Follow
Apostolos Fournaris
Apostolos Fournaris
Industrial Systems Institute, R.C. ATHENA
Verified email at ieee.org - Homepage
Title
Cited by
Cited by
Year
Wireless security and cryptography: specifications and implementations
N Sklavos, M Manninger, X Zhang, O Koufopavlou, V Hassler, P Kitsos, ...
CRC press, 2017
1682017
An RNS Implementation of an Elliptic Curve Point Multiplier
DM Schinianakis, AP Fournaris, HE Michail, AP Kakarountas, T Stouraitis
IEEE Transactions on Circuits and Systems I: Regular Papers 56 (6), 1202-1213, 2008
1382008
Enabling the human in the loop: Linked data and knowledge in industrial cyber-physical systems
C Emmanouilidis, P Pistofidis, L Bertoncelj, V Katsouros, A Fournaris, ...
Annual reviews in control 47, 249-265, 2019
1162019
Exploiting hardware vulnerabilities to attack embedded system devices: A survey of potent microarchitectural attacks
AP Fournaris, L Pocero Fraile, O Koufopavlou
Electronics 6 (3), 52, 2017
662017
A new RSA encryption architecture and hardware implementation based on optimized Montgomery multiplication
AP Fournaris, O Koufopavlou
2005 IEEE International Symposium on Circuits and Systems, 4645-4648, 2005
502005
Secure embedded system hardware design–A flexible security and trust enhanced approach
AP Fournaris, N Sklavos
Computers & Electrical Engineering 40 (1), 121-133, 2014
352014
Fault and simple power attack resistant RSA using Montgomery modular multiplication
AP Fournaris
Proceedings of 2010 IEEE International Symposium on Circuits and Systems …, 2010
352010
Software and hardware issues in smart card technology
G Selimis, A Fournaris, G Kostopoulos, O Koufopavlou
IEEE Communications Surveys & Tutorials 11 (3), 143-152, 2009
342009
Improved throughput bit-serial multiplier for GF (2m) fields
GN Selimis, AP Fournaris, HE Michail, O Koufopavlou
Integration 42 (2), 217-226, 2009
272009
Versatile multiplier architectures in GF (2k) fields using the Montgomery multiplication algorithm
AP Fournaris, O Koufopavlou
Integration 41 (3), 371-384, 2008
272008
Protecting CRT RSA against fault and power side channel attacks
AP Fournaris, O Koufopavlou
2012 IEEE computer society annual symposium on VLSI, 159-164, 2012
232012
An RNS architecture of an F/sub p/elliptic curve point multiplier
DM Schinianakis, AP Fournaris, AP Kakarountas, T Stouraitis
2006 IEEE International Symposium on Circuits and Systems, 5 pp., 2006
232006
Performance Evaluation of Post-Quantum TLS 1.3 on Resource-Constrained Embedded Systems
G Tasopoulos, J Li, AP Fournaris, RK Zhao, A Sakzad, R Steinfeld
International Conference on Information Security Practice and Experience …, 2022
22*2022
Residue number system as a side channel and fault injection attack countermeasure in elliptic curve cryptography
AP Fournaris, L Papachristodoulou, L Batina, N Sklavos
2016 International Conference on Design and Technology of Integrated Systems …, 2016
222016
Designing efficient elliptic Curve Diffie-Hellman accelerators for embedded systems
AP Fournaris, I Zafeirakis, C Koulamas, N Sklavos, O Koufopavlou
2015 IEEE international symposium on circuits and systems (ISCAS), 2025-2028, 2015
212015
Practical evaluation of protected residue number system scalar multiplication
L Papachristodoulou, AP Fournaris, K Papagiannopoulos, L Batina
182019
Iot integration for adaptive manufacturing
C Alexakos, C Anagnostopoulos, A Fournaris, C Koulamas, A Kalogeras
2018 IEEE 21st International Symposium on Real-Time Distributed Computing …, 2018
182018
A high speed scalar multiplier for binary edwards curves
AP Fournaris, N Sklavos, C Koulamas
Proceedings of the Third Workshop on cryptography and Security in computing …, 2016
182016
Introducing hardware-based intelligence and reconfigurability on industrial IoT edge nodes
AP Fournaris, C Alexakos, C Anagnostopoulos, C Koulamas, A Kalogeras
IEEE Design & Test 36 (4), 15-23, 2019
172019
Security and efficiency analysis of one time password techniques
I Tzemos, AP Fournaris, N Sklavos
Proceedings of the 20th Pan-Hellenic Conference on Informatics, 1-5, 2016
172016
The system can't perform the operation now. Try again later.
Articles 1–20