Please note: This is a beta version of the new dblp website.
You can find the classic dblp view of this page here.
You can find the classic dblp view of this page here.
Nicolas Sklavos
2010 – today
- 2013
[j28]Anastasios N. Bikos, Nicolas Sklavos: LTE/SAE Security Issues on 4G Wireless Networks. IEEE Security & Privacy 11(2): 55-62 (2013)
[j27]Paris Kitsos, Nicolas Sklavos, George Provelengios, Athanassios N. Skodras: FPGA-based performance analysis of stream ciphers ZUC, Snow3g, Grain V1, Mickey V2, Trivium and E0. Microprocessors and Microsystems - Embedded Hardware Design 37(2): 235-245 (2013)- 2012
[j26]Paris Kitsos, Nicolas Sklavos, Maria Parousi, Athanassios N. Skodras: A comparative study of hardware architectures for lightweight block ciphers. Computers & Electrical Engineering 38(1): 148-160 (2012)
[c18]George Provelengios, Paris Kitsos, Nicolas Sklavos, Christos Koulamas: FPGA-based Design Approaches of Keccak Hash Function. DSD 2012: 648-653
[c17]Nicolas Sklavos, Paris Kitsos, Odysseas G. Koufopavlou: VLSI Design and Implementation of Homophonic Security System. ISVLSI 2012: 69-72
[c16]Nicolas Sklavos, Paris Kitsos: Architectural Optimizations & Hardware Implementations of WLANs Encryption Standard. NTMS 2012: 1-5- 2011
[j25]Nicolas Sklavos, Sherali Zeadally, Cristina Alcaraz: Guest Editors' Introduction to the Special Issue on "Modern trends in applied security: Architectures, implementations and applications". Computers & Electrical Engineering 37(2): 127-128 (2011)
[j24]Rodrigo Roman, Cristina Alcaraz, Javier Lopez, Nicolas Sklavos: Key management systems for sensor networks in the context of the Internet of Things. Computers & Electrical Engineering 37(2): 147-159 (2011)
[j23]
[c15]Paris Kitsos, Nicolas Sklavos, Athanassios N. Skodras: An FPGA Implementation of the ZUC Stream Cipher. DSD 2011: 814-817
[c14]- 2010
[j22]Nicolas Sklavos: On the Hardware Implementation Cost of Crypto-Processors Architectures. Information Security Journal: A Global Perspective 19(2): 53-60 (2010)
[c13]Paris Kitsos, Nicolas Sklavos, Athanassios N. Skodras: Low Power FPGA Implementations of 256-bit Luffa Hash Function. DSD 2010: 416-419
[c12]Paris Kitsos, Nicolas Sklavos: On the hardware implementation efficiency of SHA-3 candidates. ICECS 2010: 1240-1243
[c11]Nicolas Sklavos, Paris Kitsos: BLAKE HASH Function Family on FPGA: From the Fastest to the Smallest. ISVLSI 2010: 139-142
[c10]Anestis Bechtsoudis, Nicolas Sklavos: Side Channel Attacks Cryptanalysis against Block Ciphers Based on FPGA Devices. ISVLSI 2010: 460-461
2000 – 2009
- 2009
[c9]Akashi Satoh, Nicolas Sklavos: Compact and High-speed Hardware Architectures for Hash Function Tiger. ISCAS 2009: 1401-1404- 2007
[j21]Paris Kitsos, Nicolas Sklavos: Guest Editors' Introduction to the Special Issue on Security of Computers and Networks. Computers & Electrical Engineering 33(5-6): 321-323 (2007)
[j20]Sherali Zeadally, Nicolas Sklavos, Moganakrishnan Rathakrishnan, Scott Fowler: End-to-End Security Across Wired-Wireless Networks for Mobile Users. Information Systems Security 16(5): 264-277 (2007)
[j19]Nicolas Sklavos, Máire McLoone, Xinmiao Zhang: MONET Special Issue on Next Generation Hardware Architectures for Secure Mobile Computing. MONET 12(4): 229-230 (2007)
[j18]Paris Kitsos, Nicolas Sklavos, Odysseas G. Koufopavlou: UMTS security: system architecture and hardware implementation. Wireless Communications and Mobile Computing 7(4): 483-494 (2007)
[c8]Nicolas Sklavos, Spyros G. Denazis, Odysseas G. Koufopavlou: AAA and mobile networks: security aspects and architectural efficiency. MobiMedia 2007: 45
[e1]Tasos Dagiuklas, Nicolas Sklavos (Eds.): Proceedings of the 3rd International Conference on Mobile Multimedia Communications, MobiMedia 2007, Nafpaktos, Greece, August 27-29, 2007. ACM International Conference Proceeding Series 329, ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering), Brussels, Belgium 2007, ISBN 978-963-06-2670-5- 2006
[j17]Christian Rechberger, Vincent Rijmen, Nicolas Sklavos: The NIST Cryptographic Workshop on Hash Functions. IEEE Security & Privacy 4(1): 54-56 (2006)
[j16]Nicolas Sklavos, Panagiotis Souras: Economic Models & Approaches in Information Security for Computer Networks. I. J. Network Security 2(1): 14-20 (2006)
