default search action
Nicolas Sklavos 0001
Person information
- affiliation: University of Patras, Greece
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j53]Kyriaki Tsantikidou, Nicolas Sklavos:
An Area Efficient Architecture of a Novel Chaotic System for High Randomness Security in e-Health. IEEE Comput. Archit. Lett. 23(1): 104-107 (2024) - [j52]Samet Dinçer, Güzin Ulutas, Beste Ustubioglu, Gul Tahaoglu, Nicolas Sklavos:
Golden ratio based deep fake video detection system with fusion of capsule networks. Comput. Electr. Eng. 117: 109234 (2024) - [j51]Kyriaki Tsantikidou, Nicolas Sklavos:
Threats, Attacks, and Cryptography Frameworks of Cybersecurity in Critical Infrastructures. Cryptogr. 8(1): 7 (2024) - [c68]Evangelia Konstantopoulou, George S. Athanasiou, Nicolas Sklavos:
Minimizing Area Footprint of UAV Communication Security Using FPGAs. CSR 2024: 919-924 - [c67]Eugene Snopok, Alla Levina, Nicolas Sklavos:
On the Efficiency of Adding Redundancy in Disk Arrays, using Nonlinear Codes. MOCAST 2024: 1-4 - [c66]Kyriaki Tsantikidou, Nicolas Sklavos:
A Compact Pipelined Architecture of Chaotic Logistic Map for e-Health Applications. MOCAST 2024: 1-4 - 2023
- [c65]Evangelia Konstantopoulou, George Athanasiou, Nicolas Sklavos:
Towards Secure and Efficient Multi-generation Cellular Communications: Multi-mode SNOW-3G/V ASIC and FPGA Implementations. ARC 2023: 159-172 - [c64]Kyriaki Tsantikidou, Dimitrios Boufeas, Nicolas Sklavos:
Area-Delay Efficient Security Scheme for Smart Hospital Systems. CSR 2023: 552-557 - [c63]Alkistis Aikaterini Sigourou, Ievgen Kabin, Peter Langendörfer, Nicolas Sklavos, Zoya Dyka:
Successful Simple Side Channel Analysis: Vulnerability of an atomic pattern $kP$ algorithm implemented with a constant time crypto library to simple electromagnetic analysis attacks. MECO 2023: 1-6 - [c62]Kyriaki Tsantikidou, Nicolas Sklavos:
Minimal Resource Required E-Health System with End-to-End Authenticated Encryption Mechanism. MOCAST 2023: 1-4 - 2022
- [j50]Kyriaki Tsantikidou, Nicolas Sklavos:
Hardware Limitations of Lightweight Cryptographic Designs for IoT in Healthcare. Cryptogr. 6(3): 45 (2022) - [j49]Vassileios Aivaliotis, Kyriaki Tsantikidou, Nicolas Sklavos:
IoT-Based Multi-Sensor Healthcare Architectures and a Lightweight-Based Privacy Scheme. Sensors 22(11): 4269 (2022) - [c61]Nicolas Sklavos, Maria Pantopoulou, Francisco Flórez-Revuelta:
Network on Privacy-Aware Audio-and Video-Based Applications for Active and Assisted Living: GoodBrother Project. DSD 2022: 748-753 - [c60]Evangelia Konstantopoulou, Nicolas Sklavos:
Design and Implementation of a Lightweight Cryptographic Module, for Wireless 5G Communications and Beyond. IoTaIS 2022: 166-171 - [c59]Kyriaki Tsantikidou, Nicolas Sklavos:
Flexible Security and Privacy, System Architecture for IoT, in Healthcare. VLSI-SoC 2022: 1-6 - 2021
- [j48]Irene Ioannidou, Nicolas Sklavos:
On General Data Protection Regulation Vulnerabilities and Privacy Issues, for Wearable Devices and Fitness Tracking Applications. Cryptogr. 5(4): 29 (2021) - [j47]Sherali Zeadally, Ashok Kumar Das, Nicolas Sklavos:
Cryptographic technologies and protocol standards for Internet of Things. Internet Things 14: 100075 (2021) - [j46]Nicolas Sklavos, Nesrine Kaaniche:
On the design of secure primitives for real world applications. Microprocess. Microsystems 80: 103614 (2021) - [j45]Hassan N. Noura, Ola Salman, Nesrine Kaaniche, Nicolas Sklavos, Ali Chehab, Raphaël Couturier:
TRESC: Towards redesigning existing symmetric ciphers. Microprocess. Microsystems 87: 103478 (2021) - [c58]Ioannis Memos Bagkratsas, Nicolas Sklavos:
Digital Forensics, Video Forgery Recognition, for Cybersecurity Systems. DSD 2021: 510-513 - [p4]Apostolos P. Fournaris, Athanassios Moschos, Nicolas Sklavos:
Side Channel Assessment Platforms and Tools for Ubiquitous Systems. Security of Ubiquitous Computing Systems 2021: 147-163 - 2020
- [j44]Paris Panagiotou, Nicolas Sklavos, E. Darra, Ioannis D. Zaharakis:
Cryptographic system for data applications, in the context of internet of things. Microprocess. Microsystems 72 (2020) - [j43]Konstantinos Liakos, Georgios K. Georgakilas, Serafeim P. Moustakidis, Nicolas Sklavos, Fotis C. Plessas:
Conventional and machine learning approaches as countermeasures against hardware trojan attacks. Microprocess. Microsystems 79: 103295 (2020) - [c57]Marios Tsavos, Nicolas Sklavos, George Ph. Alexiou:
Lightweight Security Data Streaming, Based on Reconfigurable Logic, for FPGA Platform. DSD 2020: 277-280 - [c56]Nicolas Sklavos, Simona Francese:
MULTI-modal Imaging of FOREnsic SciEnce Evidence: MULTI-FORESEE Project. DSD 2020: 386-392 - [c55]Maria Pantopoulou, Nicolas Sklavos:
An FPGA-Implemented Parallel System of Face Recognition, for Digital Forensics Applications. ICCE-Berlin 2020: 1-6 - [c54]Angeliki Kalapodi, Nicolas Sklavos:
The Concerns of Personal Data Privacy, on Calling and Messaging, Networking Applications. SSCC 2020: 275-289
2010 – 2019
- 2019
- [c53]Nicolas Sklavos:
In the Era of Cybersecurity: Cryptographic Hardware and Embedded Systems. MECO 2019: 1 - [c52]Dmitriy N. Moldovyan, Alexander A. Moldovyan, Nicolas Sklavos:
Post-Quantum Signature Schemes for Efficient Hardware Implementation. NTMS 2019: 1-5 - [c51]Maria Pantopoulou, Nicolas Sklavos, Ivana Ognjanovic:
On the Hardware Implementation Performance, of Face Recognition Techniques, for Digital Forensics. SSCC 2019: 272-285 - [c50]Stavros Limnaios, Nicolas Sklavos, Odysseas G. Koufopavlou:
Lightweight Efficient Simeck32/64 Crypto-Core Designs and Implementations, for IoT Security. VLSI-SoC 2019: 275-280 - 2018
- [j42]Anastasios N. Bikos, Nicolas Sklavos:
Architecture Design of an Area Efficient High Speed Crypto Processor for 4G LTE. IEEE Trans. Dependable Secur. Comput. 15(5): 729-741 (2018) - [c49]Maria Katsaiti, Nicolas Sklavos:
Implementation Efficiency and Alternations, on CAESAR Finalists: AEGIS Approach. DASC/PiCom/DataCom/CyberSciTech 2018: 661-665 - [c48]Paris Panagiotou, Nicolas Sklavos, Ioannis D. Zaharakis:
Design and Implementation of a Privacy Framework for the Internet of Things (IoT). DSD 2018: 586-591 - [c47]Andronikos Kyriakou, Nicolas Sklavos:
Container-Based Honeypot Deployment for the Analysis of Malicious Activity. GIIS 2018: 1-4 - [c46]Michail Tsikerdekis, Sherali Zeadally, Amy Schlesener, Nicolas Sklavos:
Approaches for Preventing Honeypot Detection and Compromise. GIIS 2018: 1-6 - [p3]Ioannis Papakonstantinou, Nicolas Sklavos:
Physical Unclonable Functions (PUFs) Design Technologies: Advantages and Trade Offs. Computer and Network Security Essentials 2018: 427-442 - [p2]Polyxeni Spanaki, Nicolas Sklavos:
Cloud Computing: Security Issues and Establishing Virtual Cloud Environment via Vagrant to Secure Cloud Hosts. Computer and Network Security Essentials 2018: 539-553 - 2017
