Author of the publication

Novel high throughput implementation of SHA-256 hash function through pre-computation technique.

, , , and . ICECS, page 1-4. IEEE, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Technological Memory Aids for Neurodegenerative Diseases and the AuDi-o-Mentia Approach., and . ERCIM News, (2019)Collaborative Efforts Fuel the Greece Chapter Society News.. IEEE Consumer Electronics Magazine, 4 (4): 22-23 (2015)Reducing Power Consumption through Dynamic Frequency Scaling for a Class of Digital Receivers., , , , , and . PATMOS, volume 1918 of Lecture Notes in Computer Science, page 47-55. Springer, (2000)Constant delay systolic binary counter with variable size cellular automaton based prescaler., and . Comput. Electr. Eng., (2021)Low Power EEG Data Encoding for Brain Neurostimulation Implants., , and . Inf., 13 (4): 194 (2022)A Machine-Learning Clustering Approach for Intrusion Detection to IoT Devices., and . SEEDA-CECNSM, page 1-6. IEEE, (2019)High-Speed FPGA Implementation of Secure Hash Algorithm for IPSec and VPN Applications., , , , and . J. Supercomput., 37 (2): 179-195 (2006)Compressing Time Series Towards Lightweight Integrity Commitments., , , , , , and . SEEDA-CECNSM, page 1-7. IEEE, (2023)A Novel Low-power Neuromorphic Circuit based on Izhikevich Model., and . MOCAST, page 1-4. IEEE, (2021)Anomaly detection in IoT devices via monitoring of supply current., , , , and . ICCE-Berlin, page 1-4. IEEE, (2018)