Athanasios Kakarountas
Cited by
Cited by
An RNS Implementation of an Elliptic Curve Point Multiplier
DM Schinianakis, AP Fournaris, HE Michail, AP Kakarountas, T Stouraitis
IEEE Transactions on Circuits and Systems I: Regular Papers 56 (6), 1202-1213, 2008
A new approach to elliptic curve cryptography: an RNS architecture
DM Schinianakis, AP Kakarountas, T Stouraitis
MELECON 2006-2006 IEEE Mediterranean Electrotechnical Conference, 1241-1245, 2006
Efficient high-performance ASIC implementation of JPEG-LS encoder
M Papadonikolakis, V Pantazis, AP Kakarountas
2007 Design, Automation & Test in Europe Conference & Exhibition, 1-6, 2007
A top-down design methodology for ultrahigh-performance hashing cores
H Michail, A Kakarountas, A Milidonis, C Goutis
IEEE Transactions on Dependable and Secure computing 6 (4), 255-268, 2008
Efficient implementation of the keyed-hash message authentication code (HMAC) using the SHA-1 hash function
HE Michail, AP Kakarountas, A Milidonis, CE Goutis
Proceedings of the 2004 11th IEEE International Conference on Electronics …, 2004
A low-power and high-throughput implementation of the SHA-1 hash function
H Michail, AP Kakarountas, O Koufopavlou, CE Goutis
2005 IEEE International Symposium on Circuits and Systems, 4086-4089, 2005
Efficient high-performance implementation of JPEG-LS encoder
ME Papadonikolakis, AP Kakarountas, CE Goutis
Journal of Real-Time Image Processing 3 (4), 303-310, 2008
Employing blockchain and physical unclonable functions for counterfeit IoT devices detection
L Negka, G Gketsios, NA Anagnostopoulos, G Spathoulas, A Kakarountas, ...
Proceedings of the International Conference on Omni-Layer Intelligent …, 2019
High-speed FPGA implementation of secure hash algorithm for IPSec and VPN applications
AP Kakarountas, H Michail, A Milidonis, CE Goutis, G Theodoridis
The Journal of Supercomputing 37 (2), 179-195, 2006
Optimizing SHA-1 hash function for high throughput with a partial unrolling study
HE Michail, AP Kakarountas, GN Selimis, CE Goutis
International Workshop on Power and Timing Modeling, Optimization and …, 2005
Planning and development of an electronic health record client based on the android platform
D Tychalas, A Kakarountas
2010 14th Panhellenic Conference on Informatics, 3-6, 2010
Efficient small-sized implementation of the keyed-hash message authentication code
M Papadonikolakis, H Michail, AP Kakarountas, CE Goutis
EUROCON 2005-The International Conference on" Computer as a Tool" 2, 1875-1878, 2005
A high-throughput area efficient fpga implementation of aes-128 encryption
A Brokalakis, AP Kakarountas, CE Goutis
IEEE Workshop on Signal Processing Systems Design and Implementation, 2005 …, 2005
An RNS architecture of an F/sub p/elliptic curve point multiplier
DM Schinianakis, AP Fournaris, AP Kakarountas, T Stouraitis
2006 IEEE International Symposium on Circuits and Systems, 5 pp., 2006
Novel high throughput implementation of SHA-256 hash function through pre-computation technique
H Michail, A Milidonis, A Kakarountas, C Goutis
2005 12th IEEE International Conference on Electronics, Circuits and Systems …, 2005
A novel high-speed counter with counting rate independent of the counter's length
AP Kakarountas, G Theodoridis, KS Papadomanolakis, C Goutis
10th IEEE International Conference on Electronics, Circuits and Systems …, 2003
Maximizing the hash function of authentication codes
II Yiakoumis, ME Papadonikolakis, HE Michail, AP Kakarountas, ...
IEEE Potentials 25 (2), 9-12, 2006
Memory hierarchy layer assignment for data re-use exploitation in multimedia algorithms realized on predefined processor architectures
K Masselos, F Catthoor, A Kakarudas, CE Goutis, H De Man
ICECS 2001. 8th IEEE International Conference on Electronics, Circuits and …, 2001
An acoustic-based smart home system for people suffering from dementia
E Boumpa, A Gkogkidis, I Charalampou, A Ntaliani, A Kakarountas, ...
Technologies 7 (1), 29, 2019
High-speed FPGA implementation of the SHA-1 Hash function
AP Kakarountas, G Theodoridis, T Laopoulos, CE Goutis
2005 IEEE Intelligent Data Acquisition and Advanced Computing Systems …, 2005
The system can't perform the operation now. Try again later.
Articles 1–20