Nicolas Sklavos

Nicolas Sklavos, PhD

Position: Associate Professor, Director of SCYTALE Group,
Computer Engineering and Informatics Department (CEID), University of Patras, Hellas

Research Areas: Hardware Security, Cybersecurity, Embedded Systems, Hardware Design, IoT

Phone: +30 2610 996 983

e-mail(s): nsklavos AT upatras DOT gr , nsklavos AT ieee DOT org

 


Publications


Journals Papers

Technical Papers
  1. K. Tsantikidou, N. Sklavos, "An Area Efficient Architecture of a Novel Chaotic System for High Randomness Security in e-Health", IEEE Computer Architecture Letters, Vol. ##, Number #, pp. ###-###, 2024.
  2. S. Dincer, G. Ulutas, B. Ustubioglu, G. Tahaoglu, N. Sklavos, "Golden Ratio Based Deep Fake Video Detection System with Fusion of Capsule Networks", Computers and Electrical Engineering, Elsevier, Vol. ##, Number #, pp. ###-###, 2024.
  3. H. N. Noura, O. Salman, N. Kaaniche, N. Sklavos, A. Chehab, R. Couturier, "TRESC: Towards Redesigning Existing Symmetric Ciphers"Microprocessors and Microsystems, Elsevier, Vol. 87, Issue November, 2021.
  4. S. Zeadally, A. K. Das, N. Sklavos, "Cryptographic Technologies and Protocol Standards for Internet of Things", Internet of Things: Engineering Cyber Physical Human Systems", Elsevier, Vol. 14, Issue June, 2021.
  5. K. G. Liakos, G. K. Georgakilas, S. Moustakidis, N. Sklavos, F. C. Plessas, "Conventional and Machine Learning Approaches as Countermeasures against Hardware Trojan Attacks", Microprocessors and Microsystems, Elsevier, Vol. 79, Issue November, 2020.
  6. P. Panagiotou, N. Sklavos, E. Darra, I. D. Zaharakis, "Cryptographic System for Data Applications, in the Context of the Internet of Things"Microprocessors and Microsystems, Elsevier, Vol. 72, Issue February, pp. 1-12, 2020.
  7. A. N. Bikos, N. Sklavos, "Architecture Design of an Area Efficient High Speed Crypto Processor for 4G LTE", IEEE Transactions on Dependable and Secure Computing, Vol. 15, Issue 5, pp. 729-741, 2018.
  8. A. P. Fournaris, N. Sklavos, "Secure Embedded System Hardware Design – A Flexible Security and Trust Enhanced Approach" , Computers and Electrical Engineering, Elsevier, Vol. 40, Issue 1, pp. 121-133, 2014.
  9. A. Bikos, N. Sklavos, "LTE/SAE Security Issues on 4G Wireless Networks", IEEE Security and Privacy, Issue March/April, Vol. 11, No. 2, pp. 55-62, 2013.
  10. P. Kitsos, N. Sklavos, G. Provelengios, A. N. Skodras, “FPGA-based Performance Analysis of Stream Ciphers ZUC, Snow3g, Grain v1, Mickey v2, Trivium and E0”, Embedded Hardware Design: Microprocessors and Microsystems, Elsevier, Vol. 37, Issue 2, pp. 235-245, 2013.
  11. P. Kitsos, N. Sklavos, M. Parousi, A. N. Skodras, "On the Hardware Implementation of Lightweight Block Ciphers for RFID", Computer & Electrical Engineering, Elsevier, Vol. 38, Number 1, pp. 148-160, 2012.
  12. A. Bechtsoudis, N. Sklavos, "Aiming at Higher Network Security Through Extensive Penetration Trees", IEEE Latin America Transactions, Volume 10, Issue 3, 2012.
  13. Rodrigo Roman, Cristina Alcaraz Tello, Javier Lopez, Nicolas Sklavos, "Key Management Systems for Sensor Networks in the Context of the Internet of Things", Computers and Electrical Engineering, Elsevier, Vol. 37, Number 2, pp. 147-159, 2011.
  14. Anil Kumar, Rhouma Rhouma, Yong Wang, Nicolas Sklavos, M.K. Ghose, "A blind source separation-based method for multiple images encryption", Comments on, Communications in Nonlinear Science and Numerical Simulation, Elsevier, Volume 16, Issue 3, pp. 1675-1686, March 2011.
  15. N. Sklavos, "On the Hardware Implementation Cost of Crypto-Processors Architectures", Information Systems Security, The official journal of (ISC) 2, A Taylor & Francis Group Publication , Vol. 19, Issue: 2, pp. 53-60, 2010.
  16. P. Kitsos, N. Sklavos, O. Koufopavlou,"UMTS Security: System Architecture and Hardware Implementation"Wireless Communications and Mobile Computing Journal, John Wiley Editions, Vol. 7, Issue: 4, pp. 483-494, 2007.
  17. S. Zeadally, N. Sklavos, M. Rathakrishnan, S. Fowler, "End-to-End Security Across Wired-Wireless Networks for Mobile Users", Information Systems Security, The official journal of (ISC)2 , A Taylor & Francis Group Publication , Vol. 16, Issue: 5, pp. 264-277, 2007.
  18. N. Sklavos, P. Kitsos, K. Papadopoulos, O. Koufopavlou, "Design, Architecture and Performance Evaluation of the Wireless Transport Layer Security", Journal of Supercomputing, Springer-Verlag, Vol. 36, No 4, pp. 33-50, 2006.
  19. N. Sklavos, P. Souras, "Economic Models and Approaches in Information Security for Computer Networks", International Journal of Network Security (IJNS), Science Publications, Vol. 2, No 1, Issue: January 2006, pp. 14-20, 2006.
  20. A. A. Moldovyan, N. A. Moldovyan, N. Sklavos, "Controlled Elements for Designing Ciphers Suitable to Efficient VLSI Implementation", Telecommunications Systems Journal, Springer-Verlag, Selected Paper from IEEE Mediterranean Electrotechnical Conference 2004, Vol. 32, No 2-3, pp. 149-163, Issue: July 2006.
  21. N. Sklavos, O. Koufopavlou, "On the Hardware Implementation of RIPEMD Family Processor: Networking High Speed Hashing, up to 2 Gbps", Computers and Electrical Engineering, Elsevier, Vol. 31, Issue: 6, pp. 361-379, 2005.
  22. N. Sklavos, P. Kitsos, E. Alexopoulos, O. Koufopavlou, " Open Mobile Alliance (OMA) Security Layer: Architecture Implementation and Performance Evaluation of the Integrity Unit ", New Generation Computing: Computing Paradigms and Computational Intelligence, Springer-Verlag , Vol. 23, No 1, pp. 77-100, 2005.
  23. N. Sklavos, N.A. Moldovyan, O. Koufopavlou, "High Speed Networking: Design and Implementation of Two New DDP-Based Ciphers", Mobile Networks and Applications-MONET, Springer-Verlag , Vol. 25, Issue 1-2, pp. 219-231, 2005.
  24. N. Sklavos, O. Koufopavlou, "Implementation of the SHA-2 Hash Family Standard Using FPGAs", Journal of Supercomputing, Springer-Verlag , Vol. 31, No 3, pp. 227-248, 2005.
  25. P. Kitsos, N. Sklavos, M.D. Galanis, O. Koufopavlou, "64-bit Block Ciphers: Hardware Implementations and Comparison Analysis", Computers and Electrical Engineering, Elsevier, Vol. 30, Issue: 8, pp. 593-604, 2004.
  26. N. Sklavos, O. Koufopavlou, "Data Dependent Rotations, a Trustworthy Approach for Future Encryption Systems/Ciphers: Low Cost and High Performance", Computers and Security, Elsevier, Vol. 22, Number 7, pp. 585-588, 2003.
  27. P. Kitsos, N. Sklavos, K. Papadomanolakis, O. Koufopavlou,"Hardware Implementation of the Bluetooth Security", IEEE Pervasive Computing, Mobile and Ubiquitous Systems, Volume 2, Number 1, pp. 21-29, 2003.
  28. N. Sklavos, A. Papakonstantinou, Sp. Theoharis, O. Koufopavlou, "Low Power Implementation of an Encryption/Decryption System with Asynchronous Techniques", VLSI Design, An International Journal of Custom-Chip Design, Simulation, and Testing, Taylor and Francis Journal , Vol. 15, Issue 1, pp. 455-468, 2002.
  29. N. Sklavos, O. Koufopavlou, "Architectures and VLSI Implementations of the AES-Proposal Rijndael", IEEE Transactions on Computers, Vol. 51, Issue 12, pp. 1454-1459, 2002.

