• CIPHER BLOCK BASED AUTHENTICATION MODULE: A HARDWARE DESIGN PERSPECTIVE 

      Michail, H. E.; Schinianakis, D.; Goutis, C. E.; Kakarountas, A. P.; Selimis, G. (2011)
      Message Authentication Codes (MACs) are widely used in order to authenticate data packets, which are transmitted thought networks. Typically MACs are implemented using modules like hash functions and in conjunction with ...
    • Efficient high-performance ASIC implementation of JPEG-LS encoder 

      Papadonikolakis, M.; Pantazis, V.; Kakarountas, A. P. (2007)
      This paper introduces an innovative design which implements a high-performance JPEG-LS encoder. The encoding process follows the principles of the JPEG-LS lossless mode. The proposed implementation consists of an efficient ...
    • Performance for cryptography: Ahardware approach 

      Kakarountas, A. P.; Michail, H. (2011)
      Cryptography can be considered as a special application of coding schemes. High speed execution of Encoding and Decoding processes is crucial in the majority of the so-called security schemes. In fact, the characteristics ...