[j15]Nikolay A. Moldovyan, Alexander A. Moldovyan, Ma A. Eremeev, Nicolas Sklavos: New Class of Cryptographic Primitives and Cipher Design for Networks Security. I. J. Network Security 2(2): 114-125 (2006)
[j14]Alexander A. Moldovyan, Nick A. Moldovyan, Nicolas Sklavos: Controlled elements for designing ciphers suitable to efficient VLSI implementation. Telecommunication Systems 32(2-3): 149-163 (2006)
[j13]Nicolas Sklavos, Paris Kitsos, K. Papadopoulos, Odysseas G. Koufopavlou: Design, Architecture and Performance Evaluation of the Wireless Transport Layer Security. The Journal of Supercomputing 36(1): 33-50 (2006)- 2005
[j12]Nicolas Sklavos, Odysseas G. Koufopavlou: On the hardware implementation of RIPEMD processor: Networking high speed hashing, up to 2Gbps. Computers & Electrical Engineering 31(6): 361-379 (2005)
[j11]Nick A. Moldovyan, Nicolas Sklavos, Odysseas G. Koufopavlou: Pure DDP-Based Cipher: Architecture Analysis, Hardware Implementation Cost and Performance up to 6.5 Gbps. Int. Arab J. Inf. Technol. 2(1): 24-32 (2005)
[j10]Michalis D. Galanis, Paris Kitsos, Giorgos Kostopoulos, Nicolas Sklavos, Constantinos E. Goutis: Comparison of the Hardware Implementation of Stream Ciphers. Int. Arab J. Inf. Technol. 2(4): 267-274 (2005)
[j9]Nicolas Sklavos, Odysseas G. Koufopavlou: Access Control in Networks Hierarchy: Implementation of Key Management Protocol. I. J. Network Security 1(2): 103-109 (2005)
[j8]Nicolas Sklavos, Nick A. Moldovyan, Odysseas G. Koufopavlou: High Speed Networking Security: Design and Implementation of Two New DDP-Based Ciphers. MONET 10(1-2): 219-231 (2005)
[j7]Nicolas Sklavos, Odysseas G. Koufopavlou: Implementation of the SHA-2 Hash Family Standard Using FPGAs. The Journal of Supercomputing 31(3): 227-248 (2005)
[c7]Odysseas G. Koufopavlou, George N. Selimis, Nicolas Sklavos, Paris Kitsos: Cryptography: Circuits and Systems Approach. PATMOS 2005: 750- 2004
[j6]Paris Kitsos, Nicolas Sklavos, Michalis D. Galanis, Odysseas G. Koufopavlou: 64-bit Block ciphers: hardware implementations and comparison analysis. Computers & Electrical Engineering 30(8): 593-604 (2004)
[j5]Nicolas Sklavos, Nick A. Moldovyan, Vladimir Gorodetsky, Odysseas G. Koufopavlou: Computer Network Security: Report from MMM-ACNS. IEEE Security & Privacy 2(1): 49-52 (2004)
[j4]Nicolas Sklavos, Paris Kitsos, Epaminondas Alexopoulos, Odysseas G. Koufopavlou: Open Mobile Alliance (OMA) Security Layer: Architecture, Implementation and Performance Evaluation of the Integrity Unit. New Generation Comput. 23(1): 77-100 (2004)
[c6]Nick A. Moldovyan, Ma A. Eremeev, Nicolas Sklavos, Odysseas G. Koufopavlou: New class of the FPGA efficient cryptographic primitives. ISCAS (2) 2004: 553-556- 2003
[j3]Nicolas Sklavos, Odysseas G. Koufopavlou: Data dependent rotations, a trustworthy approach for future encryption systems/ciphers: low cost and high performance. Computers & Security 22(7): 585-588 (2003)
[j2]Nicolas Sklavos, Epaminondas Alexopoulos, Odysseas G. Koufopavlou: Networking Data Integrity: High Speed Architectures and Hardware Implementations. Int. Arab J. Inf. Technol. 1(0) (2003)
[c5]Nicolas Sklavos, Odysseas G. Koufopavlou: On the hardware implementations of the SHA-2 (256, 384, 512) hash functions. ISCAS (5) 2003: 153-156
[c4]Nicolas Sklavos, Alexander A. Moldovyan, Odysseas G. Koufopavlou: Encryption and Data Dependent Permutations: Implementation Cost and Performance Evaluation. MMM-ACNS 2003: 337-348
[c3]Nicolas Sklavos, Odysseas G. Koufopavlou: Architectures and FPGA Implementations of the SCO(-1, -2, -3) Ciphers Family. VLSI-SOC 2003: 68-73- 2002
[j1]Nicolas Sklavos, Odysseas G. Koufopavlou: Architectures and VLSI Implementations of the AES-Proposal Rijndael. IEEE Trans. Computers 51(12): 1454-1459 (2002)
[c2]Nicolas Sklavos, Paris Kitsos, K. Papadomanolakis, Odysseas G. Koufopavlou: Random number generator architecture and VLSI implementation. ISCAS (4) 2002: 854-857
[c1]Paris Kitsos, Nicolas Sklavos, Nicolas G. Koufopavlou: Hardware implementation of the SAFER+ encryption algorithm for the Bluetooth system. ISCAS (4) 2002: 878-881
Coauthor Index
data released under the ODC-BY 1.0 license. See also our legal information page
last updated on 2013-10-02 11:10 CEST by the dblp team



