Skip navigation.
Home
Network Architectures and Management group

Dr. Apostolos P. Fournaris

 

STUDIES

September 2002 – December 2007. Phd Degree in Electrical and Computer Engineering, University of Patras (Greece), School of Engineering, Department of Electrical and Computer Engineering.
Phd Thesis: Public Key Cryptographic System Design

September 1996 - November 2001. Diploma in Electrical and Computer Engineering, University of Patras ( Greece ), School of Engineering , Department of Electrical & Computer Engineering,
Diploma Thesis: “Methods of Indirect Frequency Synthesis using a Dual Input Phase Accumulator (D.I.P.A)”.
________________________________________

RESEARCH INTERESTS-EXPERTISE

  • Hardware (processors co-processors)  and software architectures for Security applications (cryptographic operations)
  • Hardware-Physical attack resistance techniques (Side channel attacks, fault attacks, Hardware Trojans, PUFs).
  • Cryptographic Engineering (Algorithms and Architectures).
  • Wired-Wireless and Distributed Network Security
  • Computer Arithmetics for Cryptography, Finite Field Arithmetic, Public Key and Elliptic Curves Cryptography
  • Trusted Computing Systems
  • Computer Trusted Virtualization (trusted hypervisors, Isolation, malicious code detection)
  • Embedded System/ Cyber-Physical system design and security.
  • VLSI Design on ASICs - FPGAs

________________________________________

R & D PROJECTS PARTICIPATION

  1. Research Project: "CIPSEC: Enhancing Critical Infrastructure Protection with innovative SECurity framework", EU Horizon 2020 innovation action project with the University of Patras (01/05/2016-)
  2. Research project: “RADIO:  Robots in Assisted Living Environments Unobtrusive, Efficient, Reliable and Modular Solutions for Independent Ageing”, EU Horizon 2020 research and innovation programme for the Technological Educational Institute of Western Greece (04/2015-03/2016)
  3. Research project: ISRTDI: Industrial Systems for Sustainable Development and Wellbeing - Research, Technological Development and Innovation - (ISRTDI)”. Research and developmental project with Industrial Systems Institute (ISI). (01/07/2013 - 31/10/2015).
  4. Project ICT Cost Action IC1202,Timing Analysis on Code-Level (TACLe)”,European Cooperation in Science & Research, 2011-2015.
  5. Project ICT Cost Action IC1204,Trustworthy Manufacturing and Utilization of Secure Devices (TRUDEVICE)”,European Cooperation in Science & Research, 2012-2016.
  6. Project ICT COST Action IC1306,Cryptography for Secure Digital Interaction (Cryptoaction)”, European Cooperation in Science & Research, 2014-2018.
  7. Project ICT Cost Action IC1403,Cryptanalysis of ubiquitous computing systems (CRYPTACUS)”,European Cooperation in Science & Research, 2014-2018.
  8. Research project: “Wireless sensor networks for Technical resources Cycle Operation Management – WelCOM”. Cooperation Action GSRT, Research and developmental project with Industrial Systems Institute (ISI)/Research Centre ATHENA.
  9. Research project: FP7-SEC-218123 SECRICOM “Seamless Communication for Crisis Management, Research and developmental project withUniversity of Patras,
  10. Research project: FP7-SEC-218123 SECRICOM “Seamless Communication for Crisis Management”, Research and developmental project withHITACHI EUROPE SAS, Sophia Antipolis Lab.
  11. Research project: INFSO-ICT-224287, VITAL ++”Embedding P2P Technology in Next Generation Networks, A New Communication Paradigm & Experimentation Infrastructure”, Research and developmental project withUniversity of Patras.
  12. Development project: EPAEK «Electrical and Computer Engineering Department Program Update», work package 3, EPEAEK ΙΙ, University of Patras.
  13. Research project:IST-034284-STREP VITAL “Enabling convergence of IP Multimedia services over Next Generation Networks Technology”, Research and developmental project withUniversity of Patras.
  14. Research project: IST-1-507646-STP FLEXINET “Flexible Network and Gateways Architecture for enhanced  Access Network Services and Applications”, Research and developmental project withUniversity of Patras.
  15. Research project:00ΕPER90-Β: «Low Power Dissipation Bluetooth system » GSRT, Operational Programme "Competitiveness".Research and developmental project withUniversity of Patras.


