scispace - formally typeset
A

Athanasios Kakarountas

Researcher at University of Thessaly

Publications -  114
Citations -  853

Athanasios Kakarountas is an academic researcher from University of Thessaly. The author has contributed to research in topics: Hash function & Throughput (business). The author has an hindex of 15, co-authored 103 publications receiving 735 citations. Previous affiliations of Athanasios Kakarountas include University of Patras & American Hotel & Lodging Educational Institute.

Papers
More filters
Journal ArticleDOI

An RNS Implementation of an $F_{p}$ Elliptic Curve Point Multiplier

TL;DR: A hardware architecture of an elliptic Curve point multiplier is proposed that exploits the intrinsic parallelism of the residue number system (RNS), in order to speed up the elliptic curve point calculations and minimize the area complexity of the elliptIC curve point multiplier.
Proceedings ArticleDOI

Efficient high-performance ASIC implementation of JPEG-LS encoder

TL;DR: The proposed implementation consists of an efficient pipelined JPEG- LS encoder, which operates at a significantly higher encoding rate than any other JPEG-LS hardware or software implementation while keeping area small.
Proceedings ArticleDOI

A new approach to elliptic curve cryptography: an RNS architecture

TL;DR: A VLSI residue number system (RNS) architecture of an ECPM is presented and it is shown that such an application is feasible and that it leads to a significant improvement in the execution time of a scalar point multiplication.
Proceedings ArticleDOI

Efficient implementation of the keyed-hash message authentication code (HMAC) using the SHA-1 hash function

TL;DR: An efficient implementation, in terms of performance, of the keyed-hash message authentication code (HMAC) using the SHA-1 hash function is presented and can be synthesized easily for a variety of FPGA and ASIC technologies.
Journal ArticleDOI

A Top-Down Design Methodology for Ultrahigh-Performance Hashing Cores

TL;DR: In this work, a new methodology is presented for achieving high operating frequency and throughput for the implementations of all widely used-and those expected to be used in the near future-hash functions such as MD-5, SHA-1, RIPEMD (all versions), SHA-256,SHA-384, SHA -512, and so forth.