An RNS Implementation of an Elliptic Curve Point Multiplier DM Schinianakis, AP Fournaris, HE Michail, AP Kakarountas, T Stouraitis IEEE Transactions on Circuits and Systems I: Regular Papers 56 (6), 1202-1213, 2008 | 138 | 2008 |
A new approach to elliptic curve cryptography: an RNS architecture DM Schinianakis, AP Kakarountas, T Stouraitis MELECON 2006-2006 IEEE Mediterranean Electrotechnical Conference, 1241-1245, 2006 | 72 | 2006 |
Efficient high-performance ASIC implementation of JPEG-LS encoder M Papadonikolakis, V Pantazis, AP Kakarountas 2007 Design, Automation & Test in Europe Conference & Exhibition, 1-6, 2007 | 67 | 2007 |
A top-down design methodology for ultrahigh-performance hashing cores H Michail, A Kakarountas, A Milidonis, C Goutis IEEE Transactions on Dependable and Secure Computing 6 (4), 255-268, 2008 | 53 | 2008 |
Efficient implementation of the keyed-hash message authentication code (HMAC) using the SHA-1 hash function HE Michail, AP Kakarountas, A Milidonis, CE Goutis Proceedings of the 2004 11th IEEE International Conference on Electronics …, 2004 | 53 | 2004 |
Employing blockchain and physical unclonable functions for counterfeit IoT devices detection L Negka, G Gketsios, NA Anagnostopoulos, G Spathoulas, A Kakarountas, ... Proceedings of the International Conference on Omni-Layer Intelligent …, 2019 | 51 | 2019 |
A low-power and high-throughput implementation of the SHA-1 hash function H Michail, AP Kakarountas, O Koufopavlou, CE Goutis 2005 IEEE International Symposium on Circuits and Systems, 4086-4089, 2005 | 49 | 2005 |
A review of machine learning and tinyml in healthcare V Tsoukas, E Boumpa, G Giannakas, A Kakarountas Proceedings of the 25th Pan-Hellenic Conference on Informatics, 69-73, 2021 | 45 | 2021 |
Efficient high-performance implementation of JPEG-LS encoder ME Papadonikolakis, AP Kakarountas, CE Goutis Journal of Real-Time Image Processing 3, 303-310, 2008 | 44 | 2008 |
Enhancing food supply chain security through the use of blockchain and TinyML V Tsoukas, A Gkogkidis, A Kampa, G Spathoulas, A Kakarountas Information 13 (5), 213, 2022 | 41 | 2022 |
High-speed FPGA implementation of secure hash algorithm for IPSec and VPN applications AP Kakarountas, H Michail, A Milidonis, CE Goutis, G Theodoridis The Journal of Supercomputing 37, 179-195, 2006 | 30 | 2006 |
Optimizing SHA-1 hash function for high throughput with a partial unrolling study HE Michail, AP Kakarountas, GN Selimis, CE Goutis Integrated Circuit and System Design. Power and Timing Modeling …, 2005 | 26 | 2005 |
An RNS architecture of an F/sub p/elliptic curve point multiplier DM Schinianakis, AP Fournaris, AP Kakarountas, T Stouraitis 2006 IEEE International Symposium on Circuits and Systems, 5 pp., 2006 | 24 | 2006 |
Efficient small-sized implementation of the keyed-hash message authentication code M Papadonikolakis, H Michail, AP Kakarountas, CE Goutis EUROCON 2005-The International Conference on" Computer as a Tool" 2, 1875-1878, 2005 | 23 | 2005 |
A fast johnson-mobius encoding scheme for fault secure binary counters KS Papadomanolakis, AP Kakarountas, N Sklavos, CE Goutis Proc. Design, Automation and Test in Europe, 1, 2002 | 23 | 2002 |
Planning and development of an electronic health record client based on the android platform D Tychalas, A Kakarountas 2010 14th Panhellenic Conference on Informatics, 3-6, 2010 | 22 | 2010 |
Novel high throughput implementation of SHA-256 hash function through pre-computation technique H Michail, A Milidonis, A Kakarountas, C Goutis 2005 12th IEEE International Conference on Electronics, Circuits and Systems …, 2005 | 22 | 2005 |
A high-throughput area efficient fpga implementation of aes-128 encryption A Brokalakis, AP Kakarountas, CE Goutis IEEE Workshop on Signal Processing Systems Design and Implementation, 2005 …, 2005 | 21 | 2005 |
Young technology entrepreneurship enhancement based on an alternative approach of project-based learning S Dragoumanos, A Kakarountas, T Fourou 2017 IEEE global engineering education conference (EDUCON), 351-358, 2017 | 20 | 2017 |
Maximizing the hash function of authentication codes II Yiakoumis, ME Papadonikolakis, HE Michail, AP Kakarountas, ... IEEE Potentials 25 (2), 9-12, 2006 | 20 | 2006 |