On the exploitation of a high-throughput SHA-256 FPGA design for HMAC HE Michail, GS Athanasiou, V Kelefouras, G Theodoridis, CE Goutis ACM Transactions on Reconfigurable Technology and Systems (TRETS) 5 (1), 1-28, 2012 | 54 | 2012 |
High throughput pipelined FPGA implementation of the new SHA-3 cryptographic hash algorithm GS Athanasiou, GP Makkas, G Theodoridis 2014 6th International Symposium on Communications, Control and Signal …, 2014 | 52 | 2014 |
Design and implementation of totally-self checking SHA-1 and SHA-256 hash functions’ architectures HE Michail, GS Athanasiou, G Theodoridis, A Gregoriades, CE Goutis Microprocessors and Microsystems 45, 227-240, 2016 | 40 | 2016 |
On the development of high-throughput and area-efficient multi-mode cryptographic hash designs in FPGAs HE Michail, GS Athanasiou, G Theodoridis, CE Goutis Integration 47 (4), 387-407, 2014 | 26 | 2014 |
Optimising the SHA‐512 cryptographic hash function on FPGAs GS Athanasiou, HE Michail, G Theodoridis, CE Goutis IET Computers & Digital Techniques 8 (2), 70-82, 2014 | 26 | 2014 |
A methodology for speeding up fast fourier transform focusing on memory architecture utilization VI Kelefouras, GS Athanasiou, N Alachiotis, HE Michail, AS Kritikakou, ... IEEE Transactions on Signal Processing 59 (12), 6217-6226, 2011 | 18 | 2011 |
Area-throughput trade-offs for SHA-1 and SHA-256 hash functions’ pipelined designs HE Michail, GS Athanasiou, VI Kelefouras, G Theodoridis, T Stouraitis, ... Journal of Circuits, Systems and Computers 25 (04), 1650032, 2016 | 17 | 2016 |
A data locality methodology for matrix–matrix multiplication algorithm N Alachiotis, VI Kelefouras, GS Athanasiou, HE Michail, AS Kritikakou, ... The Journal of Supercomputing 59, 830-851, 2012 | 17 | 2012 |
Ultra high speed SHA-256 hashing cryptographic module for ipsec hardware/software codesign H Michail, G Athanasiou, A Kritikakou, C Goutis, A Gregoriades, ... 2010 International Conference on Security and Cryptography (SECRYPT), 1-5, 2010 | 15 | 2010 |
High throughput hardware/software co-design approach for SHA-256 hashing cryptographic module in IPSec/IPv6 H Michail, GS Athanasiou, A Gregoriades, CL Panagiotou Global Journal of Computer Science and Technology 10 (4), 54-59, 2010 | 11 | 2010 |
Hardware implementation of the totally self-checking sha-256 hash core HE Michail, A Kotsiolis, A Kakarountas, G Athanasiou, C Goutis IEEE EUROCON 2015-International Conference on Computer as a Tool (EUROCON), 1-5, 2015 | 8 | 2015 |
Evaluation of virtual learning communities for supporting e-learning in the healthcare domain G Athanasiou, N Maris, I Apostolakis J Inf Technol Healthc 7, 187-92, 2009 | 7 | 2009 |
Near-optimal microprocessor and accelerators codesign with latency and throughput constraints A Kritikakou, F Catthoor, GS Athanasiou, V Kelefouras, C Goutis ACM Transactions on Architecture and Code Optimization (TACO) 10 (2), 1-25, 2013 | 5 | 2013 |
Development of a novel energy management strategy for hybrid electric vehicles S Tsotoulidis, G Athanasiou, E Mitronikas 2014 international conference on electrical machines (ICEM), 2417-2423, 2014 | 4 | 2014 |
High‐performance FPGA implementations of the cryptographic hash function JH GS Athanasiou, HE Michail, G Theodoridis, CE Goutis IET Computers & Digital Techniques 7 (1), 29-40, 2013 | 4 | 2013 |
A template-based methodology for efficient microprocessor and FPGA accelerator co-design A Kritikakou, F Catthoor, GS Athanasiou, V Kelefouras, C Goutis 2012 International Conference on Embedded Computer Systems (SAMOS), 15-22, 2012 | 4 | 2012 |
An evaluation of E-learning in healthcare G Athanasiou, N Maris, I Apostolakis E-health systems quality and reliability: models and standards, 183-203, 2011 | 3 | 2011 |
Securing 5G/6G Communications in Smart Cities: Novel SNOW-V/ZUC-256 Multimode Architectures E Konstantopoulou, GS Athanasiou, N Sklavos 2023 Congress in Computer Science, Computer Engineering, & Applied Computing …, 2023 | 2 | 2023 |
A systematic flow for developing totally self-checking architectures for SHA-1 and SHA-2 cryptographic hash families GS Athanasiou, G Theodoridis, CE Goutis, HE Michail, T Kasparis Journal of Circuits, Systems and Computers 22 (06), 1350049, 2013 | 2 | 2013 |
THROUGHPUT/AREA TRADE-OFFS OF LOOP-UNROLLING, FUNCTIONAL, AND STRUCTURAL PIPELINE FOR SKEIN HASH FUNCTION GS Athanasiou, E Tsingkas, HE Michail, G Theodoridis, CE Goutis Computer Science & Engineering 3 (1), 1, 2013 | 2 | 2013 |