher algorithms. In this paper the best performing implementation of the CMAC standard is presented, in terms of throughput, along with an efficient AES design and implementation.},
keywords = {Cryptography, Hardware, security, VLSI},
pubstate = {published},
tppubtype = {article}
}
2009
@article{10.1504/IJITST.2009.023910,
title = {High-Throughput Implementation of the RIPEMD-160},
author = {Athanasios Kakarountas and Harris E Michail and Costas E Goutis and Abdoul M Rjoub},
url = {https://doi.org/10.1504/IJITST.2009.023910},
doi = {10.1504/IJITST.2009.023910},
issn = {1748-569X},
year = {2009},
date = {2009-01-01},
journal = {Int. J. Internet Technol. Secur. Syst.},
volume = {1},
number = {3/4},
pages = {309–316},
publisher = {Inderscience Publishers},
address = {Geneva 15, CHE},
abstract = {One-way hash functions are the main cryptographic primitives which are used in the network protocols for user authentication and message integration. In the literature, implementations have been proposed either in hardware or software. The rich number of implementations is expected considering the number of constraints of a target application. When the target is to service more and more users-clients and thus the increase of their throughput, a hardware accelerator is dictated. In this paper, RIPEMD-160 hash function is considered and a technique to increase its throughput. This technique involves the application of algorithmic transformations in space and time. The proposed technique leads to an increased throughput by 35% when compared to conventional implementations.},
keywords = {Cryptography, security, VLSI},
pubstate = {published},
tppubtype = {article}
}
@article{4663678b,
title = {An RNS Implementation of an $F_p$ Elliptic Curve Point Multiplier},
author = {D M Schinianakis and A P Fournaris and H E Michail and A P Kakarountas and T Stouraitis},
doi = {10.1109/TCSI.2008.2008507},
year = {2009},
date = {2009-01-01},
journal = {IEEE Transactions on Circuits and Systems I: Regular Papers},
volume = {56},
number = {6},
pages = {1202-1213},
keywords = {Algorithms, Cryptography, Hardware, security},
pubstate = {published},
tppubtype = {article}
}
@article{4479486,
title = {A Top-Down Design Methodology for Ultrahigh-Performance Hashing Cores},
author = {H Michail and A Kakarountas and A Milidonis and C Goutis},
doi = {10.1109/TDSC.2008.15},
year = {2009},
date = {2009-01-01},
journal = {IEEE Transactions on Dependable and Secure Computing},
volume = {6},
number = {4},
pages = {255-268},
keywords = {Cryptography, Hardware Accelerator, security},
pubstate = {published},
tppubtype = {article}
}
2008
@inbook{inbookb,
title = {Performance for Cryptography: hardware and software approach},
author = {Athanasios Kakarountas and Harris Michail},
isbn = {978-1-60456-186-9},
year = {2008},
date = {2008-01-01},
pages = {403-418},
keywords = {Circuits, Cryptography, Hardware, Hardware Accelerator, security},
pubstate = {published},
tppubtype = {inbook}
}
Safety and Security for Shared Storage Media Journal Article In: Journal of Engineering Science and Technology Review, vol. 9, pp. 142-144, 2016. Cipher Block based Authentication Module: A Hardware Design Perspective Journal Article In: Journal of Circuits, Systems and Computers, vol. 20, no. 02, pp. 163-184, 2011. High-Throughput Implementation of the RIPEMD-160 Journal Article In: Int. J. Internet Technol. Secur. Syst., vol. 1, no. 3/4, pp. 309–316, 2009, ISSN: 1748-569X. An RNS Implementation of an $F_p$ Elliptic Curve Point Multiplier Journal Article In: IEEE Transactions on Circuits and Systems I: Regular Papers, vol. 56, no. 6, pp. 1202-1213, 2009. A Top-Down Design Methodology for Ultrahigh-Performance Hashing Cores Journal Article In: IEEE Transactions on Dependable and Secure Computing, vol. 6, no. 4, pp. 255-268, 2009. Performance for Cryptography: hardware and software approach Book Chapter In: pp. 403-418, 2008, ISBN: 978-1-60456-186-9.
2016
2011
2009
2008