________________________________________


PROFESSIONAL EXPERIENCE
 

October 2003 – January 2008:

  • Researcher
    • Computer and hardware security researcher for R&Dprojects: 00ΕPΕR90-Β, FLEXINET, VITAL, EPEAEK ΙΙ

January 2009 – September 2010:   

  •  Research/scientific Contractor-Senior Researcher  Hitachi Europe SAS
    • Hitachi Europe SAS Technical Manager for the EU project SECRICOM

January 2008- today:

  • Research/scientific Contractor-Senior Researcher : University of Patras
    • a.  Technical Manager for EU project CIPSEC  
    • b.  Technical Manager for the EU project SECRICOM
    • c.  Senior Researcher for p2p distributed security protocols for EU project VITAL++

September 2013- today:

  • Researcher contractor: Industrial Systems Institute (ISI), ATHENA R.C
    • Researcher on WelCOM Cooperation action for the development of Wireless Sensor Network protocols and signal processing.
    • Researcher on “ISRTDI: Industrial Systems for Sustainable Development and Wellbeing - Research, Technological Development and Innovation”.


________________________________________


ACADEMIC EXPERIENCE

 

2002-2006:  Teaching Assistant, Electrical & Computer Engineering Dept., University of Patras, Patras, Greece undergraduate Laboratory: “Introduction to Computers I– UNIX ”, 1st semester, 2002-2003,2003-2004, 2004-2005, 2005-2006.

2004-2005: Teaching Assistant, Electrical & Computer Engineering Dept., University of Patras, Patras, Greece undergraduate Laboratory: “Design of Integrated Systems using VLSI Techniques”, 9-th semester, 2004-2005.

2002-today: Supervision of many diploma theses on Cryptography Applications, Smart Card technology and Finite Field Arithmetic

2007-2014: Adjunct Faculty member (Assistant Professor) in Technical Educational Institute of Patras, outlier of Amaliada, Information Systems in Business Management and Economy Dpt Courses:

  • “Security in Information Systems”, 2007-2008, 2010-2011
  • “Design and Analysis of Information Systems” 2007-2008
  • “Computer Networks”, 2010-2011
  • "World Wide Web Design", 2012-2013

Adjunct Faculty member (Laboratory Associate/Lecturer) in Technical Educational Institute of Patras, Electrical Engineering Dpt, Mechanical Engineering Dpt, Courses:

  • Microcomputers I 2007-2014
  • Microcomputers II 2009-2010
  • Computer Architecture 2009-2010
  • Electric Circuit Principles 2012-2013

2008-today: Adjunct Faculty member (Assistant Professor) in Computer Engineering and Informatics Dpt, University of Patras, Courses:

  • Microcomputers (2008)
  • Electronics I (2008-2015)
  • Computer Architecture (2008-2016)

2012-2014: Adjunct Faculty member (Assistant Professor) in Technological Educational Institute of Patras, Mechanical Engineering Dpt, Courses:

  • Electrical Systems (2012-2014)

2013-2015: Adjunct Faculty member (Assistant Professor) in Technological Educational Institute of Western Greece, Business Management Dpt, Courses:

  • Information Systems Security

2014-today: Adjunct Faculty member (Assistant Professor) in Technological Educational Institute of Western Greece, Computer And Informatics Engineering Dpt, Courses:

  • Digital Logic
  • Analog and Digital Systems
  • Cryptography and Computer Security Lab
  • Typical Systems Analysis Lab
  • Hardware Security Lab
  • System on Chip

________________________________________


OTHER SKILLS AND ACTIVITIES
Communities

  • Member of the Greece Technical Chamber (TEE).
  • Member of IEEE, IEEE Computer Society, IEEE Circuits and Systems Society
  • Member of International Association for Cryptologic Research (IACR)

Languages
•    English (Cambridge Proficiency Certificate)
•    Greek (Native)

EXPERIENCE ON COMPUTER SYSTEMS

  •   Extended knowledge of CAD tools for VLSI: Xilinx ISE suite , Mentor Graphics, SYNOPSYS.
  •   Hardware Description Languages: Extended Knowledge of VHDL.
  •   Knowledge of Network Management, Vulnerability & Monitoring Tools.
  •   Knowledge of programming languages: C-C++, Java, Prolog , FORTRAN, Visual Basic, Python.
  •   Knowledge of mathematical software: MATLAB, MATHEMATICA, MATHCAD
  •   Knowledge of SPICE Simulation tools.