 

Technical Reports/Reviews
  1. N. Sklavos, N. Kaaniche, "On the Design of Secure Primitives for Real World Applications", Editorial, Microprocessors and Microsystems: Embedded Hardware Design (MICPRO), Elsevier, Vol. 80, 2021.
  2. N. Sklavos, "Privacy in a Digital, Networked World: Technologies, Implications and Solutions", Book Review, Cryptography Journal, Multidisciplinary Digital Publishing Institute, Volume 1, Issue 1, 2017.
  3. N. Sklavos, "Web Application Security, A Beginner’s Guide", Book Review, Information Systems Security: A Global Perspective, The official journal of (ISC)2, A Taylor & Francis Group Publication, 2014.
  4. N. Sklavos, " Placing the Suspect Behind the Keyboard: Using Digital Forensics and Investigative Techniques to Identify Cybercrime Suspects " , Book Review, Information Systems Security: A Global Perspective, The official journal of (ISC)2, A Taylor & Francis Group Publication, 2014.
  5. N. Sklavos, " Security Metrics, A Beginner’s Guide", Book Review, Information Systems Security: A Global Perspective, The official journal of (ISC)2, A Taylor & Francis Group Publication, 2014.
  6. N. Sklavos, "Cryptography and Network Security: Principles and Practice ", Book Review, Information Systems Security: A Global Perspective, The official journal of (ISC)2, A Taylor & Francis Group Publication, 2014.
  7. N. Sklavos, " Securing the Clicks: Network Security in the Age of Social Media " , Book Review, Information Systems Security: A Global Perspective, The official journal of (ISC)2, A Taylor & Francis Group Publication, 2014.
  8. N. Sklavos, "CompTIA Security + Certification Passport (Exam SY0-301) ", Book Review, Information Systems Security: A Global Perspective, The official journal of (ISC)2, A Taylor & Francis Group Publication, 2014.
  9. N. Sklavos, "Introduction to Computer Networks and Cybersecurity ", Book Review, Information Systems Security: A Global Perspective, The official journal of (ISC)2, A Taylor & Francis Group Publication, 2014.
  10. N. Sklavos, "C(I)SO, And Now What? How to Successfully Build Security by Design" , Book Review, Information Systems Security: A Global Perspective, The official journal of (ISC)2, A Taylor & Francis Group Publication, 2013.
  11. N. Sklavos, S. Zeadally, C. Alcaraz, Introduction to Special Issue "Modern trends in Applied Security: Architectures, Implementations, and Applications" , Computers & Electrical Engineering, Elsevier Science Press, Vol. 37, Number 2, pp. 127-128, 2011.
  12. N. Sklavos, M. McLoone, X. Zhang, Introduction to Special Issue "Next Generation Hardware Architectures for Secure Mobile Computing" , Mobile, Networks and Applications (MONET), Springer-Verlag Publishers, Issue 12, pp. 229-230 2007.
  13. P. Kitsos, N. Sklavos, Introduction to Special Issue "Security of Computers & Networks", Computers & Electrical Engineering, Elsevier Science Press, Vol. 33, Numbers 5-6, September-November, 2007.
  14. N. Sklavos, "Data Network Engineer - A Review", IEEE Circuits and Devices, Vol. 21, Issue: 6, pp. 53-53, 2006.
  15. N. Sklavos, "System Level Design Model with Reuse of System IP - A Review" , IEEE Circuits and Devices, Vol. 22, Issue: 3, pp. 37-37, 2006.
  16. N. Sklavos, "Synthesis Techniques and Optimizations for Reconfigurable Systems - A Review" , IEEE Circuits and Devices, Vol. 22, Issue: 4, pp. 31-31, 2006.
  17. Chr. Rechberger, V. Rijmen, N. Sklavos, "NIST Cryptographic Workshop on Hash Functions - A Report" , IEEE Security and Privacy, Vol. 4, No 1, Issue: January/February, pp. 54-56, 2006.
  18. N. Sklavos, N.A. Moldovyan, V. Gorodetsky, and O. Koufopavlou,"Computer Network Security - A Report", IEEE Security and Privacy, Vol. 2, No 1, Issue: January/February, pp. 49-52, 2004.

