Name
Affiliation
Papers
HARRIS E MICHAIL
university of patras
36
Collaborators
Citations 
PageRank 
54
156
18.29
Referers 
Referees 
References 
349
459
269
Search Limit
100459
Title
Citations
PageRank
Year
Design and validation of an agent-based driving simulator.00.342018
Design and implementation of totally-self checking SHA-1 and SHA-256 hash functions' architectures.20.372016
Area-Throughput Trade-Offs for SHA-1 and SHA-256 Hash Functions' Pipelined Designs.30.412016
Pipelined SHA-3 Implementations on FPGA: Architecture and Performance Analysis40.542015
Hardware implementation of the Totally Self-Checking SHA-256 hash core20.382015
High performance pipelined FPGA implementation of the SHA-3 hash algorithm40.432015
Optimising the SHA-512 cryptographic hash function on FPGAs40.532014
On the development of high-throughput and area-efficient multi-mode cryptographic hash designs in FPGAs.20.372014
Distribution Of Cultural Content Through Exploitation Of Cryptographic Algorithms And Hardware Identification00.342014
A Systematic Flow for Developing Totally Self-Checking Architectures for SHA-1 and SHA-2 Cryptographic Hash Families.10.352013
High-performance FPGA implementations of the cryptographic hash function JH.10.362013
Evolution of the e-museum concept through exploitation of cryptographic algorithms20.632012
A data locality methodology for matrix–matrix multiplication algorithm60.452012
On the Development of Totally Self-checking Hardware Design for the SHA-1 Hash Function.10.392012
An Intelligent Transportation System for Accident Risk Index Quantification.00.342012
On the exploitation of a high-throughput SHA-256 FPGA design for HMAC50.492012
High-throughput Hardware Architectures of the JH Round-three SHA-3 Candidate - An FPGA Design and Implementation Approach.00.342012
Cipher Block Based Authentication Module: a Hardware Design Perspective20.402011
A Methodology for Speeding Up Fast Fourier Transform Focusing on Memory Architecture Utilization80.542011
A robotic system for home security enhancement30.432010
Ultra High Speed SHA-256 Hashing Cryptographic Module for IPSec Hardware/Software Codesign.20.422010
Designs and comparisons of authentication modules for IPSec in configurable and extensible embedded processor.00.342010
A Top-Down Design Methodology for Ultrahigh-Performance Hashing Cores130.822009
Improved throughput bit-serial multiplier for GF(2m) fields100.622009
An RNS implementation of an Fpelliptic curve point multiplier70.522009
An RNS Implementation of an <formula formulatype="inline"> <tex Notation="TeX">$F_{p}$</tex></formula> Elliptic Curve Point Multiplier331.242009
Assessing Students' Learning in MIS Using Concept Mapping.00.342009
An RNS Implementation of an Fp Elliptic Curve Point Multiplier.00.342009
Novel Hardware Implementation of the Cipher Message Authentication Code00.342008
Server side hashing core exceeding 3 Gbps of throughput60.432007
Temporal and System Level Modifications for High Speed VLSI Implementations of Cryptographic Core00.342006
VLSI design and implementation of reconfigurable cryptographic systems for symmetric encryption.00.342005
Optimizing SHA-1 hash function for high throughput with a partial unrolling study60.912005
Novel high throughput implementation of SHA-256 hash function through pre-computation technique.30.472005
A low-power and high-throughput implementation of the SHA-1 hash function161.702005
Efficient implementation of the keyed-hash message authentication code (HMAC) using the SHA-1 hash function.100.732004