________________________________________

REVIEWER - REFEREE

Conferences:

 

 

  • MELECON 2004
  • ISCAS 2004
  • MWSCAS 2003
  • EUROCON 2005
  • CONTEL 2005
  • ISCAS 2006
  • UASS 2006
  • CSNDSP2006
  • ISCAS2007
  • ISWPC 2008
  • ICECS 2008
  • ICECS 2009
  • ICECS 2010
  • ISCAS 2011
  • NTMS 2011 (technical committee member)
  • NTMS 2012
  • GWVLSI 2013
  • ISCAS 2015
  • EuroMicro DSD 2011-2012-2013-2014

Journals:

  • IEEE Transactions on Computer
  • IEEE Computer
  • IEEE Transactions on Circuit and Systems I
  • IEEE Transactions on Circuit and Systems II
  • IEEE Transactions on VLSI Systems
  • International Arab Journal of Information Technology (IAJIT)
  • International Journal of Intelligent Automation and Soft Computing (AutoSoft)
  • Circuits, Systems and Signal Processing, Springer
  • The VLSI Integration Journal, Elsevier Ltd.
  • Microprocessors and Microsystems, Elsevier Ltd
  • Journal of Circuits, Systems and Computers
  • Computers and Electrical Engineering, Elsevier
  • Information Systems Security, The official journal of (ISC)2, Taylor&Francis
  • Information Sciences, Elsevier Ltd
  • Information Security Journal: A Global Perspective, Taylor&Francis
  • Research Letters in Electronics, Hindawi Publishing
  • International Journal of Reconfigurable Computing, Hindawi Publishing
  • The EURASIP Journal on Wireless Communications and Networking
  • Information Processing Letters, Elsevier Ltd
  • Journal of Network and Computer Applications, Elsevier Ltd
  • Journal of Parallel and Distributed Computing, Elsevier Ltd
  • Journal of Systems and Software, Elsevier Ltd
  • ACM Transactions on Reconfigurable Technology and Systems
  • International Journal of Computer Mathematics, Taylor and Francis

 

Journal - Conference – European Organization committee membership

Conference Technical Program Committee member:

  • 4th IFIP International Conference on New Technologies, Mobility and Security(NTMS ‘11), 7 - 10 February, Paris, France, 2011
  • SECRICOM Final Conference2012, April 26th Warsaw, Poland, 2012.
  • First International Symposium on Security in Computing and Communications (SSCC’13), August 22-24, 2013, Mysore, India
  • Euromicro Conference on Digital System Design(DSD) 2013, September 4-6, Santander, Spain, 2013.
  • 1st Security in Adhoc Networks (SecAN) Workshop, Benidorm Spain – June 22-27, 2014.
  • Second International Symposium on Security in Computing and Communications (SSCC-2014)September 24-27, 2014  Greater Noida,India
  • Euromicro Conference on Digital System Design (DSD)2014, August 27-29, Verona, Italy, 2014
  • Third International Symposium on Security in Computing and Communications (SSCC-2015), August 10-13, 2015. Kerala, God's Own Country, India, 2015.
  • IEEE Computer Society Annual Symposium on VLSI 2015 (ISVLSI 2015), System Design and Security (SDS) Track, 08 - 10 July, Montpellier, France, 2015.
  • Euromicro Conference on Digital System Design (DSD)2015, August 26-28, Funchal, Madeira, Portugal, 2015
  • 1st IEEE International Symposium on Nanoelectronic and Information Systems, iNIS 2015, Indore, India, December 21st-23rd, 2015.
  • International Workshop on Components and Services for IoT platforms: Paving the way to IoT standards, (WCS-IoT 2015), Imperial College, London, United Kingdom, 4 September 2015.