Books

  1. N. Sklavos, P. Kitsos, A Practical Introduction to Hardware/Software Codesign, Greek Edition, (Original Book, A Practical Introduction to Hardware/Software Codesign, Patrick R. Shaumont, 2nd Edition, Springer, 2013), New Tech Pub, ISBN:979605780395, 2019.
  2. N. Sklavos, R. Chaves, G. Di Natale, F. Regazzoni, Hardware Security and Trust, Springer, ISBN: 9783319443188, 2017.
  3. P. Kitsos, N. Sklavos, FPGA Based System Design, Greek Edition, (Original Book, FPGA Based System Design, W. Wolf, Prentice Hall Publisher, 2004), New Tech Pub, ISBN: 9780137033485, 2014.
  4. N. Sklavos, M. Hubner, D. Goehringer, P. Kitsos, System-Level Design Methodologies for Telecommunication, Springer, ISBN: 3319006622, 2013.
  5. P. Athanas, D. Pnevmatikatos, N. Sklavos, Embedded Systems Design with FPGAs, Springer, ISBN: 9781461413615, 2012.
  6. N. Voros, A. Mukherjee, N. Sklavos, K. Masselos, M. Huebner, VLSI 2010 Annual Symposium, Springer, ISBN: 9789400714878, 2011.
  7. N. Sklavos, X. Zhang, Wireless Security and Cryptography: Specifications and Implementations, CRC Press, ISBN: 9780849387715, 2007.
  8. T. Dagiuklas, N. Sklavos, Mobile Multimedia Communications, Third International Conference on Mobile Multimedia Communications, Greece, August 27-29, ACM International Conference Proceeding Series 329, ICST Brussels, Belgium, ISBN: 9789630626705, 2007.

Book Chapters

  1. E. Konstantopoulou, N. Sklavos, I. Ognjanovic, "Securing Public Safety Mission Critical 5G Communications of Smart Cities", Chapter in the Book: Internet of Everything for Smart City and Smart Healthcare Applications, editors Nishu Gupta, Sumita Mishra, Springer, ISBN: 9783031346002, 2023.
  2. A. P. Fournaris, A. Moschos, N. Sklavos, "Side Channel Assessment Platforms and Tools for Ubiquitous Systems", Chapter in the Book: Security of Ubiquitous Computing Systems, editors Gildas Avoine, Julio Hernandez-Castro, Springer, ISBN: 9783030105907, 2021.
  3. A. N. Bikos, N. Sklavos, "The Future of Privacy and Trust on the Internet of Things (IoT) for Healthcare: Concepts, Challenges, and Security Threat Mitigations", Chapter in the Book: Recent Advances in Security, Privacy, and Trust for Internet of Things (IoT) and Cyber-Physical Systems (CPS), editors Kuan-Ching Li, Brij B. Gupta, Dharma P. Agrawal, CRC Press, ISBN: 9780367220655, 2020.
  4. N. Sklavos, P. Kitsos, "Hardware Security", Chapter in the Book: Information and Systems Security, in Cyberspace, editors S. Katsikas, S. Gritzalis, C. Lambrinoudakis, Greek Edition, New Tech Pub, ISBN: 978-960-578-064-7, 2020.
  5. S. Theodorou, N. Sklavos, "Blockchain Based Security & Privacy in Smart Cities", Chapter in the Book: Smart Cities Cybersecurity and Privacy, editors Danda B. Rawat, Kayhan Z. Ghafoor, Elsevier Press, ISBN:9780128150320, 2019.
  6. T. Simopoulos, T. Haniotakis, G. Ph. Alexiou, N. Sklavos, "Rapid Static Memory Read-Write for Energy Aware Applications", Chapter in the Book: High-Speed and Lower Power Technologies: Electronics and Photonics, editors Jung Han Choi, Krzysztof Iniewski, CRC-Press, ISBN: 9780815374411, 2018.
  7. I. Papakonstantinou, N. Sklavos, "Physical Unclonable Functions (PUFs) Design Technologies: Advantages & Trade Offs", Chapter in the Book: Computer and Network Security Essentials, editor Kevin Daimi, Springer, ISBN: 978-3-319-58423-2, 2018.
  8. P. Spanaki, N. Sklavos, "Cloud Computing: Security Issues and Establishing Virtual Cloud Environment via Vagrant to Secure Cloud Hosts", Chapter in the Book: Computer and Network Security Essentials, editor Kevin Daimi, Springer, ISBN: 978-3-319-58423-2, 2018.
  9. P. Kitsos, N. Sklavos, A. G. Voyiatzis, "Ring Oscillators and Hardware Trojan Detection", Chapter in the Book: Circuits and Systems for Security and Privacy, editors N. Sklavos, R. Chaves, G. Di Natale, F. Regazzoni, Springer, ISBN: 9783319443188, 2017.
  10. R. Chaves, L. Sousa, N. Sklavos, A. P. Fournaris, G. Kalogeridou, P. Kitsos, F. Sheikh, "Secure Hashing: SHA-1, SHA-2, and SHA-3", Chapter in the Book: Circuits and Systems for Security and Privacy, editors Farhana Sheikh, Leonel Sousa, CRC Press, ISBN: 9781482236880, 2016.
  11. A. P. Fournaris, P. Kitsos, N. Sklavos, "Security and Cryptographic Engineering in Embedded Systems", Chapter in the Book: Encyclopedia of Embedded Computing Systems, editors Mohamed Khalgui, Olfa Mosbahi, Antonio Valentini, IGI Global, ISBN: 9781466639225, 2013.
  12. G. Kalogeridou, N. Sklavos, P. Kitsos, "System Design and FPGA Implementation for a Cognitive Radio Wireless Device", Chapter in the Book: Cognitive Radio and its Technological Impact on Wireless Cellular and Vehicular Networks, editors V. Hrishikesh, M. Gabriel-Miro, Series Lectures Notes in Electrical Engineering, Vol. 116, Springer, ISBN: 978-94-007-1826-5, 2012.
  13. C. Chrysoulas, N. Sklavos, "Resource Management and Service Deployment in Grids", Chapter in the Book: Grid Computing: Towards a Global Interconnected Infrastructure, editor N. Preve, Springer, ISBN: 978-0-85729-675-7, 2011.
  14. N. Sklavos, V. Agarwal, "RFID Security: Threats and Solutions, Chapter in the Book: The Internet of Things: from RFID to Pervasive Networked Systems, editors L. Yan, Y. Zhang, L.T. Yang, & H. Ning, Auerbach Publications, Taylor & Francis Group, ISBN: 1420052810, 2008.
  15. G. Kostopoulos, N. Sklavos, O. Koufopavlou, "Security & Privacy Issues for Wireless Local and Metropolitan Area Networks (LANS & MANS)", Chapter in the Book: Handbook of Research on Wireless Security, editors Y. Zhang, J. Zheng, and M. Ma, Idea Group Reference, ISBN: 159904899X, 2008.
  16. R. Roman, C. Alcaraz, N. Sklavos, "On the Hardware Implementation Efficiency of Cryptographic Primitives", Chapter in the Book: Wireless Sensor Networks Security, editors J. Lopez & Jianying Zhou, IOS Press, ISBN: 9781586038137, 2008.
  17. G. Kostopoulos, N. Sklavos, O. Koufopavlou, "Security and Privacy in Grid Computing: A State-of-the-Art", Chapter in the Book: Security in Distributed, Grid, and Pervasive Computing, edited by Yang Xiao, CRC-Press, ISBN: 0849379210, 2007.
  18. N. Sklavos, N.A. Moldovyan, O. Koufopavlou, "Wireless Networks World and Security Algorithms", Chapter in the Book: Handbook on Theoretical and Algorithmic Aspects of Sensor, Ad-Hoc Wireless and Peer-to-Peer Networks, edit by Jie Wu, CRC-Press, ISBN: 0849328322, 2005.

