default search action
Kostas Papagiannopoulos
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c20]Francesco Regazzoni, Gergely Ács, Albert Zoltan Aszalos, Christos Avgerinos, Nikolaos Bakalos, Josep Lluis Berral, Joppe W. Bos, Marco Brohet, Andrés G. Castillo Sanz, Gareth T. Davies, Stefanos Florescu, Pierre-Elisée Flory, Alberto Gutierrez-Torre, Evangelos Haleplidis, Alice Héliou, Sotirios Ioannidis, Alexander Islam El-Kady, Katarzyna Kapusta, Konstantina Karagianni, Pieter Kruizinga, Kyrian Maat, Zoltán Ádám Mann, Kalliopi Mastoraki, SeoJeong Moon, Maja Nisevic, Balázs Pejó, Kostas Papagiannopoulos, Vassilis Paliouras, Paolo Palmieri, Francesca Palumbo, Juan Carlos Pérez Baun, Péter Pollner, Eduard Porta-Pardo, Luca Pulina, Muhammad Ali Siddiqi, Daniela Spajic, Christos Strydis, Georgios Tasopoulos, Vincent Thouvenot, Christos Tselios, Apostolos P. Fournaris:
SECURED for Health: Scaling Up Privacy to Enable the Integration of the European Health Data Space. DATE 2024: 1-4 - 2023
- [j4]Kostas Papagiannopoulos, Ognjen Glamocanin, Melissa Azouaoui, Dorian Ros, Francesco Regazzoni, Mirjana Stojilovic:
The Side-channel Metrics Cheat Sheet. ACM Comput. Surv. 55(10): 216:1-216:38 (2023) - [c19]Danny van den Berg, Tom Slooff, Marco Brohet, Kostas Papagiannopoulos, Francesco Regazzoni:
Data Under Siege: The Quest for the Optimal Convolutional Autoencoder in Side-Channel Attacks. IJCNN 2023: 1-9 - 2022
- [j3]Melissa Azouaoui, Olivier Bronchain, Vincent Grosso, Kostas Papagiannopoulos, François-Xavier Standaert:
Bitslice Masking and Improved Shuffling: How and When to Mix Them in Software? IACR Trans. Cryptogr. Hardw. Embed. Syst. 2022(2): 140-165 (2022) - [c18]Gheorghe Pojoga, Kostas Papagiannopoulos:
Low-latency implementation of the GIFT cipher on RISC-V architectures. CF 2022: 287-295 - [c17]Subhadeep Banik, Andrea Caforio, Kostas Papagiannopoulos, Francesco Regazzoni:
Bias Cancellation of MixColumns. SPACE 2022: 70-80 - [i14]Kostas Papagiannopoulos, Ognjen Glamocanin, Melissa Azouaoui, Dorian Ros, Francesco Regazzoni, Mirjana Stojilovic:
The Side-Channel Metric Cheat Sheet. IACR Cryptol. ePrint Arch. 2022: 253 (2022) - [i13]Gheorghe Pojoga, Kostas Papagiannopoulos:
Low-latency implementation of the GIFT cipher on RISC-V architectures. IACR Cryptol. ePrint Arch. 2022: 1399 (2022) - 2021
- [c16]Melissa Azouaoui, Kostas Papagiannopoulos, Dominik Zürner:
Blind Side-Channel SIFA. DATE 2021: 555-560 - [c15]Michael Tunstall, Louiza Papachristodoulou, Kostas Papagiannopoulos:
On Applying Boolean Masking to Exponents. ICETE (Selected Papers) 2021: 334-361 - [c14]Michael Tunstall, Louiza Papachristodoulou, Kostas Papagiannopoulos:
Boolean Exponent Splitting. SECRYPT 2021: 321-332 - [i12]Melissa Azouaoui, Kostas Papagiannopoulos, Dominik Zürner:
Blind Side-Channel SIFA. IACR Cryptol. ePrint Arch. 2021: 685 (2021) - [i11]Melissa Azouaoui, Olivier Bronchain, Vincent Grosso, Kostas Papagiannopoulos, François-Xavier Standaert:
Bitslice Masking and Improved Shuffling: How and When to Mix Them in Software? IACR Cryptol. ePrint Arch. 2021: 951 (2021) - 2020
- [c13]Thierry Simon, Lejla Batina, Joan Daemen, Vincent Grosso, Pedro Maat Costa Massolino, Kostas Papagiannopoulos, Francesco Regazzoni, Niels Samwel:
Friet: An Authenticated Encryption Scheme with Built-in Fault Detection. EUROCRYPT (1) 2020: 581-611 - [c12]Melissa Azouaoui, François Durvaux, Romain Poussier, François-Xavier Standaert, Kostas Papagiannopoulos, Vincent Verneuil:
On the Worst-Case Side-Channel Security of ECC Point Randomization in Embedded Devices. INDOCRYPT 2020: 205-227 - [i10]Thierry Simon, Lejla Batina, Joan Daemen, Vincent Grosso, Pedro Maat Costa Massolino, Kostas Papagiannopoulos, Francesco Regazzoni, Niels Samwel:
Friet: An Authenticated Encryption Scheme with Built-in Fault Detection. IACR Cryptol. ePrint Arch. 2020: 425 (2020) - [i9]Melissa Azouaoui, François Durvaux, Romain Poussier, François-Xavier Standaert, Kostas Papagiannopoulos, Vincent Verneuil:
