Search Results - "Koufopavlou, O."

Refine Results
  1. 1

    Architectures and VLSI implementations of the AES-Proposal Rijndael by Sklavos, N., Koufopavlou, O.

    Published in IEEE transactions on computers (01-12-2002)
    “…Two architectures and VLSI implementations of the AES Proposal, Rijndael, are presented in this paper. These alternative architectures are operated both for…”
    Get full text
    Journal Article
  2. 2
  3. 3

    Versatile multiplier architectures in GF ( 2 k ) fields using the Montgomery multiplication algorithm by Fournaris, Apostolos P., Koufopavlou, O.

    Published in Integration (Amsterdam) (01-05-2008)
    “…Many sequential multipliers for polynomial basis GF ( 2 k ) fields have been proposed using the LSbit and MSbit multiplication algorithm. However, all those…”
    Get full text
    Journal Article
  4. 4

    Software and Hardware Issues in Smart Card Technology by Selimis, G., Fournaris, A., Kostopoulos, G., Koufopavlou, O.

    Published in IEEE Communications surveys and tutorials (01-01-2009)
    “…An efficient and strongly secure smart card mechanism involves the use of a technological background taken from the fields of computers, VLSI design and…”
    Get full text
    Journal Article
  5. 5

    Analytical transient response and propagation delay evaluation of the CMOS inverter for short-channel devices by Bisdounis, L., Nikolaidis, S., Koufopavlou, O.

    Published in IEEE journal of solid-state circuits (01-02-1998)
    “…In this paper an accurate, analytical model for the evaluation of the CMOS inverter transient response and propagation delay for short-channel devices is…”
    Get full text
    Journal Article
  6. 6

    High Speed Networking Security: Design and Implementation of Two New DDP-Based Ciphers by Sklavos, N, Moldovyan, N A, Koufopavlou, O

    Published in Mobile networks and applications (01-02-2005)
    “…Using Data-Dependent (DD) Permutations (DDP) as main cryptographic primitive two new ciphers are presented: ten-round Cobra-H64, and twelve-round Cobra-H128…”
    Get full text
    Journal Article
  7. 7

    Efficient architecture and hardware implementation of the Whirlpool hash function by Kitsos, P., Koufopavlou, O.

    Published in IEEE transactions on consumer electronics (01-02-2004)
    “…The latest cryptographical applications demand both high speed and high security. In this paper, an architecture and VLSI implementation of the newest powerful…”
    Get full text
    Journal Article
  8. 8

    Applying systolic multiplication–inversion architectures based on modified extended Euclidean algorithm for GF(2 k ) in elliptic curve cryptography by Fournaris, Apostolos P., Koufopavlou, O.

    Published in Computers & electrical engineering (01-09-2007)
    “…Elliptic curve cryptography is a very promising cryptographic method offering the same security level as traditional public key cryptosystems (RSA, El Gamal)…”
    Get full text
    Journal Article
  9. 9

    Full custom low-power/high performance DDP-based Cobra-H64 cipher by Rjoub, A., Mousameh, M., Koufopavlou, O.

    “…This paper presents, for the first time, a full custom layout design for a Data Dependent Permutation (DDP)-Cobra H64-bit cipher, using pipelining techniques…”
    Get full text
    Journal Article
  10. 10

    On the hardware implementation of RIPEMD processor: Networking high speed hashing, up to 2 Gbps by Sklavos, N., Koufopavlou, O.

    Published in Computers & electrical engineering (01-09-2005)
    “…The continued growth of both wired and wireless communications has triggered the revolution for high speed security implementations. RIPEMD hash functions are…”
    Get full text
    Journal Article
  11. 11
  12. 12

    Exploring the FPGA Implementations of the LBlock, Piccolo, Twine, and Klein Ciphers by Moraitis, S., Seitanidis, D., Theodoridis, G., Koufopavlou, O.

    “…In this work, the implementations of the LBlock, Piccolo, Twine, and Klein lightweight ciphers in FPGA technology are studied in terms of area, frequency,…”
    Get full text
    Conference Proceeding
  13. 13

    Hardware implementation of Bluetooth security by Kitsos, P., Sklavos, N., Papadomanolakis, K., Koufopavlou, O.

    Published in IEEE pervasive computing (01-01-2003)
    “…Bluetooth can implement its security layer's key-generation mechanism and authentication in software or hardware. Software implementation usually satisfies…”
    Get full text
    Journal Article
  14. 14

    On the hardware implementation of RIPEMD processor: Networking high speed hashing, up to 2Gbps by Sklavos, N., Koufopavlou, O.

    Published in Computers & electrical engineering (01-09-2005)
    “…The continued growth of both wired and wireless communications has triggered the revolution for high speed security implementations. RIPEMD hash functions are…”
    Get full text
    Journal Article
  15. 15

    A new RSA encryption architecture and hardware implementation based on optimized Montgomery multiplication by Fournaris, A.P., Koufopavlou, O.

    “…RSA is a widely acceptable and well used algorithm in many security applications. Its main mathematical function is the demanding, in terms of speed, operation…”
    Get full text
    Conference Proceeding
  16. 16

    Data dependent rotations, a trustworthy approach for future encryption systems/ciphers: low cost and high performance by Sklavos, N, Koufopavlou, O

    Published in Computers & security (01-01-2003)
    “…This work focuses an alternative direction of cryptography, based on Data Dependent Rotations (DDR). This methodology gives many promises for secure…”
    Get full text
    Journal Article
  17. 17

    Hardware implementation of the RC4 stream cipher by Kitsos, P., Kostopoulos, G., Sklavos, N., Koufopavlou, O.

    “…In this paper, an efficient hardware implementation of the RC4 stream-cipher is proposed. In contrary to previous designs, which support only fixed length key,…”
    Get full text
    Conference Proceeding
  18. 18

    A Low-Cost Inband FEC Scheme for SONET/SDH Optical Metro Networks by Tychopoulos, A., Papagiannakis, I., Klonidis, D., Tzanakaki, A., Kikidis, J., Koufopavlou, O., Tomkos, I.

    Published in IEEE photonics technology letters (15-12-2006)
    “…A novel inband forward-error correction (FEC) method, devised for the electronic-mitigation of physical optical transmission impairments, is implemented and…”
    Get full text
    Journal Article
  19. 19

    64-bit Block ciphers: hardware implementations and comparison analysis by Kitsos, P., Sklavos, N., Galanis, M.D., Koufopavlou, O.

    Published in Computers & electrical engineering (01-11-2004)
    “…A performance comparison for the 64-bit block cipher (Triple-DES, IDEA, CAST-128, MISTY1, and KHAZAD) FPGA hardware implementations is given in this paper. All…”
    Get full text
    Journal Article
  20. 20

    A low-power and high-throughput implementation of the SHA-1 hash function by Michail, H., Kakarountas, A.P., Koufopavlou, O., Goutis, C.E.

    “…The main applications of the hash functions are met in the fields of communication integrity and signature authentication. A hash function is utilized in the…”
    Get full text
    Conference Proceeding