Conferences Papers

Technical Papers
  1. E. Konstantopoulou, G. S. Athanasiou, N. Sklavos, "Towards Secure and Efficient Multi-generation Cellular Communications: Multi-mode SNOW-3G/V ASIC and FPGA Implementations", proceedings of 9th International Symposium on Applied Reconfigurable Computing (ARC’23), Cottbus, Germany, September 27-29, 2023.
  2. K. Tsantikidou, D. Boufeas, N. Sklavos, "Area-Delay Efficient Security Scheme for Smart Hospital Systems", proceedings of IEEE International Conference on Cyber-Security and Resilience (IEEE CSR 2023), Venice, Italy, July 31 – August 2, 2023.
  3. E. Konstantopoulou, G. S. Athanasiou, N. Sklavos, "Securing 5G/6G Communications in Smart Cities: Novel SNOW-V/ZUC-256 Multimode Architectures", proceedings of The 2023 International Conference On Security and Management (SAM’23), Las Vegas, USA, July 24-27, 2023.
  4. K. Tsantikidou, N. Sklavos, "Minimal Resource Required E-Health System with End-to-End Authenticated Encryption Mechanism", proceedings of International Conference on Modern Circuits and Systems Technologies (MOCAST) on Electronics and Communications, Athens, Hellas, June 28-30, 2023.
  5. A. A. Sigourou, I. Kabin, P. Langendoerfer, N. Sklavos, J. Dyka, "Successful Simple Side Channel Analysis", proceedings of 12th Mediterranean Conference on Embedded Computing 2023, Budva, June 6-10, 2023.
  6. E. Konstantopoulou, N. Sklavos, “Design and Implementation of a Lightweight Cryptographic Module, for Wireless 5G Communications and Beyond”, proceedings of IEEE 2022 International Conference on Internet of Things and Intelligence Systems (IOTAIS’22), Bali, 2022.   
  7. K. Tsantikidou, N. Sklavos, "Flexible Security and Privacy, System Architecture for IoT, in Healthcare", proceedings of 30th IFIP/IEEE International Conference On Very Large Scale Integration (VLSI-SoC'22), Patra, Hellas, October 3-5, 2022.
  8. N. Sklavos, M. Pantopoulou, F. Florez-Revuelta, "Network on Privacy-Aware Audio- and Video-Based Applications for Active and Assisted Living: GoodBrother Project", proceedings of 25th EUROMICRO Conference on Digital System Design, Architectures, Methods, Tools (DSD'22), Gran Canaria, Spain, August 31 - September 2, 2022.
  9. K. Tsantikidou, N. Sklavos, "Vulnerabilities of Internet of Things, for Healthcare Devices and Applications", proceedings of 8th NAFOSTED Conference on Information and Computer Science (NICS'21), Hanoi City, Vietnam, December 21-22, 2021.
  10. I. Memos Bagkratsas, N. Sklavos, "Digital Forensics, Video Forgery Recognition, for Cybersecurity Systems", proceedings of 24th EUROMICRO Conference on Digital System Design, Architectures, Methods, Tools (DSD'21), Palermo, Italy, September 1–3, 2021.
  11. N. Sklavos, Ch. Salaga, "Towards Secure Composition of Integrated Circuits and Electronic Systems: On the Role of EDA", proceedings of 2021 International Conference on Security and Management (SAM'21), Las Vegas, USA, July 26-29, Springer, ISBN: ###, 2022.
  12. M. Pantopoulou, N. Sklavos, "An FPGA-Implemented Parallel System of Face Recognition, for Digital Forensics Applications", proceedings of 10th IEEE International Conference on Consumer Technology 2020, Berlin, Germany, November 9-11, 2020.
  13. A. Kalapodi, N. Sklavos, "The Concerns of Personal Data Privacy, on Calling and Messaging, Networking Applications", proceedings of 8th International Symposium on Security in Computing and Communications (SSCC'20), Chennai, India, October 14-17, Springer, ISBN: 9789811604218, 2021.
  14. N. Sklavos, S. Francese, "MULTI-modal Imaging of FOREnsic SciEnce Evidence: MULTI-FORESEE Project", proceedings of 23th EUROMICRO Conference on Digital System Design, Architectures, Methods, Tools (DSD'20), Portoroz, Slovenia, August 26–28, 2020.
  15. M. Tsavos, N. Sklavos, G. Ph. Alexiou, "Lightweight Security Data Streaming, Based on Reconfigurable Logic, for FPGA Platform", proceedings of 23th EUROMICRO Conference on Digital System Design, Architectures, Methods, Tools (DSD'20), Portoroz, Slovenia, August 26–28, 2020.
  16. A. Antoniadis, N. Sklavos, E. B. Kavun, "An Efficient Implementation of A Delay-Based PUF Construction", proceedings of Trustworthy Manufacturing and Utilization of Secure Devices Workshop, Design, Automation and Test in Europe Conference, (DATE'20), Paris, France, March 9-13, 2020.
  17. M. Pantopoulou, N. Sklavos, I. Ognjanovic, "On the Hardware Implementation Performance, of Face Recognition Techniques, for Digital Forensics", proceedings of 7th International Symposium on Security in Computing and Communications (SSCC'19), Trivandrum, Kerala, India, December 18-21, Springer, ISBN: 9789811548246, Vol. 1208, pp. 272-285, 2020.
