Michael E. Kounavis

According to our database1, Michael E. Kounavis authored at least 42 papers between 1998 and 2020.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2020
Κ-Cipher: A Low Latency, Bit Length Parameterizable Cipher.
IACR Cryptol. ePrint Arch., 2020

Gimli Encryption in 715.9 psec.
IACR Cryptol. ePrint Arch., 2020

Security definitions, entropy measures and constructions for implicitly detecting data corruption.
Comput. Commun., 2020

2019
IVP: A Three Level Confusion-Diffusion Network Supporting Implicit Data Integrity.
Proceedings of the 2019 IEEE Symposium on Computers and Communications, 2019

Mitigating Both Data Corruption and Content Replay Attacks with Implicit Data Integrity.
Proceedings of the 2019 IEEE Symposium on Computers and Communications, 2019

2018
Cryptographic Constructions Supporting Implicit Data Integrity.
IACR Cryptol. ePrint Arch., 2018

ADAGIO: Interactive Experimentation with Adversarial Attack and Defense for Audio.
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2018

SHIELD: Fast, Practical Defense and Vaccination for Deep Learning using JPEG Compression.
Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, 2018

Implicit Data Integrity: Protecting User Data without MACs.
Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, 2018

There is No Need to Waste Communication Bandwidth on MACs.
Proceedings of the 2018 Global Information Infrastructure and Networking Symposium, 2018

2017
Keeping the Bad Guys Out: Protecting and Vaccinating Deep Learning with JPEG Compression.
CoRR, 2017

Fingertip detection without the use of depth data, color information, or large training data sets.
Proceedings of the 2017 IEEE International Conference on Systems, Man, and Cybernetics, 2017

Non-recursive computation of the probability of more than two people having the same birthday.
Proceedings of the 2017 IEEE Symposium on Computers and Communications, 2017

The object class intrinsic filter conjecture.
Proceedings of the 2017 International Joint Conference on Neural Networks, 2017

2011
53 Gbps Native GF(2 <sup>4</sup>) <sup>2</sup> Composite-Field AES-Encrypt/Decrypt Accelerator for Content-Protection in 45 nm High-Performance Microprocessors.
IEEE J. Solid State Circuits, 2011

Security Enhancement of the Vortex Family of Hash Functions.
IACR Cryptol. ePrint Arch., 2011

Detecting non-transient anomalies in visual information using neural networks.
Proceedings of the 16th IEEE Symposium on Computers and Communications, 2011

2010
Efficient implementation of the Galois Counter Mode using a carry-less multiplier and a fast reduction algorithm.
Inf. Process. Lett., 2010

Encrypting the internet.
Proceedings of the ACM SIGCOMM 2010 Conference on Applications, 2010

System-wide anatomy and tuning of a SPECweb SSL server.
Proceedings of the 15th IEEE Symposium on Computers and Communications, 2010

Mitigating collision and preimage attacks against the generalized MDC-2 mode of operation.
Proceedings of the 15th IEEE Symposium on Computers and Communications, 2010

3GHz, 74mW 2-level Karatsuba 64b Galois field multiplier for public-key encryption acceleration in 45nm CMOS.
Proceedings of the 36th European Solid-State Circuits Conference, 2010

2008
Novel Table Lookup-Based Algorithms for High-Performance CRC Generation.
IEEE Trans. Computers, 2008

Vortex: A New Family of One Way Hash Functions based on Rijndael Rounds and Carry-less Multiplication.
IACR Cryptol. ePrint Arch., 2008

An Event-Driven, Inclusionary and Secure Approach to Kernel Integrity.
Proceedings of the SECRYPT 2008, 2008

A Technique for Accelerating Characteristic 2 Elliptic Curve Cryptography.
Proceedings of the Fifth International Conference on Information Technology: New Generations (ITNG 2008), 2008

Vortex: A New Family of One-Way Hash Functions Based on AES Rounds and Carry-Less Multiplication.
Proceedings of the Information Security, 11th International Conference, 2008

Fast multiplication techniques for public key cryptography.
Proceedings of the 13th IEEE Symposium on Computers and Communications (ISCC 2008), 2008

RKRD: Runtime Kernel Rootkit Detection.
Proceedings of the e-Business and Telecommunications - International Conference, 2008

2007
Two stage packet classification using most specific filter matching and transport level sharing.
Comput. Networks, 2007

Sorting Packets by Packet Schedulers Using a Connected Trie Data Structure.
Proceedings of the INFOCOM 2007. 26th IEEE International Conference on Computer Communications, 2007

2006
Seamless Connectivity in Infrastructure-Based Networks.
Proceedings of the Handbook of Mobile Middleware., 2006

2005
Programming the data path in network processor-based routers.
Softw. Pract. Exp., 2005

A Systematic Approach to Building High Performance Software-Based CRC Generators.
Proceedings of the 10th IEEE Symposium on Computers and Communications (ISCC 2005), 2005

A Scalable and High Performance Software iSCSI Implementation.
Proceedings of the FAST '05 Conference on File and Storage Technologies, 2005

2001
Design, Implementation and Evaluation of Programmable Handoff in Mobile Networks.
Mob. Networks Appl., 2001

The Genesis Kernel: a programming system for spawning network architectures.
IEEE J. Sel. Areas Commun., 2001

Programmable Networks.
Proceedings of the Informatics - 10 Years Back. 10 Years Ahead., 2001

2000
Programming Internet Quality of Service.
Proceedings of the Trends in Distributed Systems: Towards a Universal Service Market, 2000

1999
Programmable mobile networks.
Comput. Networks, 1999

A survey of programmable networks.
Comput. Commun. Rev., 1999

1998
The mobiware toolkit: programmable support for adaptive mobile networking.
IEEE Wirel. Commun., 1998


  Loading...