The following publications are possibly variants of this publication:
- Area-Throughput Trade-Offs for SHA-1 and SHA-256 Hash Functions' Pipelined DesignsHarris E. Michail, George Athanasiou, Vasilios I. Kelefouras, George Theodoridis, Thanos Stouraitis, Costas E. Goutis. jcsc, 25(4), 2016. [doi]
- Design and implementation of totally-self checking SHA-1 and SHA-256 hash functions' architecturesHarris E. Michail, Georgios Athanasiou, George Theodoridis, Andreas Gregoriades, Costas E. Goutis. mam, 45:227-240, 2016. [doi]
- A low-power and high-throughput implementation of the SHA-1 hash functionHaralambos Michail, A. P. Kakarountas, Odysseas G. Koufopavlou, Constantinos E. Goutis. iscas 2005: 4086-4089 [doi]