Follow
Apostolos Fournaris
Apostolos Fournaris
Industrial Systems Institute, R.C. ATHENA
Verified email at isi.gr - Homepage
Title
Cited by
Cited by
Year
Wireless security and cryptography: specifications and implementations
N Sklavos, M Manninger, X Zhang, O Koufopavlou, V Hassler, P Kitsos, ...
CRC press, 2017
1692017
An RNS Implementation of an Elliptic Curve Point Multiplier
DM Schinianakis, AP Fournaris, HE Michail, AP Kakarountas, T Stouraitis
IEEE Transactions on Circuits and Systems I: Regular Papers 56 (6), 1202-1213, 2008
1412008
Enabling the human in the loop: Linked data and knowledge in industrial cyber-physical systems
C Emmanouilidis, P Pistofidis, L Bertoncelj, V Katsouros, A Fournaris, ...
Annual reviews in control 47, 249-265, 2019
1232019
Exploiting hardware vulnerabilities to attack embedded system devices: A survey of potent microarchitectural attacks
AP Fournaris, L Pocero Fraile, O Koufopavlou
Electronics 6 (3), 52, 2017
742017
A new RSA encryption architecture and hardware implementation based on optimized Montgomery multiplication
AP Fournaris, O Koufopavlou
2005 IEEE International Symposium on Circuits and Systems, 4645-4648, 2005
512005
Secure embedded system hardware design–A flexible security and trust enhanced approach
AP Fournaris, N Sklavos
Computers & Electrical Engineering 40 (1), 121-133, 2014
362014
Fault and simple power attack resistant RSA using Montgomery modular multiplication
AP Fournaris
Proceedings of 2010 IEEE International Symposium on Circuits and Systems …, 2010
352010
Software and hardware issues in smart card technology
G Selimis, A Fournaris, G Kostopoulos, O Koufopavlou
IEEE Communications Surveys & Tutorials 11 (3), 143-152, 2009
342009
Improved throughput bit-serial multiplier for GF (2m) fields
GN Selimis, AP Fournaris, HE Michail, O Koufopavlou
Integration 42 (2), 217-226, 2009
292009
Versatile multiplier architectures in GF (2k) fields using the Montgomery multiplication algorithm
AP Fournaris, O Koufopavlou
Integration 41 (3), 371-384, 2008
292008
Performance evaluation of post-quantum TLS 1.3 on resource-constrained embedded systems
G Tasopoulos, J Li, AP Fournaris, RK Zhao, A Sakzad, R Steinfeld
International Conference on Information Security Practice and Experience …, 2022
28*2022
Protecting CRT RSA against fault and power side channel attacks
AP Fournaris, O Koufopavlou
2012 IEEE computer society annual symposium on VLSI, 159-164, 2012
232012
An RNS architecture of an F/sub p/elliptic curve point multiplier
DM Schinianakis, AP Fournaris, AP Kakarountas, T Stouraitis
2006 IEEE International Symposium on Circuits and Systems, 5 pp., 2006
232006
Residue number system as a side channel and fault injection attack countermeasure in elliptic curve cryptography
AP Fournaris, L Papachristodoulou, L Batina, N Sklavos
2016 International Conference on Design and Technology of Integrated Systems …, 2016
222016
A high speed scalar multiplier for binary edwards curves
AP Fournaris, N Sklavos, C Koulamas
Proceedings of the Third Workshop on cryptography and Security in computing …, 2016
212016
Designing efficient elliptic Curve Diffie-Hellman accelerators for embedded systems
AP Fournaris, I Zafeirakis, C Koulamas, N Sklavos, O Koufopavlou
2015 IEEE international symposium on circuits and systems (ISCAS), 2025-2028, 2015
212015
Security and efficiency analysis of one time password techniques
I Tzemos, AP Fournaris, N Sklavos
Proceedings of the 20th Pan-Hellenic Conference on Informatics, 1-5, 2016
202016
Iot integration for adaptive manufacturing
C Alexakos, C Anagnostopoulos, A Fournaris, C Koulamas, A Kalogeras
2018 IEEE 21st International Symposium on Real-Time Distributed Computing …, 2018
192018
Profiling dilithium digital signature traces for correlation differential side channel attacks
AP Fournaris, C Dimopoulos, O Koufopavlou
International Conference on Embedded Computer Systems, 281-294, 2020
182020
Practical evaluation of protected residue number system scalar multiplication
L Papachristodoulou, AP Fournaris, K Papagiannopoulos, L Batina
182019
The system can't perform the operation now. Try again later.
Articles 1–20