Key management systems for sensor networks in the context of the Internet of Things R Roman, C Alcaraz, J Lopez, N Sklavos Computers & Electrical Engineering 37 (2), 147-159, 2011 | 398 | 2011 |
Architectures and VLSI implementations of the AES-proposal Rijndael N Sklavos, O Koufopavlou IEEE Transactions on computers 51 (12), 1454-1459, 2002 | 186 | 2002 |
Wireless security and cryptography: specifications and implementations N Sklavos, X Zhang CRC Press, 2007 | 159* | 2007 |
LTE/SAE security issues on 4G wireless networks A N. Bikos, N Sklavos IEEE Security & Privacy 11 (2), 55-62, 2013 | 147 | 2013 |
On the hardware implementations of the SHA-2 (256, 384, 512) hash functions N Sklavos, O Koufopavlou Proceedings of the 2003 International Symposium on Circuits and Systems …, 2003 | 120 | 2003 |
Implementation of the SHA-2 hash family standard using FPGAs N Sklavos, O Koufopavlou The journal of Supercomputing 31, 227-248, 2005 | 119 | 2005 |
Hardware implementation of the RC4 stream cipher P Kitsos, G Kostopoulos, N Sklavos, O Koufopavlou 2003 46th Midwest symposium on circuits and systems 3, 1363-1366, 2003 | 104 | 2003 |
Cryptographic technologies and protocol standards for Internet of Things S Zeadally, AK Das, N Sklavos Internet of Things 14, 2021 | 92 | 2021 |
Hardware Implementation of Bluetooth Security P Kitsos, N Sklavos, K Papadomanolakis, O Koufopavlou IEEE Pervasive Computing, Mobile and Ubiquitous Systems 2 (1), 21-29, 2003 | 81 | 2003 |
Mobile Communications World: Security Implementations Aspects - A State of the Art N Sklavos, O Koufopavlou CSJM 11 (2), 168-187, 2003 | 71* | 2003 |
Cryptography and Security in Internet of Things (IoT): Models, Schemes, and Implementations N Sklavos, ID Zaharakis 8th IFIP International Conference on New Technologies, Mobility and Security …, 2016 | 69 | 2016 |
High speed networking security: design and implementation of two new DDP-based ciphers N Sklavos, NA Moldovyan, O Koufopavlou Mobile Networks and Applications 10, 219-231, 2005 | 60 | 2005 |
A comparative study of hardware architectures for lightweight block ciphers P Kitsos, N Sklavos, M Parousi, AN Skodras Computers & Electrical Engineering 38 (1), 148-160, 2012 | 57 | 2012 |
Smart Home Automation: GSM Security System Design & Implementation E Isa, N Sklavos 3rd Pan-Hellinic Conference on Electronics and Telecommunications (PACET'15 …, 2017 | 56 | 2017 |
Aiming at higher network security through extensive penetration tests A Bechtsoudis, N Sklavos IEEE Latin America Transactions 10 (3), 1752-1756, 2012 | 56 | 2012 |
Comparison of the hardware architectures and FPGA implementations of stream ciphers MD Galanis, P Kitsos, G Kostopoulos, N Sklavos, O Koufopavlou, ... Proceedings of the 2004 11th IEEE International Conference on Electronics …, 2004 | 55 | 2004 |
On the hardware implementation cost of crypto-processors architectures N Sklavos Information Security Journal: A Global Perspective 19 (2), 53-60, 2010 | 51 | 2010 |
FPGA-based performance analysis of stream ciphers ZUC, Snow3g, Grain V1, Mickey V2, Trivium and E0 P Kitsos, N Sklavos, G Provelengios, AN Skodras Microprocessors and Microsystems 37 (2), 235-245, 2013 | 50 | 2013 |
An ultra high speed architecture for VLSI implementation of hash functions N Sklavos, G Dimitroulakos, O Koufopavlou 10th IEEE International Conference on Electronics, Circuits and Systems …, 2003 | 48 | 2003 |
Networking data integrity: High speed architectures and hardware implementations N Sklavos, E Alexopoulos, O Koufopavlou IAJIT 1 (0), 2003 | 48 | 2003 |