  18. St. Limnaios, N. Sklavos, O. Koufopavlou, "Lightweight Efficient Simeck32/64 Crypto-Core Designs and Implementations, for IoT Security", proceedings of 27th IFIP/IEEE International Conference On Very Large Scale Integration (VLSI-Soc'19), Cusco, Peru, October 6-9, 2019.
  19. D. N. Moldovyan, A. A. Moldovyan, N. Sklavos, "Post-Quantum Signature Schemes for Efficient Hardware Implementation", proceedings of 10th IFIP International Conference on New Technologies, Mobility & Security (NTMS’19), Canary Islands, Spain, June 24–26, 2019.
  20. A. Kyriakou, N. Sklavos, "Container-Based Honeypot Deployment for the Analysis of Malicious Activity", proceedings of Global Information Infrastructure and Networking Symposium (GIIS’18), Thessaloniki, Hellas, October 23–25, 2018.
  21. M. Tsikerdekis, S. Zeadally, A. Schlesener, N. Sklavos, "Approaches for Preventing Honeypot Detection and Compromise", proceedings of Global Information Infrastructure and Networking Symposium (GIIS’18), Thessaloniki, Hellas, October 23–25, 2018.
  22. P. Panagiotou, N. Sklavos, I. D. Zaharakis, "Design and Implementation of a Privacy Framework, for the Internet of Things (IoT)", proceedings of 21th EUROMICRO Conference on Digital System Design, Architectures, Methods, Tools (DSD'18), Prague, Czech Republic, August 29–31, 2018.
  23. A. Antoniadis, N. Sklavos, "On the White-Box Cryptography: Design and Integration of High Performance & Lightweight Encryption", proceedings of 21th EUROMICRO Conference on Digital System Design, Architectures, Methods, Tools (DSD'18), Prague, Czech Republic, August 29–31, 2018.
  24. A. Kalapodi, N. Sklavos, I. D. Zaharakis, A. Kameas, "A Safe Traffic Network Design and Architecture, in the Context of IoT", proceedings of EUROMICRO Workshop on Machine Learning Driven Technologies and Architectures for Intelligent Internet of Things (ML-IoT), in conjunction with 21th EUROMICRO Conference on Digital System Design, Architectures, Methods, Tools (DSD'18), Prague, Czech Republic, August 29–31, 2018.
  25. M. Katsaiti, N. Sklavos, "Implementation Efficiency and Alternations, on CAESAR Finalists:  AEGIS Approach", proceedings of 16th IEEE International Conference on Dependable, Autonomic and Secure Computing (DASC'18), Athens, Hellas, August 12-15, 2018.
  26. S. Zouzoula, N. Sklavos, A. P. Fournaris, "Design and Implementation of a Security Processor for Satellite Communication Systems", Trustworthy Manufacturing and Utilization of Secure Devices Workshop, Design, Automation and Test in Europe Conference (DATE'18), Dresden, Germany, March 19-23, 2018.
  27. M. Katsaiti, N. Sklavos, A. P. Fournaris, "FPGA Performance Optimization, for CAESAR Authentication Ciphers", proceedings of Workshop on Cryptanalysis of Ubiquitous Computing Systems (CRYPTACUS’17), Nijmegen, The Netherlands, November 16-18, 2017.
  28. A. N. Moschos, A. P. Fournaris, N. Sklavos, "A Leakage Trace Collection Approach for Arbitrary Cryptographic IP Cores", proceedings of Workshop on Cryptanalysis of Ubiquitous Computing Systems (CRYPTACUS’17), Nijmegen, The Netherlands, November 16-18, 2017.
  29. N. Sklavos, I. D. Zaharakis, A. Kameas, A. Kalapodi, "Security & Trusted Devices in the Context of Internet of Things (IoT)",proceedings of 20th EUROMICRO Conference on Digital System Design, Architectures, Methods, Tools (DSD'17), Vienna, Austria, August 30 – September 1, 2017.
  30. F. Kounelis, N. Sklavos, P. Kitsos, "Run-Time Effect by Inserting Hardware Trojans, in Combinational Circuits", proceedings of 20th EUROMICRO Conference on Digital System Design, Architectures, Methods, Tools (DSD'17), Vienna, Austria, August 30 – September 1, 2017.
  31. E. Isa, N. Sklavos, "On the Detection of Hardware Trojans, in Hardware Security", Received Award, Design Test Verification and EDA (DTVEDA'17) Workshop, Volos, Hellas, 6-7 July, 2017.
  32. A. P. Fournaris, L. Papachristodoulou, N. Sklavos, "Secure and Efficient RNS Approach for Elliptic Curve Cryptography", Workshop on Security for Embedded and Mobile Systems (SEMS’17), proceedings of 2nd IEEE European Symposium on Security and Privacy Workshops (IEEE S&P’17), Paris, France, April 30, 2017.
  33. I. D. Zaharakis, N. Sklavos, A. Kameas, "Exploiting Ubiquitous Computing, Mobile Computing and the Internet of Things to Promote Science Education", proceedings of the 8th IFIP International Conference on New Technologies, Mobility and Security (NTMS’16), Larnaca, Cyprus, November 21-23, 2016.
  34. I. Tzemos, A. P. Fournaris, N. Sklavos, "Security and Efficiency Analysis of One Time Password Techniques", ACM Proceedings of the 20th Pan-Hellenic Conference on Informatics (PCI’16), Patra, Greece, November 10-12, 2016.