 

Conference Technical Program Committee track chair:

  • Track Chair on Hardware for Secure Information Processing (SIP):
    2nd IEEE International Symposium on Nanoelectronic and Information Systems
    , iNIS 2016, Gwalior, INDIA,  Dec. 19-21, 2016.

 

Journal Editorial Board member:

  • Information Security Journal: A Global Perspective, Taylor&Francis

 

Summer School Program Committee member:

  • 2nd  ATHENA Summer School, Wireless Technologies & Applications, Pyrgos, Greece, 3 - 8 July , 2011.
  • 3nd  ATHENA Summer School, Algorithms Telecom Hardware Encryption Networks Applications, Pyrgos, Greece, 1 - 6 July , 2012.
  • 2nd TRUDEVICE Training School on Trustworthy Manufacturing and Utilization of Secure Devices, Leukerrbad, Switzerland ,April 17- 22, 2016.

 

EU COST ACTIONs:

  • Management Committee Member COST Action IC1202 TΑckle (Greek Representative).
  • Management Committee Substitute Member COST Action IC1204 TRUDEVICE (Greek Representative).
  • Management Committee Substitute Member COST Action IC1306 CryptoAction (Greek Representative).
  • Management Committee Substitute Member COST Action IC1403 CRYPTACUS (Greek Representative).


