Kostas Papagiannopoulos

Orcid: 0000-0002-5008-1756

According to our database1, Kostas Papagiannopoulos authored at least 26 papers between 2013 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
Combined Masking and Shuffling for Side-Channel Secure Ascon on RISC-V.
Proceedings of the Constructive Approaches for Security Analysis and Design of Embedded Systems, 2025

2024

2023
The Side-channel Metrics Cheat Sheet.
ACM Comput. Surv., 2023

Data Under Siege: The Quest for the Optimal Convolutional Autoencoder in Side-Channel Attacks.
Proceedings of the International Joint Conference on Neural Networks, 2023

2022
The Side-Channel Metric Cheat Sheet.
IACR Cryptol. ePrint Arch., 2022

Bias Cancellation of MixColumns.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2022

Low-latency implementation of the GIFT cipher on RISC-V architectures.
Proceedings of the CF '22: 19th ACM International Conference on Computing Frontiers, Turin, Italy, May 17, 2022

2021
Bitslice Masking and Improved Shuffling: How and When to Mix Them in Software?
IACR Cryptol. ePrint Arch., 2021

Boolean Exponent Splitting.
Proceedings of the 18th International Conference on Security and Cryptography, 2021

On Applying Boolean Masking to Exponents.
Proceedings of the E-Business and Telecommunications - 18th International Conference, 2021

Blind Side-Channel SIFA.
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2021

2020
On the Worst-Case Side-Channel Security of ECC Point Randomization in Embedded Devices.
Proceedings of the Progress in Cryptology - INDOCRYPT 2020, 2020

Friet: An Authenticated Encryption Scheme with Built-in Fault Detection.
Proceedings of the Advances in Cryptology - EUROCRYPT 2020, 2020

2019
Practical Evaluation of Protected Residue Number System Scalar Multiplication.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2019

Location, Location, Location: Revisiting Modeling and Exploitation for Location-Based Side Channel Leakages.
Proceedings of the Advances in Cryptology - ASIACRYPT 2019, 2019

2018
Low Randomness Masking and Shuffling: An Evaluation Using Mutual Information.
IACR Cryptol. ePrint Arch., 2018

Vectorizing Higher-Order Masking.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2018

2017
Location-based leakages: New directions in modeling and exploiting.
Proceedings of the 2017 International Conference on Embedded Computer Systems: Architectures, 2017

Side-Channel Based Intrusion Detection for Industrial Control Systems.
Proceedings of the Critical Information Infrastructures Security, 2017

Mind the Gap: Towards Secure 1st-Order Masking in Software.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2017

Instruction Duplication: Leaky and Not Too Fault-Tolerant!
Proceedings of the Smart Card Research and Advanced Applications, 2017

2016
Bitsliced Masking and ARM: Friends or Foes?
Proceedings of the Lightweight Cryptography for Security and Privacy, 2016

2015
Improving DPA resistance of S-boxes: How far can we go?
Proceedings of the 2015 IEEE International Symposium on Circuits and Systems, 2015

2014
Confused by Confusion: Systematic Evaluation of DPA Resistance of Various S-boxes.
Proceedings of the Progress in Cryptology - INDOCRYPT 2014, 2014

Optimality and beyond: The case of 4×4 S-boxes.
Proceedings of the 2014 IEEE International Symposium on Hardware-Oriented Security and Trust, 2014

2013
Speed and Size-Optimized Implementations of the PRESENT Cipher for Tiny AVR Devices.
Proceedings of the Radio Frequency Identification, 2013


  Loading...