  35. A. P. Fournaris, L. Papachristodoulou, L. Batina, N. Sklavos, "Secure and Efficient RNS Approach for Elliptic Curve Cryptography", Workshop on Trustworthy Manufacturing and Utilization of Secure Devices (TRUDEVICE'16), Barcelona, Spain, November 14-16, 2016.
  36. J. Milosevic, N. Sklavos, K. Koutsikou, "Malware in IoT Software and Hardware", Workshop on Trustworthy Manufacturing and Utilization of Secure Devices (TRUDEVICE'16), Barcelona, Spain, November 14-16, 2016.
  37. N. Sklavos, P. Kitsos, A. G. Voyiatzis, "On the Hardware Implementation Efficiency of CAESAR Authentication Ciphers for FPGA Devices", Workshop on Trustworthy Manufacturing and Utilization of Secure Devices (TRUDEVICE'16), Barcelona, Spain, November 14-16, 2016.
  38. A. P. Fournaris, L. Papachristodoulou, L. Batina, N. Sklavos, "Residue Number System as a Side Channel and Fault Injection Attack countermeasure in Elliptic Curve Cryptography", proceedings of the 11 th International Conference on Design & Technology of Integrated Systems in Nanoscale Era (DTIS’16), Istanbul, Turkey, April 12-14, 2016.
  39. A. P. Fournaris, N. Sklavos, C. Koulamas, "A High Speed Scalar Multiplier for Binary Edwards Curves", ACM proceedings of the 3rd Workshop on Cryptography and Security in Computing Systems, 11th HiPEAC Conference 2016 (HiPEAC’16), Prague, Czech Republic, January 18-20, 2016.
  40. A. P. Fournaris, J. Zafeirakis, N. Sklavos, O. Koufopavlou, "Designing Efficient Elliptic Curve Diffie-Hellman Accelerators for Embedded Systems", proceedings of the IEEE International Symposium on Circuits and Systems (ISCAS’05), Portugal, May 24-27, 2015.
  41. R. Chaves, G. Di Natale, L. Batina, S. Bhasin, B. Ege, A. Fournaris, N. Mentens, S. Picek, F. Regazzoni, V. Rozic, N. Sklavos, B. Yang, "Design of Secure and Side-Channel Resistant Cryptographic Processors", proceedings of the IEEE International Symposium on Circuits and Systems (ISCAS’05), Portugal, May 24-27, 2015.
  42. A. P. Fournaris, N. Sklavos, "Binary Edwards Curve Design Strategy for Efficient and Power Attack Resistant Architectures", proceedings of the 4th Workshop on Secure Hardware & Security Evaluation, Cryptographic Hardware and Embedded Systems (CHES'15), Saint Malo, France, September 13-16, 2015.
  43. N. Sklavos, J. C. Resende, R. Chaves, F. Regazzoni, O. Keren, "Efficiency of Cryptography for Multi-Algorithm Computation on Dedicated Structures", proceedings of the International Conference on Modern Circuits and Systems Technologies (MOCAST’15), Thessaloniki, Greece, May 14-15, 2015.
  44. M. Katsaiti, A. Rigas, I. Tzemos, N. Sklavos, "Real-World Attacks Toward Circuits & Systems Design, Targeting Safety Invasion", proceedings of the International Conference on Modern Circuits and Systems Technologies (MOCAST’15), Thessaloniki, Greece, May 14-15, 2015.
  45. E. Isa, N. Sklavos, "Smart Home Automation: GSM Security System Design and Implementation", proceedings of the 3rd Conference on Electronics and Telecommunications (PACET’15), Ioannina, Greece, May 8-9, 2015, Selected Paper, Journal of Engineering Science and Technology Review, Volume 10, Issue 3, 2017.
  46. G. Kalogeridou, N. Sklavos, A.W. Moore, O Koufopavlou, “Security of ICs from Hardware Trojans”, Trustworthy Manufacturing and Utilization of Secure Devices Workshop, Design, Automation and Test in Europe Conference (DATE'15), Grenoble, France, March 9-13, 2015.
  47. A. P. Fournaris, N. Sklavos, “Public Key cryptographic primitive design and protection against fault and power analysis attacks”, Trustworthy Manufacturing and Utilization of Secure Devices Workshop, Design, Automation and Test in Europe Conference (DATE'15), Grenoble, France, March 9-13, 2015.
  48. H. Martin, P. Paris-Lopez, E. San Millan, J. E. Tapidor, Nicolas Sklavos, “Hardware Trojans in TRNGs”, Trustworthy Manufacturing and Utilization of Secure Devices Workshop, Design, Automation and Test in Europe Conference (DATE'15), Grenoble, France, March 9-13, 2015.
  49. G. Kalogeridou, N. Sklavos, A.W. Moore, O Koufopavlou, "On the Hardware Trojans Detection, using Mixed-Signal ICs", Trustworthy Manufacturing and Utilization of Secure Devices Workshop, Design, Automation and Test in Europe Conference (DATE'15), Grenoble, France, March 9-13, 2015.
  50. A.P. Fournaris, N. Klaoudatos, N. Sklavos, C. Koulamas, " Fault and Power Analysis Attack Resistant RNS based Edwards Curve Point Multiplication", 2nd Workshop on Cryptography and Security in Computing Systems, Amsterdam, 10th HiPEAC Conference 2015 (HiPEAC’15), The Netherlands, 19-21 January 2015.
  51. A. Bikos, N. Sklavos, A. Fournaris, "On the Optimization of S-Box Functionality in 4G LTE Security Ciphers", joint MEDIAN-TRUDEVICE Workshop, co-located with International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFT’14), Amsterdam, The Netherlands, 2-3 October 2014.