________________________________________

PUBLICATIONS

CONFERENCES

  1. C. Emmanouilidis, P. Pistofidis, A. P. Fournaris, M. Bevilacqua, I. Durazo-Cardenas, P. N Mpotsaris, V. Katsouros, C. Koulamas and A. Starr, “Context-based and human-centred information fusion in diagnostics”, 3rd IFAC Workshop on Advanced Maintenance Engineering, Service and Technology, (AMEST'16), Biarritz, France October 19-21, 2016.
  2. A. P. Fournaris, L. Papachristodoulou, L. Batina, and N. Sklavos, “Residue Number System as a Side Channel and Fault Injection Attack Countermeasure in Elliptic Curve Cryptography” 11th International Conference on Design &Technology of Integrated Systems in Nanoscale Era, April 12-14, 2016, Istanbul, Turkey
  3. A. P. Fournaris, N. Sklavos and C. Koulamas, “A High Speed Scalar Multiplier for Binary Edwards Curves” in ACM proceedings of CS²: Cryptography and Security in Computing Systems Workshop, hiPEAC Conference, 20 January, Prague, 2016.
  4. A. P. Fournaris and N. Sklavos, “Binary Edwards Curve Design Strategy for Efficient and Power Attack Resistant Architectures” in the 4th Workshop On Secure Hardware And Security Evaluation (TRUDEVICE 2015), Co-located with CHES Workshop 2015, 17 September, Saint-Malo, France.
  5. V. Katsouros, C. Koulamas, A. P. Fournaris and C. Emmanouilidis, Embedded event detection for self-aware and safer assets, to appear in proc, 9th IFAC Symposium on Fault Detection, Supervision and Safety of Technical Processes, SafeProcess 2015, Paris, France, September 2-4, 2015.
  6. A. P. Fournaris and O. Koufopavlou, “Affine Coordinate Binary Edwards Curve Scalar Multiplier with Side Channel Attack Resistance” in proc. of 18th Euromicro Conference on Digital Systems Design, August 26-28, 2015, Madeira, Portugal.
  7. A. P. Fournaris, J. Zafeirakis, C. Koulamas, N. Sklavos and O. Koufopavlou, “Designing Efficient Elliptic Curve Diffie-Hellman Accelerators for Embedded Systems” in proc of 2015 IEEE International Symposium on Circuits and Systems (ISCAS 15), Lisbon, May 24 – 27, Portugal, 2015.
  8. R. Chaves, G. D. Natale, L. Batina, S. Bhasin, B. Ege, A.P. Fournaris, N. Mentens, S. Picek, F.Regazzoni, V. Rozic, N. Sklavos and B. Yang, “Challenges in Designing Trustworthy Cryptographic Co-Processors” in proc of 2015 IEEE International Symposium on Circuits and Systems (ISCAS 15), Lisbon, May 24 – 27, Portugal, 2015.
  9. A. P. Fournaris ,N. Sklavos, Public Key Cryptographic Primitive Design and Protection Against Fault and Power Analysis Attacks, to appear in TRUDEVICE Workshop 2015, 13 March, Grenoble 2015.
  10. A. P. Fournaris, N. Klaoudatos, N. Sklavos and C. Koulamas, Fault and Power Analysis Attack Resistant RNS based Edwards Curve Point Multiplication, in ACM proceedings of CS²: Cryptography and Security in Computing Systems Workshop, hiPEAC Conference, 19 January, Amsterdam, 2015.
  11. A. Bikos, N.Sklavos, A.P. Fournaris, “On the Optimization of S-Box Functionality in 4G LTE Ciphers”, in proc. of Joint MEDIAN–TRUDEVICE Open Forum, Sep. 30, 2014 – Amsterdam, Netherlands.
  12. A. P. Fournaris, J. Zafeirakis and O. Koufopavlou, “Designing and Evaluating High Speed Elliptic Curve Point Multipliers”, in proc. of 17th Euromicro Conference on Digital Systems Design, August 27-29, 2014, Verona, Italy.
  13. A. Fournaris, D. Hein, J. Fournier, G. Reymond, H. Brandl, "A Secure Docking Module for providing trust in Crisis Management Incidents" in proc. of 11th IEEE International Conference on Industrial Informatics (INDIN 2013), Bochum, Germany, July 29-31, 2013.
  14. A.P. Fournaris and O. Koufopavlou, “CRT RSA Hardware Architecture with Fault and Simple Power Attack Countermeasures”, in proc. of  Euromicro Conference on Digital System Design (DSD), Ismir, Turkey, September 5-8, 2012.
  15. A.P. Fournaris and O. Koufopavlou, "Protecting CRT RSA against Fault and Power Side Channel Attack” in proc. of IEEE Computer Society Annual Symposium on VLSI 2012, University of Massachusetts, Amherst, USA, August 19-21, 2012.
  16. A.P. Fournaris, "Distributed Threshold Certificate Based Encryption Scheme with no Trust Dealer" in proc. of International Conference on Security and Cryptography (SECRYPT), Rome, Italy, July 24-27, 2012.
  17. A. P. Fournaris and O. Koufopavlou, “Efficient CRT RSA with SCA countermeasures”  in proc. of  14th Euromicro Conference on Digital System Design (DSD 11), Oulu, 31 August- 2 September, Finland.
  18. A. P. Fournaris, “Distributed Threshold Cryptography Certification With No Trusted Dealer,” in proc of  International Conference on Security and Cryptography 2011 (SECRYPT ’11), Seville, 18-21 July 2011, Spain.
  19. A. P. Fournaris,” Hardware Module Design for Ensuring Trust” in proc of IEEE Computer Society Annual Symposium on VLSI (ISVLSI 2010), Kefalonia, Greece, 5-7 July 2010.
  20. A. P. Fournaris, “Fault and Simple Power Attack Resistant RSA using Montgomery Modular Multiplication”, in proc of 2010 IEEE International Symposium on Circuits and Systems (ISCAS 10), Paris, France, 29th May -2 July 2010.
  21. A. P. Fournaris and O. Koufopavlou, “One Dimensional Systolic Inversion Architecture Based on Modified G(2k) Extended Euclidean Algorithm” in proc of 2009 12th Euromicro Conference on Digital System Design (DSD), Patras, August 27 – 29, Greece, 2009.
  22. A. P. Fournaris and O. Koufopavlou, “Low Area Elliptic Curve Arithmetic Unit” in proc of 2009 IEEE International Symposium on Circuits and Systems (ISCAS 09), Taipei, May 24 – 27, Taiwan, 2009.
  23. A. P. Fournaris and O. Koufopavlou, “Creating an Elliptic Curve Arithmetic Unit for use in Elliptic Curve Cryptography”, in proc. of13th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA 2008), September 15-18, , Hamburg, Germany, 2008
  24. G. N. Selimis, A. P. Fournaris and O. Koufopavlou, “Applying Low Power Techniques in AES MixColumn/InvMixColumn Transformations “,in proc. 13th IEEE International Conference on Electronics, Circuits and Systems (ICECS 2006), Nice, December 10 - 13, France, 2006.
  25. A. P. Fournaris and O. Koufopavlou, “A Systolic Inversion Architecture Based on Modified Extended Euclidean Algorithm for GF(2k) Fields “,in proc. 13th IEEE International Conference on Electronics, Circuits and Systems (ICECS 2006), Nice, December 10 - 13, France, 2006.
  26. D. M. Schinianakis, A. P. Fournaris, A. Kakarountas and T. Stouraitis,“An RNS Architecture of an Fp Elliptic Curve Point Multiplier” in proc of 2006 IEEE International Symposium on Circuits and Systems (ISCAS 06), Kos, May 21 – 24, Greece, 2006.
  27. A. P. Fournaris, O. Koufopavlou, “A novel systolic GF(2k) field Multiplication-Inversion arithmetic unit” in proc. 12th IEEE International Conference on Electronics, Circuits and Systems (ICECS 2005), Gammarth, December 11-14, Tunisia, 2005.
  28. A. P. Fournaris, O. Koufopavlou, “A Systolic Trinomial GF(2k) Multiplier based on the Montgomery Multiplication Algorithm” in proc. 12th IEEE International Conference on Electronics, Circuits and Systems (ICECS 2005), Gammarth, December 11-14, Tunisia, 2005.
  29. A. P. Fournaris, O. Koufopavlou, “A New RSA Encryption Architecture and Hardware Implementation based on Optimized Montgomery Multiplication”in proc. of 2005 IEEE International Symposium on Circuits and Systems (ISCAS 2005), Kobe, May 23 -26, Japan, 2005
  30. A. P. Fournaris, O. Koufopavlou, “Optimized GF(2k) ONB Type I Multiplier Architecture based on the Massey - Omura Multiplication Pattern” in proc. of 2nd conference on Microelectronics Microsystems and Nanotechnology (MMN 2004), Athens, November 14 -17, Greece, 2004.
  31. N. Sklavos, A. P. Fournaris, O. Koufopavlou,  “WAP Security, Implementation Cost and Performance Evaluation of a Scalable Architecture for RC5 Parameterized Block Cipher”  in proc. of 12th IEEE Mediterranean Electrotechnical Conference (MELECON 2004) , May 12-15, Dubrovnik, Croatia, 2004.
  32. A. P. Fournaris, O. Koufopavlou,  “GF(2k) Multipliers based on the Montgomery Multiplication Algorithm”  in proc. of the 2004 IEEE International Symposium on Circuits and Systems (ISCAS 2004), Vancouver, May 23 - 26, Canada, 2004
  33. A. P. Fournaris, O. Koufopavlou,  “Montgomery Modular Multiplier Architectures and Hardware Implementations for an RSA Cryptosystem”  in proc. of 46th IEEE Midwest Symposium on Circuits & Systems '03 (MWSCAS 2003), December 27-30, Cairo, Egypt, 2003.
  34. A. P. Fournaris, N. Sklavos and O. Koufopavlou, “Vlsi architecture and FPGA Implementation of ICE Encryption Algorithm” , in proc. of 10th IEEE International Conference on Electronics, Circuits and Systems (ICECS 2003), United Arab Emirates, December 14-17, 2003.

JOURNALS

  1. A.P. Fournaris, I. Zafeirakis, P. Kitsos, O. Koufopavlou, Comparing Elliptic Curve Point Multiplication Design approaches for Cryptography, , Microprocessors and Microsystems, vol. 39, no. 8, pp. 1139–1155, Aug. 2015
  2. A.P. Fournaris and N.Sklavos, “Secure embedded system hardware design – A flexible security and trust enhanced approach”, Computer and Electrical Engineering Journal, vol:40, pp 121-133, Elsevier Ltd. January 2014.
  3. A. P. Fournaris, “A Distributed Approach of a Threshold Certificate Based Encryption Scheme with No Trusted Entities” Information Security Journal: A Global Perspective,  July 2013, Taylor and Francis.
  4. W. Wojciechowicz, J. Fournier, M. Konecny, S. Vanya, J. Stoodley, P. Entwisle, D. Hein, A. Machalek, A. Fournaris, M. Uriarte, O. Lopez, S. O’Neill, H. Bradl, Z. Balogh, E. Gatial, L. Hluchy, T. Mirosław, J. Zych,Seamless Communication For Crisis Management to appear in the journal “Technical Sciences”, University of Warmia and Mazury publishing, Poland, July 2012.
  5. A.P. Fournaris, J. Fournier, D. Hein & G. Reymond,Secure Docking Station and its protection against hardware attacks to appear in the journal “Technical Sciences”, University of Warmia and Mazury publishing, Poland, July 2012.
  6. Apostolos P. Fournaris, “Toward Flexible Security and Trust Hardware Structures for Mobile-Portable Systems”, IEEE Transactions on Latin America, Volume 10 Issue 3, April 2012.
  7. Apostolos P. Fournaris “Trust Ensuring Crisis Management Hardware Module", Information Security Journal: A Global Perspective, Volume 19, Issue 2, Taylor and Francis, 2010.
  8. D. M. Schinianakis, A. P. Fournaris, H. Michail, A. P. Kakarountas and T. Stouraitis, “An RNS Implementation of an Fp Elliptic Curve Point MultiplierIEEE Transactions on Circuits and Systems I: Regular Papers 56 (6), pp. 1202-1213, 2009.
  9. G. N. Selimis, A. P. Fournaris, G. Kostopoulos and O. Koufopavlou, “Software and Hardware Issues in Smart Card Technology”, IEEE Communications Surveys & Tutorials, Vol. 11, No. 3, Third Quarter 2009.
  10. G. N. Selimis, A. P. Fournaris, H. E. Michail and O. Koufopavlou, “Improved Throughput Bit-Serial Multiplier for GF (2m) Fields” The VLSI Integration Journal, Volume 42/2, February 2009, Pages 217-226, Elsevier Ltd.
  11. A. P. Fournaris and O. Koufopavlou, “Versatile Multiplier Architectures in GF(2k) Fields using the Montgomery Multiplication Algorithm” The VLSI Integration Journal, vol. 41/3, pp. 271-284, Elsevier Ltd.
  12. G. N. Selimis, A. P. Kakarountas , A. P. Fournaris, A. Milidonis and O. Koufopavlou, A Low Power Design For Sbox Cryptographic Primitive Of Advanced Encryption Standard For Mobile End –Users” Journal of Low Power Electronics (JOLPE), vol.3, no. 3, pp. 327-336(10), December 2007.
  13. A. P. Fournaris and O. Koufopavlou, “Applying Systolic Multiplication-Inversion Architectures Based On Modified Extended Euclidean Algorithm For GF(2k) in Elliptic Curve Cryptography” Special Issue “Security of Computers & Networks”, Computer and Electrical Engineering Journal, vol.33,  issue 5-6, pp 333-348, Elsevier Ltd, September 2007.

