This paper provides an overview of the research findings related to cryptographic hardware, acceleration of cryptanalytical algorithms, FPGA design automation and testing, as well as security service provisioning achieved by the author until the time of writing. The paper also refers to a few results developed in the framework of funded research projects which involved the author as a team member. The text briefly describes the implications of the main research results, indicating the corresponding publication and the essential insights behind each work
Many standard cryptographic functions are designed to benefit from hardware specific implementations...
The technical analysis used in determining which ofthe potential Advanced Encryption Standard candid...
The concept of power may be of fundamental importance in many application fields of cryptography. In...
This paper reports on the main research results achieved by the author, including activities carried...
This document presents an overview of the research activity carried out by the author until the date...
Securing data in the evermore networked world of today, is a profound necessity that is embraced by ...
With the rapid growth of the Internet and digital communications, the volume of sensitive electronic...
Empirical thesis.Bibliography: pages 339-362.1. Introduction -- 2. Background -- 3. Efficient hardwa...
This paper runs an evaluation of cryptographic algorithms (block ciphers and public key ciphers) in ...
Now a day’s large number of internet and wireless communication users has led to an increasing deman...
>When it comes to encryption, low propagation error and high throughput with minimum resources ar...
This paper presents FPGA1 implementations of two cryptanalytic attacks against DES2. Linear cryptana...
The demand for data exchange is ever growing. Internet of Things (IoT), industry 4.0, smart city and...
PhD ThesisThe field programmable gate array (FPGA) is a powerful technology, and since its introduct...
Abstract: Embedded systems find applications in fields such as defense, communications, industrial a...
Many standard cryptographic functions are designed to benefit from hardware specific implementations...
The technical analysis used in determining which ofthe potential Advanced Encryption Standard candid...
The concept of power may be of fundamental importance in many application fields of cryptography. In...
This paper reports on the main research results achieved by the author, including activities carried...
This document presents an overview of the research activity carried out by the author until the date...
Securing data in the evermore networked world of today, is a profound necessity that is embraced by ...
With the rapid growth of the Internet and digital communications, the volume of sensitive electronic...
Empirical thesis.Bibliography: pages 339-362.1. Introduction -- 2. Background -- 3. Efficient hardwa...
This paper runs an evaluation of cryptographic algorithms (block ciphers and public key ciphers) in ...
Now a day’s large number of internet and wireless communication users has led to an increasing deman...
>When it comes to encryption, low propagation error and high throughput with minimum resources ar...
This paper presents FPGA1 implementations of two cryptanalytic attacks against DES2. Linear cryptana...
The demand for data exchange is ever growing. Internet of Things (IoT), industry 4.0, smart city and...
PhD ThesisThe field programmable gate array (FPGA) is a powerful technology, and since its introduct...
Abstract: Embedded systems find applications in fields such as defense, communications, industrial a...
Many standard cryptographic functions are designed to benefit from hardware specific implementations...
The technical analysis used in determining which ofthe potential Advanced Encryption Standard candid...
The concept of power may be of fundamental importance in many application fields of cryptography. In...