Wireless security and cryptography: specifications and implementations N Sklavos, M Manninger, X Zhang, O Koufopavlou, V Hassler, P Kitsos, ... CRC press, 2017 | 170 | 2017 |
An RNS Implementation of an Elliptic Curve Point Multiplier DM Schinianakis, AP Fournaris, HE Michail, AP Kakarountas, T Stouraitis IEEE Transactions on Circuits and Systems I: Regular Papers 56 (6), 1202-1213, 2008 | 138 | 2008 |
Enabling the human in the loop: Linked data and knowledge in industrial cyber-physical systems C Emmanouilidis, P Pistofidis, L Bertoncelj, V Katsouros, A Fournaris, ... Annual reviews in control 47, 249-265, 2019 | 123 | 2019 |
Exploiting hardware vulnerabilities to attack embedded system devices: A survey of potent microarchitectural attacks AP Fournaris, L Pocero Fraile, O Koufopavlou Electronics 6 (3), 52, 2017 | 74 | 2017 |
A new RSA encryption architecture and hardware implementation based on optimized Montgomery multiplication AP Fournaris, O Koufopavlou 2005 IEEE International Symposium on Circuits and Systems, 4645-4648, 2005 | 52 | 2005 |
Secure embedded system hardware design–A flexible security and trust enhanced approach AP Fournaris, N Sklavos Computers & Electrical Engineering 40 (1), 121-133, 2014 | 36 | 2014 |
Fault and simple power attack resistant RSA using Montgomery modular multiplication AP Fournaris Proceedings of 2010 IEEE International Symposium on Circuits and Systems …, 2010 | 36 | 2010 |
Software and hardware issues in smart card technology G Selimis, A Fournaris, G Kostopoulos, O Koufopavlou IEEE Communications Surveys & Tutorials 11 (3), 143-152, 2009 | 34 | 2009 |
Performance evaluation of post-quantum TLS 1.3 on resource-constrained embedded systems G Tasopoulos, J Li, AP Fournaris, RK Zhao, A Sakzad, R Steinfeld International Conference on Information Security Practice and Experience …, 2022 | 29* | 2022 |
Improved throughput bit-serial multiplier for GF (2m) fields GN Selimis, AP Fournaris, HE Michail, O Koufopavlou Integration 42 (2), 217-226, 2009 | 29 | 2009 |
Versatile multiplier architectures in GF (2k) fields using the Montgomery multiplication algorithm AP Fournaris, O Koufopavlou Integration 41 (3), 371-384, 2008 | 29 | 2008 |
An RNS architecture of an F/sub p/elliptic curve point multiplier DM Schinianakis, AP Fournaris, AP Kakarountas, T Stouraitis 2006 IEEE International Symposium on Circuits and Systems, 5 pp., 2006 | 24 | 2006 |
Residue number system as a side channel and fault injection attack countermeasure in elliptic curve cryptography AP Fournaris, L Papachristodoulou, L Batina, N Sklavos 2016 International Conference on Design and Technology of Integrated Systems …, 2016 | 23 | 2016 |
Protecting CRT RSA against fault and power side channel attacks AP Fournaris, O Koufopavlou 2012 IEEE computer society annual symposium on VLSI, 159-164, 2012 | 23 | 2012 |
A high speed scalar multiplier for binary edwards curves AP Fournaris, N Sklavos, C Koulamas Proceedings of the Third Workshop on cryptography and Security in computing …, 2016 | 21 | 2016 |
Designing efficient elliptic Curve Diffie-Hellman accelerators for embedded systems AP Fournaris, I Zafeirakis, C Koulamas, N Sklavos, O Koufopavlou 2015 IEEE international symposium on circuits and systems (ISCAS), 2025-2028, 2015 | 21 | 2015 |
Security and efficiency analysis of one time password techniques I Tzemos, AP Fournaris, N Sklavos Proceedings of the 20th Pan-Hellenic Conference on Informatics, 1-5, 2016 | 20 | 2016 |
Profiling dilithium digital signature traces for correlation differential side channel attacks AP Fournaris, C Dimopoulos, O Koufopavlou International Conference on Embedded Computer Systems, 281-294, 2020 | 18 | 2020 |
Practical evaluation of protected residue number system scalar multiplication L Papachristodoulou, AP Fournaris, K Papagiannopoulos, L Batina | 18 | 2019 |
Iot integration for adaptive manufacturing C Alexakos, C Anagnostopoulos, A Fournaris, C Koulamas, A Kalogeras 2018 IEEE 21st International Symposium on Real-Time Distributed Computing …, 2018 | 18 | 2018 |