Follow
Apostolos Fournaris
Apostolos Fournaris
Industrial Systems Institute, R.C. ATHENA
Verified email at ieee.org - Homepage
Title
Cited by
Cited by
Year
Wireless security and cryptography: specifications and implementations
N Sklavos, M Manninger, X Zhang, O Koufopavlou, V Hassler, P Kitsos, ...
CRC press, 2017
1642017
An RNS Implementation of an Elliptic Curve Point Multiplier
DM Schinianakis, AP Fournaris, HE Michail, AP Kakarountas, T Stouraitis
IEEE Transactions on Circuits and Systems I: Regular Papers 56 (6), 1202-1213, 2008
1382008
Enabling the human in the loop: Linked data and knowledge in industrial cyber-physical systems
C Emmanouilidis, P Pistofidis, L Bertoncelj, V Katsouros, A Fournaris, ...
Annual reviews in control 47, 249-265, 2019
1092019
Exploiting hardware vulnerabilities to attack embedded system devices: A survey of potent microarchitectural attacks
AP Fournaris, L Pocero Fraile, O Koufopavlou
Electronics 6 (3), 52, 2017
582017
A new RSA encryption architecture and hardware implementation based on optimized Montgomery multiplication
AP Fournaris, O Koufopavlou
2005 IEEE International Symposium on Circuits and Systems, 4645-4648, 2005
502005
Fault and simple power attack resistant RSA using Montgomery modular multiplication
AP Fournaris
Proceedings of 2010 IEEE International Symposium on Circuits and Systems …, 2010
352010
Software and hardware issues in smart card technology
G Selimis, A Fournaris, G Kostopoulos, O Koufopavlou
IEEE Communications Surveys & Tutorials 11 (3), 143-152, 2009
342009
Secure embedded system hardware design–A flexible security and trust enhanced approach
AP Fournaris, N Sklavos
Computers & Electrical Engineering 40 (1), 121-133, 2014
332014
Improved throughput bit-serial multiplier for GF (2m) fields
GN Selimis, AP Fournaris, HE Michail, O Koufopavlou
Integration 42 (2), 217-226, 2009
272009
Versatile multiplier architectures in GF (2k) fields using the Montgomery multiplication algorithm
AP Fournaris, O Koufopavlou
Integration 41 (3), 371-384, 2008
272008
An RNS architecture of an F/sub p/elliptic curve point multiplier
DM Schinianakis, AP Fournaris, AP Kakarountas, T Stouraitis
2006 IEEE International Symposium on Circuits and Systems, 5 pp., 2006
232006
Protecting CRT RSA against fault and power side channel attacks
AP Fournaris, O Koufopavlou
2012 IEEE computer society annual symposium on VLSI, 159-164, 2012
222012
Residue number system as a side channel and fault injection attack countermeasure in elliptic curve cryptography
AP Fournaris, L Papachristodoulou, L Batina, N Sklavos
2016 International Conference on Design and Technology of Integrated Systems …, 2016
212016
Designing efficient elliptic Curve Diffie-Hellman accelerators for embedded systems
AP Fournaris, I Zafeirakis, C Koulamas, N Sklavos, O Koufopavlou
2015 IEEE international symposium on circuits and systems (ISCAS), 2025-2028, 2015
212015
A high speed scalar multiplier for binary edwards curves
AP Fournaris, N Sklavos, C Koulamas
Proceedings of the Third Workshop on cryptography and Security in computing …, 2016
182016
Practical evaluation of protected residue number system scalar multiplication
L Papachristodoulou, AP Fournaris, K Papagiannopoulos, L Batina
172019
Iot integration for adaptive manufacturing
C Alexakos, C Anagnostopoulos, A Fournaris, C Koulamas, A Kalogeras
2018 IEEE 21st International Symposium on Real-Time Distributed Computing …, 2018
172018
Security and efficiency analysis of one time password techniques
I Tzemos, AP Fournaris, N Sklavos
Proceedings of the 20th Pan-Hellenic Conference on Informatics, 1-5, 2016
162016
Introducing hardware-based intelligence and reconfigurability on industrial IoT edge nodes
AP Fournaris, C Alexakos, C Anagnostopoulos, C Koulamas, A Kalogeras
IEEE Design & Test 36 (4), 15-23, 2019
152019
Design and leakage assessment of side channel attack resistant binary edwards Elliptic Curve digital signature algorithm architectures
AP Fournaris, C Dimopoulos, A Moschos, O Koufopavlou
Microprocessors and microsystems 64, 73-87, 2019
152019
The system can't perform the operation now. Try again later.
Articles 1–20