BOOKS-BOOK CHAPTERS

  1. A. P. Fournaris, G. Keramidas, K. Ispoglou and N. Voros,“VirISA: Recruiting Virtualization and Reconfigurable Processor ISA for Malicious Code Injection Protection”Book Chapter in Components and Services for IoT Platforms: Paving the Way for IoT Standards, Springer, 2016.
  2. C. Koulamas, S. Giannoulis and A. P. Fournaris ,“IoT Components for Secure Smart Building Environments” Book Chapter in Components and Services for IoT Platforms: Paving the Way for IoT Standards, Springer, 2016.
  3. A. P. Fournaris and N. Sklavos, Fault and Power Analysis Attack Protection Techniques for Standardized Public Key Cryptosystems, (extended abstract) to be published on Springer International Publishing.
  4. Ricardo Chaves, Leonel Sousa, Nicolas Sklavos, Apostolos P. Fournaris, Georgina Kalogeridou, Paris Kitsos, and Farhana Sheikh “Secure Hashing: SHA-1, SHA-2, and SHA-3” Book Chapter in Circuits and Systems for Security and Privacy,CRC Press, 2016.
  5. Apostolos P. Fournaris, Georgios Keramidas, "From Hardware Security Tokens to Trusted Computing and Trusted Systems", Book Section in System-Level Design Methodologies for Telecommunication, Editors: Nicolas Sklavos, Michael Hübner, Diana Goehringer, Paris Kitsos, Springer International Publishing , 2014
  6. A. P. Fournaris, P. Kitsos, N. Sklavos, "Security and Cryptographic Engineering in Embedded Systems", Chapter in the Book: Encyclopaedia of Embedded Computing Systems, IGI Global, ISBN:9781466639225, 2013.
  7. A. P. Fournaris, D M Hein, “Trust Management Through Hardware Means: Design Concerns and Optimizations”, book chapter  in “Designing Very Large Scale Integration Systems: Emerging Trends & Challenges”,edts: N. Voros, A. Mukherjee, N. Sklavos, K. Masselos, M. Huebner , Springer, 2011.
  8. A. P. Fournaris and O. Koufopavlou, “Hardware Design Issues in Elliptic Curve Cryptography for Wireless Systems”, book chapter in “Wireless Security and Cryptography: Specifications and Implementations” Edt: N. Sklavos and X.Zhang, pp 79-151, Taylor & Francis Group, CRC Press, 2007.

 

PRSESENTATIONS - SEMINARS- KEYNOTE SPEECH

  1. A. P. Fournaris, “Implementation attacks on the arithmetic of popular Public Key Cryptosystems”, 2nd TRUDEVICE Training School on Trustworthy Manufacturing and Utilization of Secure Devices, Leukerrbad, Switzerland ,April 17- 22, 2016.
  2. Apostolos P. Fournaris, “Residue Number System as a Side Channel Attack and Fault Injection attack Countermeasure”, CryptoAction Symposium 2016, April 6 – 8, 2016. Budapest, Hungary
  3. A. P. Fournaris, N. Klaoudatos, “Designing Secure Elliptic Curve Scalar Multipliers Using The Residue Number System”, HiPEAC Computing Systems Week, “Hardware Security and Trust: Design, Manufacture and Deployment of Integrated Circuits” Thematic Session, Athens, October 2014
  4. N. Klaoudatos, A. P. Fournaris, N. Sklavos, O. Koufopavlou,  “Designing Fault Injection And Side Channel Attack Resistant Edward Curve Scalar Multipliers Using Residue Number System”, 2nd TRUDEVICE workshop, Freiburg, December 12-13, 2013.
  5. A. P. Fournaris, "Designing Hardware Protected Cryptographic Accelerators For Trusted Computing Systems", 3rd ATHENA Summer School, Pyrgos, GREECE, 1 to 6 July, 2012.
  6. A. P. Fournaris, “Secure docking station and its protection against hardware attacks”, International Scientific Conference”, Seamless Communication for Crisis Management (SECRICOM’12), Warsaw, 26th April 2012.
  7. A. P. Fournaris, "Elliptic Curve Cryptography as a Security Enhancement on Modern Network Systems", 2nd ATHENA Summer School, Pyrgos, GREECE, 3 to 8 July, 2011.

 

TECHNICAL REPORTS
 

  1. M. Scheibe, D. Hein, G. Reymond, J. Fournier, A. P. Fournaris, V. Hudek, L. Slovak - "SECRICOM WP5 Design of the Chip and Emulator", INFINEON AG, 2011.
  2. D. Hein, P. Danner, A. P. Fournaris, M. Liebl - "SECRICOM WP5 Functional specification of the Secure Docking Module", Technical Report, IAIK, 2009.
  3. I. Kočiš, A. Aldabbagh, O. Lázaro, O. López, M. Uriarte, D. Hein, P. Danner, T. Miroslaw, M. Świech, W. Dymowski, L. Hluchý, B. Ŝimo, Z. Balogh, V. Hudek, A. Machalek, A. P. Fournaris, J. Fournier - "Secricom WP 2 Analysis of external and internal system requirements", Technical Report, IAIK, 2009.


 

Citations on published work can be viewed on my google scholar profile.