  52. G. Κalogeridou, N. Sklavos, A.W. Moore, "A Hardware Trojan Detection Framework", proceedings of Designing with Uncertainty - Opportunities & Challenges, Workshop, York, UK, 17-19th March 2014.
  53. N. Sklavos, "Securing Communication Devices via Physical Unclonable Functions (PUFs)", Information Security Solutions Europe (isse’13), Brussels, 22-23 October, Belgium, 2013.
  54. F. Pirpilidis, P. Kitsos, N. Sklavos, " An Efficient FPGA-Based Architecture of Skein for Simple Hashing and MAC Function", 16th Euromicro Conference on Digital Systems (DSD'13), Santander, Spain, 4-6 September, 2013.
  55. G. Provelengios, P. Kitsos, N. Sklavos, C. Koulamas, "FPGA-based Design Approaches of Keccak Hash Function", 15th Euromicro Conference on Digital Systems (DSD'12), Izmir, Turkey, 5-8 September, 2012.
  56. N. Sklavos, P. Kitsos, O. Koufopavlou, "VLSI Design and Implementation of Homophonic Security System", proceedings of IEEE Computer Society Annual Symposium on VLSI (IEEE ISVLSI'12), Amherst, USA, August 19-21, 2012.
  57. N. Sklavos, P. Kitsos, "Architectural Optimizations & Hardware Implementations of WLANs Encryption Standard", proceedings of the 5th International Conference on New Technologies, Mobility and Security (NTMS’12), Istanbul, Turkey, May 7-10, 2012.
  58. N. Sklavos, "Multi-module Hashing System for SHA-3 & FPGA Integration", proceedings of 21st International Conference on Field Programmable Logic (FPL'11) and Applications, Chania, Greece, September 5-7, 2011.
  59. P. Kitsos, N. Sklavos, A. N. Skodras, "A FPGA Implementation of the ZUC Stream Cipher", proceedings of 14th Euromicro Conference on Digital Systems (DSD'11), Oulu, Finland, August 31-September 2, 2011.
  60. P. Kitsos, N. Sklavos, "On the Hardware Implementation Efficiency of SHA-3 Candidates", proceedings of 17th IEEE International Conference on Electronics, Circuits, and Systems, (IEEE ICECS'10), December 12-15, Athens, Greece, 2010.
  61. P. Kitsos, N. Sklavos, Ath. N. Skodras, "Low Power FPGA Implementations of 256-bit Luffa Hash Function", proceedings of 13th Euromicro Conference on Digital Systems (DSD'10), Lille, France, September 1-3, 2010.
  62. N. Sklavos, P. Kitsos, "BLAKE HASH Function Family on FPGA: From the Fastest to the Smallest", proceedings of IEEE Computer Society Annual Symposium on VLSI (IEEE ISVLSI'10), Kefalonia, Greece, July 5-7, 2010.
  63. Α. Bechtsoudis, N. Sklavos, "Side Channel Attacks Cryptanalysis Against Block Ciphers Based on FPGA Devices", proceedings of IEEE Computer Society Annual Symposium on VLSI (IEEE ISVLSI'10), Kefalonia, Greece, July 5-7, 2010.
  64. Chr. Chrysoulas, N. Sklavos, Ath. P. Kakarountas, "Enhancing Service Portability in Upcoming 3G UMTS Networks & Security Aspects", proceedings of IEEE Mediterranean Electrotechnical Conference (IEEE MELECON'10), Valletta, Malta, April 25-28, 2010.
  65. Akashi Satoh, Nicolas Sklavos, "Compact and High-Speed Hardware Architectures for Hash Function Tiger", proceedings of IEEE International Symposium on Circuits & Systems (IEEE ISCAS'09), Taiwan, May 24-27, 2009.
  66. N. Papatheodoulou, N. Sklavos, "Architecture & System Design Of Authentication, Authorization, & Accounting Services", proceedings of IEEE Region 8, EUROCON 2009, International Conference (IEEE EUROCON'09), St. Petersburg, Russia, May 18-23, 2009.
  67. C. Efstathiou, I. Voyiatzis, N. Sklavos, "On the Modulo 2^n + 1 Multiplication for Diminished-1 Operands", proceedings of 2nd International Conference on Signals, Circuits & Systems (IEEE SCS'08), Hammamet, Tunisia, November 7-9, 2008.
  68. N. Sklavos, C. Efstathiou, "SecurID Authenticator: On the Hardware Implementation Efficiency", proceedings of 14th IEEE International Conference on Electronics, Circuits and Systems (IEEE ICECS'07), Marrakech, Morocco, December 11-14, 2007.
  69. N. Sklavos, S. Denazis, O. Koufopavlou, "AAA and Mobile Networks: Security Aspects and Architectural Efficiency", proceedings of the 3rd ACM International Mobile Multimedia Communications Conference (ACM MOBIMEDIA'07), Greece, August 27-29, 2007.
  70. N. Sklavos, K. Touliou, "Power Consumption in Wireless Networks: Techniques & Optimizations", proceedings of The IEEE Region 8, EUROCON 2007, International Conference on "Computer as a Tool" (IEEE EUROCON'07), Warsaw, Poland, September 9-12, 2007.
  71. N. Sklavos, K. Touliou, "A System-Level Analysis of Power Consumption & Optimizations in 3G Mobile Devices", Invited Paper, proceedings of the 1st International Conference on New Technologies, Mobility & Security (NTMS'07), Paris, France, May 2-4, 2007, Springer, pp. 225-235, ISBN: 9781402062698, 2007.
