Fournaris, Apostolos P.
65  results:
Search for persons X
?
1

Providing Security Assurance & Hardening for Open Source So..:

, In: 2023 IEEE 28th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD),
 
?
2

Running Longer To Slim Down: Post-Quantum Cryptography on M..:

, In: 2023 IEEE International Conference on Omni-layer Intelligent Systems (COINS),
 
?
3

A Design Approach and Prototype Implementation for Factory ..:

, In: 2023 IEEE 21st International Conference on Industrial Informatics (INDIN),
 
?
4

Invited Paper: Dilithium Hardware-Accelerated Application U..:

, In: 2023 IEEE/ACM International Conference on Computer Aided Design (ICCAD),
 
?
5

Treating a different kind of patient: curing security weakn..:

, In: 2023 9th International Workshop on Advances in Sensors and Interfaces (IWASI),
 
?
6

Energy Consumption Evaluation of Post-Quantum TLS 1.3 for R..:

, In: Proceedings of the 20th ACM International Conference on Computing Frontiers,
 
?
7

Run-Time Detection of Malicious Behavior Based on Exploit D..:

, In: Lecture Notes in Computer Science; Embedded Computer Systems: Architectures, Modeling, and Simulation,
 
?
8

Performance Evaluation of Post-Quantum TLS 1.3 on Resource-..:

, In: Information Security Practice and Experience; Lecture Notes in Computer Science,
 
?
9

High-Level Synthesis design approach for Number-Theoretic M..:

, In: 2022 IFIP/IEEE 30th International Conference on Very Large Scale Integration (VLSI-SoC),
 
?
10

Machine-Learning Assisted Side-Channel Attacks on RNS ECC I..:

, In: Constructive Side-Channel Analysis and Secure Design; Lecture Notes in Computer Science,
 
?
14

Decentralized, Secure and Cognitive Architecture for Automo..:

, In: 2020 9th Mediterranean Conference on Embedded Computing (MECO),
 
?
15

Profiling Dilithium Digital Signature Traces for Correlatio..:

, In: Lecture Notes in Computer Science; Embedded Computer Systems: Architectures, Modeling, and Simulation,
 
1-15