On the Worst-Case Side-Channel Security of ECC Point Randomization in Embedded Devices. IACR Cryptol. ePrint Arch. 2020: 1368 (2020)
2010 – 2019
- 2019
- [j2]Louiza Papachristodoulou, Apostolos P. Fournaris, Kostas Papagiannopoulos, Lejla Batina:
Practical Evaluation of Protected Residue Number System Scalar Multiplication. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2019(1): 259-282 (2019) - [c11]Christos Andrikos, Lejla Batina, Lukasz Chmielewski, Liran Lerman, Vasilios Mavroudis, Kostas Papagiannopoulos, Guilherme Perin, Giorgos Rassias, Alberto Sonnino:
Location, Location, Location: Revisiting Modeling and Exploitation for Location-Based Side Channel Leakages. ASIACRYPT (3) 2019: 285-314 - [i8]Christos Andrikos, Lejla Batina, Lukasz Chmielewski, Liran Lerman, Vasilios Mavroudis, Kostas Papagiannopoulos, Guilherme Perin, Giorgos Rassias, Alberto Sonnino:
Location, location, location: Revisiting modeling and exploitation for location-based side channel leakages. IACR Cryptol. ePrint Arch. 2019: 230 (2019) - 2018
- [j1]Kostas Papagiannopoulos:
Low Randomness Masking and Shuffling: An Evaluation Using Mutual Information. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2018(3): 524-546 (2018) - [c10]Benjamin Grégoire, Kostas Papagiannopoulos, Peter Schwabe, Ko Stoffelen:
Vectorizing Higher-Order Masking. COSADE 2018: 23-43 - [i7]Benjamin Grégoire, Kostas Papagiannopoulos, Peter Schwabe, Ko Stoffelen:
Vectorizing Higher-Order Masking. IACR Cryptol. ePrint Arch. 2018: 173 (2018) - [i6]Kostas Papagiannopoulos:
Low Randomness Masking and Shuffling: An Evaluation Using Mutual Information. IACR Cryptol. ePrint Arch. 2018: 825 (2018) - [i5]Michael Tunstall, Louiza Papachristodoulou, Kostas Papagiannopoulos:
Boolean Exponent Splitting. IACR Cryptol. ePrint Arch. 2018: 1226 (2018) - 2017
- [c9]Lucian Cojocar, Kostas Papagiannopoulos, Niek Timmers:
Instruction Duplication: Leaky and Not Too Fault-Tolerant! CARDIS 2017: 160-179 - [c8]Kostas Papagiannopoulos, Nikita Veshchikov:
Mind the Gap: Towards Secure 1st-Order Masking in Software. COSADE 2017: 282-297 - [c7]Pol Van Aubel, Kostas Papagiannopoulos, Lukasz Chmielewski, Christian Doerr:
Side-Channel Based Intrusion Detection for Industrial Control Systems. CRITIS 2017: 207-224 - [c6]Christos Andrikos, Giorgos Rassias, Liran Lerman, Kostas Papagiannopoulos, Lejla Batina:
Location-based leakages: New directions in modeling and exploiting. SAMOS 2017: 246-252 - [i4]Pol Van Aubel, Kostas Papagiannopoulos, Lukasz Chmielewski, Christian Doerr:
Side-channel based intrusion detection for industrial control systems. CoRR abs/1712.05745 (2017) - [i3]Kostas Papagiannopoulos, Nikita Veshchikov:
Mind the Gap: Towards Secure 1st-order Masking in Software. IACR Cryptol. ePrint Arch. 2017: 345 (2017) - [i2]Lucian Cojocar, Kostas Papagiannopoulos, Niek Timmers:
Instruction Duplication: Leaky and Not Too Fault-Tolerant! IACR Cryptol. ePrint Arch. 2017: 1082 (2017) - 2016
- [c5]Wouter de Groot, Kostas Papagiannopoulos, Antonio de la Piedra, Erik Schneider, Lejla Batina:
Bitsliced Masking and ARM: Friends or Foes? LightSec 2016: 91-109 - [i1]Wouter de Groot, Kostas Papagiannopoulos, Antonio de la Piedra, Erik Schneider, Lejla Batina:
Bitsliced Masking and ARM: Friends or Foes? IACR Cryptol. ePrint Arch. 2016: 946 (2016) - 2015
- [c4]Baris Ege, Kostas Papagiannopoulos, Lejla Batina, Stjepan Picek:
Improving DPA resistance of S-boxes: How far can we go? ISCAS 2015: 2013-2016 - 2014
- [c3]Stjepan Picek, Baris Ege, Kostas Papagiannopoulos, Lejla Batina, Domagoj Jakobovic:
Optimality and beyond: The case of 4×4 S-boxes. HOST 2014: 80-83 - [c2]Stjepan Picek, Kostas Papagiannopoulos, Baris Ege, Lejla Batina, Domagoj Jakobovic:
Confused by Confusion: Systematic Evaluation of DPA Resistance of Various S-boxes. INDOCRYPT 2014: 374-390 - 2013
- [c1]Konstantinos Papagiannopoulos, Aram Verstegen:
Speed and Size-Optimized Implementations of the PRESENT Cipher for Tiny AVR Devices. RFIDSec 2013: 161-175
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-01 21:41 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint