关注
Kostas Papagiannopoulos
Kostas Papagiannopoulos
在 science.ru.nl 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Confused by confusion: Systematic evaluation of DPA resistance of various s-boxes
S Picek, K Papagiannopoulos, B Ege, L Batina, D Jakobovic
International Conference on Cryptology in India, 374-390, 2014
732014
Mind the gap: Towards secure 1st-order masking in software
K Papagiannopoulos, N Veshchikov
Constructive Side-Channel Analysis and Secure Design: 8th International …, 2017
652017
Friet: An Authenticated Encryption Scheme with Built-in Fault Detection
T Simon, L Batina, J Daemen, V Grosso, PMC Massolino, ...
Annual International Conference on the Theory and Applications of …, 2020
362020
Optimality and beyond: The case of 4× 4 S-boxes
S Picek, B Ege, K Papagiannopoulos, L Batina, D Jakobović
2014 IEEE International Symposium on Hardware-Oriented Security and Trust …, 2014
362014
Side-channel based intrusion detection for industrial control systems
P Van Aubel, K Papagiannopoulos, Ł Chmielewski, C Doerr
Critical Information Infrastructures Security: 12th International Conference …, 2018
262018
Instruction duplication: Leaky and not too fault-tolerant!
L Cojocar, K Papagiannopoulos, N Timmers
Smart Card Research and Advanced Applications: 16th International Conference …, 2018
232018
Bitsliced masking and ARM: Friends or foes?
W de Groot, K Papagiannopoulos, A de La Piedra, E Schneider, L Batina
Lightweight Cryptography for Security and Privacy: 5th International …, 2017
192017
Practical evaluation of protected residue number system scalar multiplication
L Papachristodoulou, AP Fournaris, K Papagiannopoulos, L Batina
182019
Vectorizing higher-order masking
B Grégoire, K Papagiannopoulos, P Schwabe, K Stoffelen
Constructive Side-Channel Analysis and Secure Design: 9th International …, 2018
182018
Location, location, location: Revisiting modeling and exploitation for location-based side channel leakages
C Andrikos, L Batina, L Chmielewski, L Lerman, V Mavroudis, ...
Advances in Cryptology–ASIACRYPT 2019: 25th International Conference on the …, 2019
162019
How old is your brain? Slow-wave activity in non-rapid-eye-movement sleep as a marker of brain rejuvenation after long-term exercise in mice
M Panagiotou, K Papagiannopoulos, JHT Rohling, JH Meijer, T Deboer
Frontiers in Aging Neuroscience 10, 233, 2018
152018
The side-channel metrics cheat sheet
K Papagiannopoulos, O Glamočanin, M Azouaoui, D Ros, F Regazzoni, ...
ACM Computing Surveys 55 (10), 1-38, 2023
142023
Towards lightweight cryptographic primitives with built-in fault-detection
T Simon, L Batina, J Daemen, V Grosso, PMC Massolino, ...
Cryptology ePrint Archive, 2018
142018
Bitslice masking and improved shuffling: How and when to mix them in software?
M Azouaoui, O Bronchain, V Grosso, K Papagiannopoulos, FX Standaert
IACR Transactions on Cryptographic Hardware and Embedded Systems, 2022
122022
Improving DPA resistance of S-boxes: How far can we go?
B Ege, K Papagiannopoulos, L Batina, S Picek
2015 IEEE International Symposium on Circuits and Systems (ISCAS), 2013-2016, 2015
122015
Blind side-channel SIFA
M Azouaoui, K Papagiannopoulos, D Zürner
2021 Design, Automation & Test in Europe Conference & Exhibition (DATE), 555-560, 2021
102021
Low randomness masking and shuffling: An evaluation using mutual information
K Papagiannopoulos
IACR Transactions on Cryptographic Hardware and Embedded Systems, 524-546, 2018
82018
On the worst-case side-channel security of ECC point randomization in embedded devices
M Azouaoui, F Durvaux, R Poussier, FX Standaert, K Papagiannopoulos, ...
Progress in Cryptology–INDOCRYPT 2020: 21st International Conference on …, 2020
72020
Boolean exponent splitting
M Tunstall, L Papachristodoulou, K Papagiannopoulos
Cryptology ePrint Archive, 2018
42018
Low-latency implementation of the GIFT cipher on RISC-V architectures
G Pojoga, K Papagiannopoulos
Proceedings of the 19th ACM International Conference on Computing Frontiers …, 2022
32022
系统目前无法执行此操作,请稍后再试。
文章 1–20