- [j41]Nicolas Sklavos:
Privacy in a Digital, Networked World: Technologies, Implications and Solutions. By Sherali Zeadally and Mohamad Badra. Springer International Publishing: 418 pp.; $51.89; ISBN-10: 3319084690, ISBN-13: 978-3319084695. Cryptogr. 1(1): 5 (2017) - [c45]Fotios Kounelis, Nicolas Sklavos, Paris Kitsos:
Run-Time Effect by Inserting Hardware Trojans, in Combinational Circuits. DSD 2017: 287-290 - [c44]Nicolas Sklavos, Ioannis D. Zaharakis, Achilles Kameas, Angeliki Kalapodi:
Security & Trusted Devices in the Context of Internet of Things (IoT). DSD 2017: 502-509 - [c43]Apostolos P. Fournaris, Louiza Papachristodoulou, Nicolas Sklavos:
Secure and Efficient RNS Software Implementation for Elliptic Curve Cryptography. EuroS&P Workshops 2017: 86-93 - 2016
- [c42]Apostolos P. Fournaris, Louiza Papachristodoulou, Lejla Batina, Nicolas Sklavos:
Residue Number System as a side channel and fault injection attack countermeasure in elliptic curve cryptography. DTIS 2016: 1-4 - [c41]Apostolos P. Fournaris, Nicolas Sklavos, Christos Koulamas:
A High Speed Scalar Multiplier for Binary Edwards Curves. CS2@HiPEAC 2016: 41-44 - [c40]Nicolas Sklavos, Ioannis D. Zaharakis:
Cryptography and Security in Internet of Things (IoTs): Models, Schemes, and Implementations. NTMS 2016: 1-2 - [c39]Ioannis D. Zaharakis, Nicolas Sklavos, Achilles Kameas:
Exploiting Ubiquitous Computing, Mobile Computing and the Internet of Things to Promote Science Education. NTMS 2016: 1-2 - [c38]Ioannis Tzemos, Apostolos P. Fournaris, Nicolas Sklavos:
Security and Efficiency Analysis of One Time Password Techniques. PCI 2016: 67 - 2015
- [c37]Apostolos P. Fournaris, Nicolaos Klaoudatos, Nicolas Sklavos, Christos Koulamas:
Fault and Power Analysis Attack Resistant RNS based Edwards Curve Point Multiplication. CS2@HiPEAC 2015: 43-46 - [c36]Ricardo Chaves, Giorgio Di Natale, Lejla Batina, Shivam Bhasin, Baris Ege, Apostolos P. Fournaris, Nele Mentens, Stjepan Picek, Francesco Regazzoni, Vladimir Rozic, Nicolas Sklavos, Bohan Yang:
Challenges in designing trustworthy cryptographic co-processors. ISCAS 2015: 2009-2012 - [c35]Apostolos P. Fournaris, Ioannis Zafeirakis, Christos Koulamas, Nicolas Sklavos, Odysseas G. Koufopavlou:
Designing efficient elliptic Curve Diffie-Hellman accelerators for embedded systems. ISCAS 2015: 2025-2028 - 2014
- [j40]Apostolos P. Fournaris, Nicolas Sklavos:
Secure embedded system hardware design - A flexible security and trust enhanced approach. Comput. Electr. Eng. 40(1): 121-133 (2014) - [j39]Nicolas Sklavos:
Book Review: Wu, Chwan-Hwa, and Irwin, J. David. Introduction to Computer Networks and Cybersecurity - Boca Raton, FL: CRC Press/Taylor & Francis Group, 2013, 1236p., $130.00. ISBN 1466572132. Inf. Secur. J. A Glob. Perspect. 23(1-2): 46 (2014) - [j38]Nicolas Sklavos:
Book Review: Samuelle, T.J. Mike Meyers' CompTIA Security + Certification Passport (Exam SY0-301) - 3rd ed. New York: McGraw-Hill Osborne Media, 2011, 480p., $30.00. ISBN: 13: 978-0071770385. Inf. Secur. J. A Glob. Perspect. 23(1-2): 47-48 (2014) - [j37]Nicolas Sklavos:
Book Review: Stallings, W. Cryptography and Network Security: Principles and Practice - 6th ed. Upper Saddle River, NJ: Prentice Hall, 2013, 752p., $142.40. ISBN: 13: 978-0133354690. Inf. Secur. J. A Glob. Perspect. 23(1-2): 49-50 (2014) - [j36]Nicolas Sklavos:
Book Review: Sullivan, Bryan, and Liu, Vincent. Web Application Security, A Beginner's Guide - McGraw-Hill Osborne Media, Beginner's Guide Series. McGraw-Hill Osborne Media, 2011, 352p., $40.00. ISBN: 10: 0071776168, ISBN: 13: 978-0071776165. Inf. Secur. J. A Glob. Perspect. 23(1-2): 51 (2014) - [j35]Nicolas Sklavos:
Book Review: Bahadur, Gary, Inasi, Jason, and de Carvalho, Alex. Securing the Clicks: Network Security in the Age of Social Media - McGraw-Hill Osborne Media, 2011, 368p., $40.00. ISBN: 10: 0071769056, ISBN: 13: 978-0071769051. Inf. Secur. J. A Glob. Perspect. 23(1-2): 52-53 (2014) - [j34]Nicolas Sklavos:
Book Review: Wong, Caroline. Security Metrics, A Beginner's Guide - McGraw-Hill Osborne Media, A Beginner's Guide Series. McGraw-Hill Osborne Media, 2011, 432p., $40.00. ISBN: 10: 0071744002, ISBN: 13: 978-0071744003. Inf. Secur. J. A Glob. Perspect. 23(1-2): 54 (2014) - [j33]Nicolas Sklavos:
Book Review: Shavers, Brett. Placing the Suspect Behind the Keyboard: Using Digital Forensics and Investigative Techniques to Identify Cybercrime Suspects. Inf. Secur. J. A Glob. Perspect. 23(1-2): 55-56 (2014) - 2013
- [j32]Anastasios N. Bikos, Nicolas Sklavos:
LTE/SAE Security Issues on 4G Wireless Networks. IEEE Secur. Priv. 11(2): 55-62 (2013) - [j31]Nicolas Sklavos:
C(I)SO, And Now What? How to Successfully Build Security by Design, by Oberlaender, M. S.CreateSpace Independent Publishing Platform, 2013, 102p., $36.99. ISBN 1480237418. Inf. Secur. J. A Glob. Perspect. 22(4): 203 (2013) - [j30]Paris Kitsos, Nicolas Sklavos, George Provelengios, Athanassios N. Skodras:
FPGA-based performance analysis of stream ciphers ZUC, Snow3g, Grain V1, Mickey V2, Trivium and E0. Microprocess. Microsystems 37(2): 235-245 (2013) - [c34]Filippos Pirpilidis, Paris Kitsos, Nicolas Sklavos:
An Efficient FPGA-Based Architecture of Skein for Simple Hashing and MAC Function. DSD 2013: 301-304 - [c33]Nicolas Sklavos:
Securing Communication Devices via Physical Unclonable Functions (PUFs). ISSE 2013: 253-261 - 2012
- [j29]Paris Kitsos, Nicolas Sklavos, Maria Parousi, Athanassios N. Skodras:
A comparative study of hardware architectures for lightweight block ciphers. Comput. Electr. Eng. 38(1): 148-160 (2012) - [c32]George Provelengios, Paris Kitsos, Nicolas Sklavos, Christos Koulamas:
FPGA-based Design Approaches of Keccak Hash Function. DSD 2012: 648-653 - [c31]Nicolas Sklavos, Paris Kitsos, Odysseas G. Koufopavlou:
VLSI Design and Implementation of Homophonic Security System. ISVLSI 2012: 69-72 - [c30]Nicolas Sklavos, Paris Kitsos:
Architectural Optimizations & Hardware Implementations of WLANs Encryption Standard. NTMS 2012: 1-5 - 2011
- [j28]Nicolas Sklavos, Sherali Zeadally, Cristina Alcaraz:
Guest Editors' Introduction to the Special Issue on "Modern trends in applied security: Architectures, implementations and applications". Comput. Electr. Eng. 37(2): 127-128 (2011) - [j27]Rodrigo Roman, Cristina Alcaraz, Javier López, Nicolas Sklavos:
Key management systems for sensor networks in the context of the Internet of Things. Comput. Electr. Eng. 37(2): 147-159 (2011) - [j26]Nicolas Sklavos:
Editorial. Inf. Secur. J. A Glob. Perspect. 20(2): 65-66 (2011) - [c29]Paris Kitsos, Nicolas Sklavos, Athanassios N. Skodras:
An FPGA Implementation of the ZUC Stream Cipher. DSD 2011: 814-817 - [c28]Nicolas Sklavos:
Multi-module Hashing System for SHA-3 & FPGA Integration. FPL 2011: 162-166 - [e2]Nikolaos S. Voros, Amar Mukherjee, Nicolas Sklavos, Konstantinos Masselos, Michael Hübner:
VLSI 2010 Annual Symposium - Selected papers. Lecture Notes in Electrical Engineering 105, Springer 2011, ISBN 978-94-007-1487-8 [contents] - 2010
- [j25]Nicolas Sklavos:
On the Hardware Implementation Cost of Crypto-Processors Architectures. Inf. Secur. J. A Glob. Perspect. 19(2): 53-60 (2010) - [c27]Paris Kitsos, Nicolas Sklavos, Athanassios N. Skodras:
Low Power FPGA Implementations of 256-bit Luffa Hash Function. DSD 2010: 416-419 - [c26]Paris Kitsos, Nicolas Sklavos:
On the hardware implementation efficiency of SHA-3 candidates. ICECS 2010: 1240-1243 - [c25]Nicolas Sklavos, Paris Kitsos:
BLAKE HASH Function Family on FPGA: From the Fastest to the Smallest. ISVLSI 2010: 139-142 - [c24]Anestis Bechtsoudis, Nicolas Sklavos:
Side Channel Attacks Cryptanalysis against Block Ciphers Based on FPGA Devices. ISVLSI 2010: 460-461
2000 – 2009
- 2009
- [c23]Akashi Satoh, Nicolas Sklavos:
Compact and High-speed Hardware Architectures for Hash Function Tiger. ISCAS 2009: 1401-1404 - 2007
- [j24]Paris Kitsos, Nicolas Sklavos:
Guest Editors' Introduction to the Special Issue on Security of Computers and Networks. Comput. Electr. Eng. 33(5-6): 321-323 (2007) - [j23]Sherali Zeadally, Nicolas Sklavos, Moganakrishnan Rathakrishnan, Scott Fowler:
End-to-End Security Across Wired-Wireless Networks for Mobile Users. Inf. Secur. J. A Glob. Perspect. 16(5): 264-277 (2007) - [j22]Nicolas Sklavos, Máire McLoone, Xinmiao Zhang:
MONET Special Issue on Next Generation Hardware Architectures for Secure Mobile Computing. Mob. Networks Appl. 12(4): 229-230 (2007) - [j21]Paris Kitsos, Nicolas Sklavos, Odysseas G. Koufopavlou:
UMTS security: system architecture and hardware implementation. Wirel. Commun. Mob. Comput. 7(4): 483-494 (2007) - [c22]Nicolas Sklavos, Costas Efstathiou:
SecurID Authenticator: On the Hardware Implementation Efficiency. ICECS 2007: 589-592 - [c21]Nicolas Sklavos, Spyros G. Denazis, Odysseas G. Koufopavlou:
AAA and mobile networks: security aspects and architectural efficiency. MobiMedia 2007: 45 - [e1]Tasos Dagiuklas, Nicolas Sklavos:
Proceedings of the 3rd International Conference on Mobile Multimedia Communications, MobiMedia 2007, Nafpaktos, Greece, August 27-29, 2007. ACM International Conference Proceeding Series 329, ICST 2007, ISBN 978-963-06-2670-5 [contents] - 2006
- [j20]Christian Rechberger, Vincent Rijmen, Nicolas Sklavos:
The NIST Cryptographic Workshop on Hash Functions. IEEE Secur. Priv. 4(1): 54-56 (2006) - [j19]Nicolas Sklavos, Panagiotis Souras:
Economic Models & Approaches in Information Security for Computer Networks. Int. J. Netw. Secur. 2(1): 14-20 (2006) - [j18]Nikolay A. Moldovyan, Alexander A. Moldovyan, Michael A. Eremeev, Nicolas Sklavos:
New Class of Cryptographic Primitives and Cipher Design for Networks Security. Int. J. Netw. Secur. 2(2): 114-125 (2006) - [j17]Alexander A. Moldovyan, Nick A. Moldovyan, Nicolas Sklavos:
Controlled elements for designing ciphers suitable to efficient VLSI implementation. Telecommun. Syst. 32(2-3): 149-163 (2006) - [j16]Nicolas Sklavos, Paris Kitsos, K. Papadopoulos, Odysseas G. Koufopavlou:
Design, Architecture and Performance Evaluation of the Wireless Transport Layer Security. J. Supercomput. 36(1): 33-50 (2006) - 2005
