A
Athanasios Kakarountas
Researcher at University of Thessaly
Publications - 114
Citations - 853
Athanasios Kakarountas is an academic researcher from University of Thessaly. The author has contributed to research in topics: Hash function & Throughput (business). The author has an hindex of 15, co-authored 103 publications receiving 735 citations. Previous affiliations of Athanasios Kakarountas include University of Patras & American Hotel & Lodging Educational Institute.
Papers
More filters
Journal ArticleDOI
An RNS Implementation of an $F_{p}$ Elliptic Curve Point Multiplier
Dimitrios Schinianakis,Apostolos P. Fournaris,H. E. Michail,Athanasios Kakarountas,Thanos Stouraitis +4 more
TL;DR: A hardware architecture of an elliptic Curve point multiplier is proposed that exploits the intrinsic parallelism of the residue number system (RNS), in order to speed up the elliptic curve point calculations and minimize the area complexity of the elliptIC curve point multiplier.
Proceedings ArticleDOI
Efficient high-performance ASIC implementation of JPEG-LS encoder
TL;DR: The proposed implementation consists of an efficient pipelined JPEG- LS encoder, which operates at a significantly higher encoding rate than any other JPEG-LS hardware or software implementation while keeping area small.
Proceedings ArticleDOI
A new approach to elliptic curve cryptography: an RNS architecture
TL;DR: A VLSI residue number system (RNS) architecture of an ECPM is presented and it is shown that such an application is feasible and that it leads to a significant improvement in the execution time of a scalar point multiplication.
Proceedings ArticleDOI
Efficient implementation of the keyed-hash message authentication code (HMAC) using the SHA-1 hash function
TL;DR: An efficient implementation, in terms of performance, of the keyed-hash message authentication code (HMAC) using the SHA-1 hash function is presented and can be synthesized easily for a variety of FPGA and ASIC technologies.
Journal ArticleDOI
A Top-Down Design Methodology for Ultrahigh-Performance Hashing Cores
TL;DR: In this work, a new methodology is presented for achieving high operating frequency and throughput for the implementations of all widely used-and those expected to be used in the near future-hash functions such as MD-5, SHA-1, RIPEMD (all versions), SHA-256,SHA-384, SHA -512, and so forth.