Apostolos Fournaris
Apostolos Fournaris
Industrial Systems Institute, R.C. ATHENA
Verified email at - Homepage
Cited by
Cited by
Wireless security and cryptography: specifications and implementations
N Sklavos, M Manninger, X Zhang, O Koufopavlou, V Hassler, P Kitsos, ...
CRC press, 2017
An RNS Implementation of an Elliptic Curve Point Multiplier
DM Schinianakis, AP Fournaris, HE Michail, AP Kakarountas, T Stouraitis
IEEE Transactions on Circuits and Systems I: Regular Papers 56 (6), 1202-1213, 2008
Enabling the human in the loop: Linked data and knowledge in industrial cyber-physical systems
C Emmanouilidis, P Pistofidis, L Bertoncelj, V Katsouros, A Fournaris, ...
Annual reviews in control 47, 249-265, 2019
Exploiting hardware vulnerabilities to attack embedded system devices: A survey of potent microarchitectural attacks
AP Fournaris, L Pocero Fraile, O Koufopavlou
Electronics 6 (3), 52, 2017
A new RSA encryption architecture and hardware implementation based on optimized Montgomery multiplication
AP Fournaris, O Koufopavlou
2005 IEEE International Symposium on Circuits and Systems, 4645-4648, 2005
Fault and simple power attack resistant RSA using Montgomery modular multiplication
AP Fournaris
Proceedings of 2010 IEEE International Symposium on Circuits and Systems …, 2010
Software and hardware issues in smart card technology
G Selimis, A Fournaris, G Kostopoulos, O Koufopavlou
IEEE Communications Surveys & Tutorials 11 (3), 143-152, 2009
Secure embedded system hardware design–A flexible security and trust enhanced approach
AP Fournaris, N Sklavos
Computers & Electrical Engineering 40 (1), 121-133, 2014
Improved throughput bit-serial multiplier for GF (2m) fields
GN Selimis, AP Fournaris, HE Michail, O Koufopavlou
Integration 42 (2), 217-226, 2009
Versatile multiplier architectures in GF (2k) fields using the Montgomery multiplication algorithm
AP Fournaris, O Koufopavlou
Integration 41 (3), 371-384, 2008
An RNS architecture of an F/sub p/elliptic curve point multiplier
DM Schinianakis, AP Fournaris, AP Kakarountas, T Stouraitis
2006 IEEE International Symposium on Circuits and Systems, 5 pp., 2006
Protecting CRT RSA against fault and power side channel attacks
AP Fournaris, O Koufopavlou
2012 IEEE computer society annual symposium on VLSI, 159-164, 2012
Residue number system as a side channel and fault injection attack countermeasure in elliptic curve cryptography
AP Fournaris, L Papachristodoulou, L Batina, N Sklavos
2016 International Conference on Design and Technology of Integrated Systems …, 2016
Designing efficient elliptic Curve Diffie-Hellman accelerators for embedded systems
AP Fournaris, I Zafeirakis, C Koulamas, N Sklavos, O Koufopavlou
2015 IEEE international symposium on circuits and systems (ISCAS), 2025-2028, 2015
A high speed scalar multiplier for binary edwards curves
AP Fournaris, N Sklavos, C Koulamas
Proceedings of the Third Workshop on cryptography and Security in computing …, 2016
Practical evaluation of protected residue number system scalar multiplication
L Papachristodoulou, AP Fournaris, K Papagiannopoulos, L Batina
Iot integration for adaptive manufacturing
C Alexakos, C Anagnostopoulos, A Fournaris, C Koulamas, A Kalogeras
2018 IEEE 21st International Symposium on Real-Time Distributed Computing …, 2018
Security and efficiency analysis of one time password techniques
I Tzemos, AP Fournaris, N Sklavos
Proceedings of the 20th Pan-Hellenic Conference on Informatics, 1-5, 2016
Introducing hardware-based intelligence and reconfigurability on industrial IoT edge nodes
AP Fournaris, C Alexakos, C Anagnostopoulos, C Koulamas, A Kalogeras
IEEE Design & Test 36 (4), 15-23, 2019
Design and leakage assessment of side channel attack resistant binary edwards Elliptic Curve digital signature algorithm architectures
AP Fournaris, C Dimopoulos, A Moschos, O Koufopavlou
Microprocessors and microsystems 64, 73-87, 2019
The system can't perform the operation now. Try again later.
Articles 1–20