Kostas Papagiannopoulos

Orcid: 0000-0002-5008-1756

According to our database1, Kostas Papagiannopoulos authored at least 24 papers between 2013 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
The Side-channel Metrics Cheat Sheet.
ACM Comput. Surv., 2023

Data Under Siege: The Quest for the Optimal Convolutional Autoencoder in Side-Channel Attacks.
Proceedings of the International Joint Conference on Neural Networks, 2023

2022
Bitslice Masking and Improved Shuffling: How and When to Mix Them in Software?
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2022

Low-latency implementation of the GIFT cipher on RISC-V architectures.
IACR Cryptol. ePrint Arch., 2022

The Side-Channel Metric Cheat Sheet.
IACR Cryptol. ePrint Arch., 2022

Bias Cancellation of MixColumns.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2022

2021
Blind Side-Channel SIFA.
IACR Cryptol. ePrint Arch., 2021

On Applying Boolean Masking to Exponents.
Proceedings of the E-Business and Telecommunications - 18th International Conference, 2021

2020
Friet: An Authenticated Encryption Scheme with Built-in Fault Detection.
IACR Cryptol. ePrint Arch., 2020

On the Worst-Case Side-Channel Security of ECC Point Randomization in Embedded Devices.
IACR Cryptol. ePrint Arch., 2020

2019
Practical Evaluation of Protected Residue Number System Scalar Multiplication.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2019

Location, location, location: Revisiting modeling and exploitation for location-based side channel leakages.
IACR Cryptol. ePrint Arch., 2019

2018
Low Randomness Masking and Shuffling: An Evaluation Using Mutual Information.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2018

Boolean Exponent Splitting.
IACR Cryptol. ePrint Arch., 2018

Vectorizing Higher-Order Masking.
IACR Cryptol. ePrint Arch., 2018

2017
Mind the Gap: Towards Secure 1st-order Masking in Software.
IACR Cryptol. ePrint Arch., 2017

Instruction Duplication: Leaky and Not Too Fault-Tolerant!
IACR Cryptol. ePrint Arch., 2017

Location-based leakages: New directions in modeling and exploiting.
Proceedings of the 2017 International Conference on Embedded Computer Systems: Architectures, 2017

Side-Channel Based Intrusion Detection for Industrial Control Systems.
Proceedings of the Critical Information Infrastructures Security, 2017

2016
Bitsliced Masking and ARM: Friends or Foes?
IACR Cryptol. ePrint Arch., 2016

2015
Improving DPA resistance of S-boxes: How far can we go?
Proceedings of the 2015 IEEE International Symposium on Circuits and Systems, 2015

2014
Confused by Confusion: Systematic Evaluation of DPA Resistance of Various S-boxes.
Proceedings of the Progress in Cryptology - INDOCRYPT 2014, 2014

Optimality and beyond: The case of 4×4 S-boxes.
Proceedings of the 2014 IEEE International Symposium on Hardware-Oriented Security and Trust, 2014

2013
Speed and Size-Optimized Implementations of the PRESENT Cipher for Tiny AVR Devices.
Proceedings of the Radio Frequency Identification, 2013


  Loading...