Name
Papers
Collaborators
O. KOUFOPAVLOU
36
57
Citations 
PageRank 
Referers 
256
28.43
623
Referees 
References 
407
192
Search Limit
100623
Title
Citations
PageRank
Year
Exploring the FPGA Implementations of the LBlock, Piccolo, Twine, and Klein Ciphers00.342020
VLSI Design and Implementation of Homophonic Security System10.432012
VITAL++, a new communication paradigm: embedding P2P technology in next generation networks281.152011
Full custom low-power/high performance DDP-based Cobra-H64 cipher00.342010
Versatile multiplier architectures in GF(2k) fields using the Montgomery multiplication algorithm60.472008
Towards a service-enabled distributed router architecture10.362008
Applying systolic multiplication-inversion architectures based on modified extended Euclidean algorithm for GF(2k) in elliptic curve cryptography30.472007
An optimal low-power/high performance DDP-based Cobra-H64 cipher00.342007
Design, Architecture and Performance Evaluation of the Wireless Transport Layer Security30.842006
Applying Low Power Techniques in AES MixColumn/InvMixColumn Transformations20.432006
High speed networking security: design and implementation of two new DDP-based ciphers231.302005
Cryptography: circuits and systems approach30.482005
Implementation of the SHA-2 Hash Family Standard Using FPGAs414.502005
On the hardware implementation of RIPEMD processor: Networking high speed hashing, up to 2Gbps20.412005
New class of the FPGA efficient cryptographic primitives00.342004
Computer Network Security: Report from MMM-ACNS50.672004
64-bit Block ciphers: hardware implementations and comparison analysis90.682004
Efficient architecture and hardware implementation of the Whirlpool hash function100.962004
Area optimized architecture and VLSI implementation of RC5 encryption algorithm40.552003
VLSI architecture and FPGA implementation of ICE encryption algorithm20.442003
A policy-based management architecture for active and programmable networks140.822003
VLSI IMPLEMENTATION OF THE KEYED-HASH MESSAGE AUTHENTICATION CODE FOR THE WIRELESS APPLICATION PROTOCOL80.882003
VLSI implementations of the triple-DES block cipher.20.462003
An efficient reconfigurable multiplier architecture for Galois field GF(2m)341.782003
Data dependent rotations, a trustworthy approach for future encryption systems/ciphers: low cost and high performance20.432003
Architectures and VLSI implementations of the AES-Proposal Rijndael343.762002
Power exploration of multimedia applications realized on embedded cores40.501999
Switching response modeling of the CMOS inverter for sub-micron devices20.471998
Data link control emulation: rapid prototyping for high-speed networks10.391998
Analytical Model for the CMOS Short-Circuit Power Dissipation10.451998
Accurate evaluation of CMOS short-circuit power dissipation for short-channel devices30.541996
Space-Time Representation of Iterative Algorithms and the Design of Regular Processor Arrays10.361993
Image reconstruction on a special purpose array processor00.341992
Analysis of TCP/IP for high performance parallel implementations71.071992
Array processor for LS FIR system identification00.341991
A generator for a number format conversion IC00.341990