H
H. E. Michail
Researcher at University of Patras
Publications - 9
Citations - 151
H. E. Michail is an academic researcher from University of Patras. The author has contributed to research in topics: Secure Hash Algorithm & Hash chain. The author has an hindex of 4, co-authored 9 publications receiving 145 citations.
Papers
More filters
Journal ArticleDOI
An RNS Implementation of an $F_{p}$ Elliptic Curve Point Multiplier
Dimitrios Schinianakis,Apostolos P. Fournaris,H. E. Michail,Athanasios Kakarountas,Thanos Stouraitis +4 more
TL;DR: A hardware architecture of an elliptic Curve point multiplier is proposed that exploits the intrinsic parallelism of the residue number system (RNS), in order to speed up the elliptic curve point calculations and minimize the area complexity of the elliptIC curve point multiplier.
Journal ArticleDOI
High-Speed FPGA Implementation of Secure Hash Algorithm for IPSec and VPN Applications
TL;DR: A novel FPGA implementation of the Secure Hash Algorithm 1 (SHA-1) is proposed, which exploits the benefits of pipeline and re-timing of execution through pre-computation of intermediate temporal values.
Proceedings ArticleDOI
A novel high-throughput implementation of a partially unrolled SHA-512
Fotis Aisopos,Konstantinos Aisopos,Dimitrios Schinianakis,H. E. Michail,Athanasios Kakarountas +4 more
TL;DR: A design approach to create small-sized high-speed implementation of the new version of secure hash algorithm can be easily embedded to operate in HMAC IP cores, providing a high degree of security.
Proceedings ArticleDOI
Application of novel technique in RIPEMD-160 aiming at high-throughput
H. E. Michail,V.N. Thnanasoulis,Dimitrios Schinianakis,G.A. Panagiotakopoulos,Constantinos E. Goutis +4 more
TL;DR: This paper proposes an implementation that increases throughput and frequency significantly and at the same time keeps the area small enough for the hash function RIPEMD-160, which is emanated from the necessity for existence of very strong algorithms in cryptanalysis.
High-speed and low-power implementation of hash message authentication code through partially unrolled techniques
TL;DR: An efficient implementation of the keyed-hash message authentication code (HMAC) using the SHA-256 hash function is presented, leading to a high-throughput and low-power implementation for the whole HMAC construction.