Follow
George S. Athanasiou
George S. Athanasiou
Manager of (Security) IC Design, u-blox Athens S.A.
Verified email at u-blox.com - Homepage
Title
Cited by
Cited by
Year
On the exploitation of a high-throughput SHA-256 FPGA design for HMAC
HE Michail, GS Athanasiou, V Kelefouras, G Theodoridis, CE Goutis
ACM Transactions on Reconfigurable Technology and Systems (TRETS) 5 (1), 1-28, 2012
542012
High throughput pipelined FPGA implementation of the new SHA-3 cryptographic hash algorithm
GS Athanasiou, GP Makkas, G Theodoridis
2014 6th International Symposium on Communications, Control and Signal …, 2014
522014
Design and implementation of totally-self checking SHA-1 and SHA-256 hash functions’ architectures
HE Michail, GS Athanasiou, G Theodoridis, A Gregoriades, CE Goutis
Microprocessors and Microsystems 45, 227-240, 2016
402016
On the development of high-throughput and area-efficient multi-mode cryptographic hash designs in FPGAs
HE Michail, GS Athanasiou, G Theodoridis, CE Goutis
Integration 47 (4), 387-407, 2014
262014
Optimising the SHA‐512 cryptographic hash function on FPGAs
GS Athanasiou, HE Michail, G Theodoridis, CE Goutis
IET Computers & Digital Techniques 8 (2), 70-82, 2014
262014
A methodology for speeding up fast fourier transform focusing on memory architecture utilization
VI Kelefouras, GS Athanasiou, N Alachiotis, HE Michail, AS Kritikakou, ...
IEEE Transactions on Signal Processing 59 (12), 6217-6226, 2011
182011
Area-throughput trade-offs for SHA-1 and SHA-256 hash functions’ pipelined designs
HE Michail, GS Athanasiou, VI Kelefouras, G Theodoridis, T Stouraitis, ...
Journal of Circuits, Systems and Computers 25 (04), 1650032, 2016
172016
A data locality methodology for matrix–matrix multiplication algorithm
N Alachiotis, VI Kelefouras, GS Athanasiou, HE Michail, AS Kritikakou, ...
The Journal of Supercomputing 59, 830-851, 2012
172012
Ultra high speed SHA-256 hashing cryptographic module for ipsec hardware/software codesign
H Michail, G Athanasiou, A Kritikakou, C Goutis, A Gregoriades, ...
2010 International Conference on Security and Cryptography (SECRYPT), 1-5, 2010
152010
High throughput hardware/software co-design approach for SHA-256 hashing cryptographic module in IPSec/IPv6
H Michail, GS Athanasiou, A Gregoriades, CL Panagiotou
Global Journal of Computer Science and Technology 10 (4), 54-59, 2010
112010
Hardware implementation of the totally self-checking sha-256 hash core
HE Michail, A Kotsiolis, A Kakarountas, G Athanasiou, C Goutis
IEEE EUROCON 2015-International Conference on Computer as a Tool (EUROCON), 1-5, 2015
82015
Evaluation of virtual learning communities for supporting e-learning in the healthcare domain
G Athanasiou, N Maris, I Apostolakis
J Inf Technol Healthc 7, 187-92, 2009
72009
Near-optimal microprocessor and accelerators codesign with latency and throughput constraints
A Kritikakou, F Catthoor, GS Athanasiou, V Kelefouras, C Goutis
ACM Transactions on Architecture and Code Optimization (TACO) 10 (2), 1-25, 2013
52013
Development of a novel energy management strategy for hybrid electric vehicles
S Tsotoulidis, G Athanasiou, E Mitronikas
2014 international conference on electrical machines (ICEM), 2417-2423, 2014
42014
High‐performance FPGA implementations of the cryptographic hash function JH
GS Athanasiou, HE Michail, G Theodoridis, CE Goutis
IET Computers & Digital Techniques 7 (1), 29-40, 2013
42013
A template-based methodology for efficient microprocessor and FPGA accelerator co-design
A Kritikakou, F Catthoor, GS Athanasiou, V Kelefouras, C Goutis
2012 International Conference on Embedded Computer Systems (SAMOS), 15-22, 2012
42012
An evaluation of E-learning in healthcare
G Athanasiou, N Maris, I Apostolakis
E-health systems quality and reliability: models and standards, 183-203, 2011
32011
Securing 5G/6G Communications in Smart Cities: Novel SNOW-V/ZUC-256 Multimode Architectures
E Konstantopoulou, GS Athanasiou, N Sklavos
2023 Congress in Computer Science, Computer Engineering, & Applied Computing …, 2023
22023
A systematic flow for developing totally self-checking architectures for SHA-1 and SHA-2 cryptographic hash families
GS Athanasiou, G Theodoridis, CE Goutis, HE Michail, T Kasparis
Journal of Circuits, Systems and Computers 22 (06), 1350049, 2013
22013
THROUGHPUT/AREA TRADE-OFFS OF LOOP-UNROLLING, FUNCTIONAL, AND STRUCTURAL PIPELINE FOR SKEIN HASH FUNCTION
GS Athanasiou, E Tsingkas, HE Michail, G Theodoridis, CE Goutis
Computer Science & Engineering 3 (1), 1, 2013
22013
The system can't perform the operation now. Try again later.
Articles 1–20