- [j15]Nicolas Sklavos, Odysseas G. Koufopavlou:
On the hardware implementation of RIPEMD processor: Networking high speed hashing, up to 2Gbps. Comput. Electr. Eng. 31(6): 361-379 (2005) - [j14]Nick A. Moldovyan, Nicolas Sklavos, Odysseas G. Koufopavlou:
Pure DDP-Based Cipher: Architecture Analysis, Hardware Implementation Cost and Performance up to 6.5 Gbps. Int. Arab J. Inf. Technol. 2(1): 24-32 (2005) - [j13]Michalis D. Galanis, Paris Kitsos, Giorgos Kostopoulos, Nicolas Sklavos, Constantinos E. Goutis:
Comparison of the Hardware Implementation of Stream Ciphers. Int. Arab J. Inf. Technol. 2(4): 267-274 (2005) - [j12]Nicolas Sklavos, Odysseas G. Koufopavlou:
Access Control in Networks Hierarchy: Implementation of Key Management Protocol. Int. J. Netw. Secur. 1(2): 103-109 (2005) - [j11]Nicolas Sklavos, Nick A. Moldovyan, Odysseas G. Koufopavlou:
High Speed Networking Security: Design and Implementation of Two New DDP-Based Ciphers. Mob. Networks Appl. 10(1-2): 219-231 (2005) - [j10]Nicolas Sklavos, Odysseas G. Koufopavlou:
Implementation of the SHA-2 Hash Family Standard Using FPGAs. J. Supercomput. 31(3): 227-248 (2005) - [c20]Odysseas G. Koufopavlou, George N. Selimis, Nicolas Sklavos, Paris Kitsos:
Cryptography: Circuits and Systems Approach. PATMOS 2005: 750 - [p1]Nicolas Sklavos, Nikolay A. Moldovyan, Odysseas G. Koufopavlou:
Wireless Networks World and Security Algorithms. Handbook on Theoretical and Algorithmic Aspects of Sensor, Ad Hoc Wireless, and Peer-to-Peer Networks 2005: 193-218 - 2004
- [j9]Paris Kitsos, Nicolas Sklavos, Michalis D. Galanis, Odysseas G. Koufopavlou:
64-bit Block ciphers: hardware implementations and comparison analysis. Comput. Electr. Eng. 30(8): 593-604 (2004) - [j8]Nicolas Sklavos, Nick A. Moldovyan, Vladimir Gorodetsky, Odysseas G. Koufopavlou:
Computer Network Security: Report from MMM-ACNS. IEEE Secur. Priv. 2(1): 49-52 (2004) - [j7]Nicolas Sklavos, Paris Kitsos, Epaminondas Alexopoulos, Odysseas G. Koufopavlou:
Open Mobile Alliance (OMA) Security Layer: Architecture, Implementation and Performance Evaluation of the Integrity Unit. New Gener. Comput. 23(1): 77-100 (2004) - [c19]Michalis D. Galanis, Paris Kitsos, Giorgos Kostopoulos, Nicolas Sklavos, Odysseas G. Koufopavlou, Costas E. Goutis:
Comparison of the hardware architectures and FPGA implementations of stream ciphers. ICECS 2004: 571-574 - [c18]Nicolas Sklavos, Georgios N. Selimis, Odysseas G. Koufopavlou:
Bulk encryption crypto-processor for smart cards: design and implementation. ICECS 2004: 579-582 - [c17]Nick A. Moldovyan, Michael A. Eremeev, Nicolas Sklavos, Odysseas G. Koufopavlou:
New class of the FPGA efficient cryptographic primitives. ISCAS (2) 2004: 553-556 - 2003
- [j6]Nicolas Sklavos, Odysseas G. Koufopavlou:
Data dependent rotations, a trustworthy approach for future encryption systems/ciphers: low cost and high performance. Comput. Secur. 22(7): 585-588 (2003) - [j5]Nicolas Sklavos, Odysseas G. Koufopavlou:
Mobile Communications World: Security Implementations Aspects - A State of the Art. Comput. Sci. J. Moldova 11(2): 168-187 (2003) - [j4]Nicolas Sklavos, Epaminondas Alexopoulos, Odysseas G. Koufopavlou:
Networking Data Integrity: High Speed Architectures and Hardware Implementations. Int. Arab J. Inf. Technol. 1(0) (2003) - [j3]Paraskevas Kitsos, Nicolas Sklavos, Kyriakos Papadomanolakis, Odysseas G. Koufopavlou:
