Apostolos Fournaris
Apostolos Fournaris
Industrial Systems Institute, R.C. ATHENA
Bestätigte E-Mail-Adresse bei - Startseite
Zitiert von
Zitiert von
Wireless security and cryptography: specifications and implementations
N Sklavos, M Manninger, X Zhang, O Koufopavlou, V Hassler, P Kitsos, ...
CRC press, 2017
An RNS Implementation of an Elliptic Curve Point Multiplier
DM Schinianakis, AP Fournaris, HE Michail, AP Kakarountas, T Stouraitis
IEEE Transactions on Circuits and Systems I: Regular Papers 56 (6), 1202-1213, 2008
Enabling the human in the loop: Linked data and knowledge in industrial cyber-physical systems
C Emmanouilidis, P Pistofidis, L Bertoncelj, V Katsouros, A Fournaris, ...
Annual reviews in control 47, 249-265, 2019
Exploiting hardware vulnerabilities to attack embedded system devices: A survey of potent microarchitectural attacks
AP Fournaris, L Pocero Fraile, O Koufopavlou
Electronics 6 (3), 52, 2017
A new RSA encryption architecture and hardware implementation based on optimized Montgomery multiplication
AP Fournaris, O Koufopavlou
2005 IEEE International Symposium on Circuits and Systems, 4645-4648, 2005
Fault and simple power attack resistant RSA using Montgomery modular multiplication
AP Fournaris
Proceedings of 2010 IEEE International Symposium on Circuits and Systems …, 2010
Secure embedded system hardware design–A flexible security and trust enhanced approach
AP Fournaris, N Sklavos
Computers & Electrical Engineering 40 (1), 121-133, 2014
Software and hardware issues in smart card technology
G Selimis, A Fournaris, G Kostopoulos, O Koufopavlou
IEEE Communications Surveys & Tutorials 11 (3), 143-152, 2009
Performance evaluation of post-quantum TLS 1.3 on resource-constrained embedded systems
G Tasopoulos, J Li, AP Fournaris, RK Zhao, A Sakzad, R Steinfeld
International Conference on Information Security Practice and Experience …, 2022
Improved throughput bit-serial multiplier for GF (2m) fields
GN Selimis, AP Fournaris, HE Michail, O Koufopavlou
Integration 42 (2), 217-226, 2009
Versatile multiplier architectures in GF (2k) fields using the Montgomery multiplication algorithm
AP Fournaris, O Koufopavlou
Integration 41 (3), 371-384, 2008
An RNS architecture of an F/sub p/elliptic curve point multiplier
DM Schinianakis, AP Fournaris, AP Kakarountas, T Stouraitis
2006 IEEE International Symposium on Circuits and Systems, 5 pp., 2006
Residue number system as a side channel and fault injection attack countermeasure in elliptic curve cryptography
AP Fournaris, L Papachristodoulou, L Batina, N Sklavos
2016 International Conference on Design and Technology of Integrated Systems …, 2016
Protecting CRT RSA against fault and power side channel attacks
AP Fournaris, O Koufopavlou
2012 IEEE computer society annual symposium on VLSI, 159-164, 2012
Security and efficiency analysis of one time password techniques
I Tzemos, AP Fournaris, N Sklavos
Proceedings of the 20th Pan-Hellenic Conference on Informatics, 1-5, 2016
A high speed scalar multiplier for binary edwards curves
AP Fournaris, N Sklavos, C Koulamas
Proceedings of the Third Workshop on cryptography and Security in computing …, 2016
Designing efficient elliptic Curve Diffie-Hellman accelerators for embedded systems
AP Fournaris, I Zafeirakis, C Koulamas, N Sklavos, O Koufopavlou
2015 IEEE international symposium on circuits and systems (ISCAS), 2025-2028, 2015
Profiling dilithium digital signature traces for correlation differential side channel attacks
AP Fournaris, C Dimopoulos, O Koufopavlou
International Conference on Embedded Computer Systems, 281-294, 2020
Practical evaluation of protected residue number system scalar multiplication
L Papachristodoulou, AP Fournaris, K Papagiannopoulos, L Batina
Iot integration for adaptive manufacturing
C Alexakos, C Anagnostopoulos, A Fournaris, C Koulamas, A Kalogeras
2018 IEEE 21st International Symposium on Real-Time Distributed Computing …, 2018
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20