Author of the publication

Area-Throughput Trade-Offs for SHA-1 and SHA-256 Hash Functions' Pipelined Designs.

, , , , , and . Journal of Circuits, Systems, and Computers, 25 (4): 1650032:1-1650032:26 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

High-performance FPGA implementations of the cryptographic hash function JH., , , and . IET Comput. Digit. Tech., 7 (1): 29-40 (2013)Evolution of the e-Museum Concept through Exploitation of Cryptographic Algorithms., , , and . EuroMed, volume 7616 of Lecture Notes in Computer Science, page 291-300. Springer, (2012)Throughput Optimization of the Cipher Message Authentication Code., , , and . DSP, page 495-498. IEEE, (2007)High performance pipelined FPGA implementation of the SHA-3 hash algorithm., , and . MECO, page 68-71. IEEE, (2015)Pipelined SHA-3 Implementations on FPGA: Architecture and Performance Analysis., , and . CS2@HiPEAC, page 13-18. ACM, (2015)High-throughput Hardware Architectures of the JH Round-three SHA-3 Candidate - An FPGA Design and Implementation Approach., , , , , and . SECRYPT, page 126-135. SciTePress, (2012)Efficient implementation of the keyed-hash message authentication code (HMAC) using the SHA-1 hash function., , , and . ICECS, page 567-570. IEEE, (2004)VLSI design and implementation of reconfigurable cryptographic systems for symmetric encryption., , , and . ICECS, page 1-4. IEEE, (2005)Server side hashing core exceeding 3 Gbps of throughput., , , , and . Int. J. Secur. Networks, 2 (3/4): 228-238 (2007)Design and validation of an agent-based driving simulator., , , and . SummerSim, page 6:1-6:12. ACM, (2018)