关注
Athanasios Kakarountas
Athanasios Kakarountas
其他姓名Athanasios Kakaroudas, Thanos Kakarountas, Athanasios Kakarudas
在 uth.gr 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
An RNS Implementation of an Elliptic Curve Point Multiplier
DM Schinianakis, AP Fournaris, HE Michail, AP Kakarountas, T Stouraitis
IEEE Transactions on Circuits and Systems I: Regular Papers 56 (6), 1202-1213, 2008
1382008
A new approach to elliptic curve cryptography: an RNS architecture
DM Schinianakis, AP Kakarountas, T Stouraitis
MELECON 2006-2006 IEEE Mediterranean Electrotechnical Conference, 1241-1245, 2006
722006
Efficient high-performance ASIC implementation of JPEG-LS encoder
M Papadonikolakis, V Pantazis, AP Kakarountas
2007 Design, Automation & Test in Europe Conference & Exhibition, 1-6, 2007
672007
A top-down design methodology for ultrahigh-performance hashing cores
H Michail, A Kakarountas, A Milidonis, C Goutis
IEEE Transactions on Dependable and Secure Computing 6 (4), 255-268, 2008
532008
Efficient implementation of the keyed-hash message authentication code (HMAC) using the SHA-1 hash function
HE Michail, AP Kakarountas, A Milidonis, CE Goutis
Proceedings of the 2004 11th IEEE International Conference on Electronics …, 2004
532004
Employing blockchain and physical unclonable functions for counterfeit IoT devices detection
L Negka, G Gketsios, NA Anagnostopoulos, G Spathoulas, A Kakarountas, ...
Proceedings of the International Conference on Omni-Layer Intelligent …, 2019
512019
A low-power and high-throughput implementation of the SHA-1 hash function
H Michail, AP Kakarountas, O Koufopavlou, CE Goutis
2005 IEEE International Symposium on Circuits and Systems, 4086-4089, 2005
492005
A review of machine learning and tinyml in healthcare
V Tsoukas, E Boumpa, G Giannakas, A Kakarountas
Proceedings of the 25th Pan-Hellenic Conference on Informatics, 69-73, 2021
452021
Efficient high-performance implementation of JPEG-LS encoder
ME Papadonikolakis, AP Kakarountas, CE Goutis
Journal of Real-Time Image Processing 3, 303-310, 2008
442008
Enhancing food supply chain security through the use of blockchain and TinyML
V Tsoukas, A Gkogkidis, A Kampa, G Spathoulas, A Kakarountas
Information 13 (5), 213, 2022
412022
High-speed FPGA implementation of secure hash algorithm for IPSec and VPN applications
AP Kakarountas, H Michail, A Milidonis, CE Goutis, G Theodoridis
The Journal of Supercomputing 37, 179-195, 2006
302006
Optimizing SHA-1 hash function for high throughput with a partial unrolling study
HE Michail, AP Kakarountas, GN Selimis, CE Goutis
Integrated Circuit and System Design. Power and Timing Modeling …, 2005
262005
An RNS architecture of an F/sub p/elliptic curve point multiplier
DM Schinianakis, AP Fournaris, AP Kakarountas, T Stouraitis
2006 IEEE International Symposium on Circuits and Systems, 5 pp., 2006
242006
Efficient small-sized implementation of the keyed-hash message authentication code
M Papadonikolakis, H Michail, AP Kakarountas, CE Goutis
EUROCON 2005-The International Conference on" Computer as a Tool" 2, 1875-1878, 2005
232005
A fast johnson-mobius encoding scheme for fault secure binary counters
KS Papadomanolakis, AP Kakarountas, N Sklavos, CE Goutis
Proc. Design, Automation and Test in Europe, 1, 2002
232002
Planning and development of an electronic health record client based on the android platform
D Tychalas, A Kakarountas
2010 14th Panhellenic Conference on Informatics, 3-6, 2010
222010
Novel high throughput implementation of SHA-256 hash function through pre-computation technique
H Michail, A Milidonis, A Kakarountas, C Goutis
2005 12th IEEE International Conference on Electronics, Circuits and Systems …, 2005
222005
A high-throughput area efficient fpga implementation of aes-128 encryption
A Brokalakis, AP Kakarountas, CE Goutis
IEEE Workshop on Signal Processing Systems Design and Implementation, 2005 …, 2005
212005
Young technology entrepreneurship enhancement based on an alternative approach of project-based learning
S Dragoumanos, A Kakarountas, T Fourou
2017 IEEE global engineering education conference (EDUCON), 351-358, 2017
202017
Maximizing the hash function of authentication codes
II Yiakoumis, ME Papadonikolakis, HE Michail, AP Kakarountas, ...
IEEE Potentials 25 (2), 9-12, 2006
202006
系统目前无法执行此操作,请稍后再试。
文章 1–20