Hardware Implementation of Bluetooth Security. IEEE Pervasive Comput. 2(1): 21-29 (2003) - [c16]George N. Selimis, Nicolas Sklavos, Odysseas G. Koufopavlou:
VLSI implementation of the keyed-hash message authentication code for the wireless application protocol. ICECS 2003: 24-27 - [c15]Apostolos P. Fournaris, Nicolas Sklavos, Odysseas G. Koufopavlou:
VLSI architecture and FPGA implementation of ICE encryption algorithm. ICECS 2003: 88-91 - [c14]Nicolas Sklavos, Chris Machas, Odysseas G. Koufopavlou:
Area optimized architecture and VLSI implementation of RC5 encryption algorithm. ICECS 2003: 172-175 - [c13]Nicolas Sklavos, Gregory Dimitroulakos, Odysseas G. Koufopavlou:
An ultra high speed architecture for VLSI implementation of hash functions. ICECS 2003: 990-993 - [c12]Nicolas Sklavos, Odysseas G. Koufopavlou:
On the hardware implementations of the SHA-2 (256, 384, 512) hash functions. ISCAS (5) 2003: 153-156 - [c11]Nicolas Sklavos, Alexander A. Moldovyan, Odysseas G. Koufopavlou:
Encryption and Data Dependent Permutations: Implementation Cost and Performance Evaluation. MMM-ACNS 2003: 337-348 - [c10]Nicolas Sklavos, Odysseas G. Koufopavlou:
Architectures and FPGA Implementations of the SCO(-1, -2, -3) Ciphers Family. VLSI-SOC 2003: 68-73 - 2002
- [j2]Nicolas Sklavos, Odysseas G. Koufopavlou:
Architectures and VLSI Implementations of the AES-Proposal Rijndael. IEEE Trans. Computers 51(12): 1454-1459 (2002) - [j1]Nikos Sklavos, Alexandros Papakonstantinou, Spyros Theoharis, Odysseas G. Koufopavlou:
Low-power Implementation of an Encryption/Decryption System with Asynchronous Techniques. VLSI Design 15(1): 455-468 (2002) - [c9]Grigoris Dimitroulakos, Nikolaos D. Zervas, Nicolas Sklavos, Costas E. Goutis:
An efficient VLSI implementation for forward and inverse wavelet transform for JPEG2000. DSP 2002: 233-236 - [c8]Kyriakos S. Papadomanolakis, Athanasios P. Kakarountas, Nicolas Sklavos, Costas E. Goutis:
A low power fault secure timer implementation based on the Gray encoding scheme. ICECS 2002: 537-540 - [c7]Nicolas Sklavos, Kyriakos Papadomanolakis, Paris Kitsos, Odysseas G. Koufopavlou:
Euclidean algorithm VLSI implementations. ICECS 2002: 557-560 - [c6]Nicolas Sklavos, Paris Kitsos, Odysseas G. Koufopavlou:
VLSI implementation of password (PIN) authentication unit. ICECS 2002: 1147-1150 - [c5]Paris Kitsos, Nicolas Sklavos, Odysseas G. Koufopavlou:
An efficient implementation of the digital signature algorithm. ICECS 2002: 1151-1154 - [c4]Nicolas Sklavos, Paris Kitsos, Kyriakos Papadomanolakis, Odysseas G. Koufopavlou:
Random number generator architecture and VLSI implementation. ISCAS (4) 2002: 854-857 - [c3]Paris Kitsos, Nicolas Sklavos, Odysseas G. Koufopavlou:
Hardware implementation of the SAFER+ encryption algorithm for the Bluetooth system. ISCAS (4) 2002: 878-881 - 2001
- [c2]Paris Kitsos, Nicolas Sklavos, Nikolaos D. Zervas, Odysseas G. Koufopavlou:
A reconfigurable linear feedback shift register (LFSR) for the Bluetooth system. ICECS 2001: 991-994 - [c1]Nicolas Sklavos, Odysseas G. Koufopavlou:
Asynchronous low power VLSI implementation of the International Data Encryption Algorithm. ICECS 2001: 1425-1428
Coauthor Index
aka: Paraskevas Kitsos
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:20 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint