• CIPHER BLOCK BASED AUTHENTICATION MODULE: A HARDWARE DESIGN PERSPECTIVE 

      Michail, H. E.; Schinianakis, D.; Goutis, C. E.; Kakarountas, A. P.; Selimis, G. (2011)
      Message Authentication Codes (MACs) are widely used in order to authenticate data packets, which are transmitted thought networks. Typically MACs are implemented using modules like hash functions and in conjunction with ...
    • Exploration of 2D cellular automata as binary sequence generators 

      Arvaniti, E.; Mavridis, I.; Kakarountas, A. (2010)
      In this work a comprehensive exploration of Binary Sequence Generators (BSG) is offered, focusing on an alternative type of BSG (radix-2 counter) presenting low design complexity and interesting speed characteristics, based ...
    • A SoC-ZYNQ-Based SW-HW Co-Simulation and Verification Method 

      Mahdi A.S., Archonta C., Tzimas G., El-Kady A. (2019)
      An architecture enabling a flexible on-board simulation and verification method for complex user-specific IPs is presented. The proposed method relies on an FPGA-SoC implementation of a golden simulation and verification ...