  72. N. Sklavos, C. Efstathiou, "Area-Optimized Architectures & Implementation of PELICAN MAC Function", proceedings of the 2nd IEEE International Conference On Information & Communication Technologies: From Theory To Applications (IEEE ICTTA'06), Damascus, Syria, April 24-28, 2006.
  73. P. Kitsos, N. Sklavos, O. Koufopavlou, "A High Speed Implementation of the LILI-II Keystream Generator", proceedings of the 5th International Symposium on Communications Systems, Networks & Digital Signal Processing (IEEE CSNDSP’06), Greece, July 24-28, 2006.
  74. Polychronis, N. Sklavos, V.D. Triantafillou, "A Secure WAP Environment for Wireless Networks Developed by PHP and HTML", proceedings of 13th Telecommunications Forum 2005, (TELFOR'05), Serbia, November 22-24, 2005.
  75. N. Sklavos, C. Efstathiou, "On the FPGA Implementation of HAVAL Hash Functions", proceedings of The IEEE Region 8 EUROCON 2007, International Conference on "Computer as a Tool" (IEEE EUROCON'05), Belgrade, Serbia & Montenegro, November 21-24, 2005.
  76. N. Sklavos, G. Selimis, O. Koufopavlou, "Bulk Encryption Crypto-Processor For Smart Cards: Design and Implementation", proceedings of 11th IEEE International Conference on Electronics, Circuits and Systems (IEEE ICECS'04), Tel-Aviv, Israel, December 13-15, 2004.
  77. M.D. Galanis, P. Kitsos, G. Kostopoulos, N. Sklavos, O. Koufopavlou, C.E. Goutis, " Comparison of the Hardware Architectures and FPGA Implementations of Stream Ciphers", proceedings of 11th IEEE International Conference on Electronics, Circuits and Systems (IEEE ICECS'04), Tel-Aviv, Israel, December 13-15, 2004.
  78. N. Sklavos, G. Selimis, O. Koufopavlou, "FPGA Implementation Cost and Performance Evaluation of IEEE 802.11 Protocol Encryption Schemes", proceedings of Second Conference on Microelectronics, Microsystems and Nanotechnology, (MMN’04), November 14-17, Athens, Greece 2004.
  79. P. Kitsos, N. Sklavos. M.D. Galanis, O. Koufopavlou, "An FPGA-Based Performance Comparison of the 64-bit Block Ciphers", proceedings of World Automation Congress (WAC’04), Spain, June 28-July 1, 2004.
  80. N.A. Moldovyan, M.A. Eremeev, N. Sklavos, O. Koufopavlou, "New Class of the FPGA Efficient Cryptographic Primitives", proceedings of the IEEE International Symposium on Circuits & Systems (IEEE ISCAS'04), Canada, May 23-26, 2004.
  81. G. Kostopoulos, N. Sklavos, M.D. Galanis, O. Koufopavlou, "VLSI Implementation of GSM Security: A5/1 and W7 Ciphers", proceedings of the IEEE Workshop on Wireless Circuits and Systems (IEEE WoWCAS'04), Canada, May 21-22, 2004.
  82. G. Selimis, N. Sklavos, O. Koufopavlou, "Crypto Processor for Contactless Smart Cards", proceedings of IEEE Mediterranean Electrotechnical Conference (IEEE MELECON'04), Dubrovnik, Croatia, May 12-15, 2004.
  83. N. Sklavos, A.P. Fournaris, O. Koufopavlou, "WAP Security: Implementation Cost and Performance Evaluation of a Scalable Architecture for RC5 Parameterized Block Cipher", proceedings of IEEE Mediterranean Electrotechnical Conference (IEEE MELECON'04), Dubrovnik, Croatia, May 12-15, 2004.
  84. P. Kitsos, N. Sklavos, O. Koufopavlou, "An End-to-End Hardware Approach for Security for GPRS", proceedings of IEEE Mediterranean Electrotechnical Conference (IEEE MELECON'04), Dubrovnik, Croatia, May 12-15, 2004.
  85. A.A. Moldovyan, N.A. Moldovyan, N. Sklavos, "Minimum Size Primitives for Efficient VLSI Implementation of DDO-Based Ciphers", proceedings of IEEE Mediterranean Electrotechnical Conference (IEEE MELECON'04), Dubrovnik, Croatia, May 12-15, 2004.
  86. N. Sklavos, A. Priftis, P. Kitsos, O. Koufopavlou, "Reconfigurable Crypto-Processor Design of Encryption Algorithms Operation Modes: Methods and FPGA Integration", proceedings of 46th IEEE Midwest Symposium on Circuits & Systems (IEEE MIDWEST'03), December 27-30, Cairo, Egypt, 2003.
  87. G. Selimis, N. Sklavos, O. Koufopavlou, "Area-Optimized Architecture and VLSI Implementation of Multi-Coder Processor for the WTLS", proceedings of 46th IEEE Midwest Symposium on Circuits & Systems (IEEE MIDWEST'03), pp. 24-27, December 27-30, Cairo, Egypt, 2003.
  88. P. Kitsos, G. Kostopoulos, N. Sklavos, O. Koufopavlou, "Hardware Implementation of the RC4 Stream Cipher", proceedings of 46th IEEE Midwest Symposium on Circuits & Systems (IEEE MIDWEST'03), December 27-30, Cairo, Egypt, 2003.
  89. N. Sklavos, N.A. Moldovyan, O. Koufopavlou, "A New DDP-Based Cipher CIKS-128h: Architecture, Design and VLSI Implementation Optimization of CBC-Encryption and Hashing up to 1 Gbps", proceedings of 46th IEEE Midwest Symposium on Circuits & Systems (IEEE MIDWEST'03), December 27-30, Cairo, Egypt, 2003.
  90. N. Sklavos, C. Machas, O. Koufopavlou, "Area Optimized Architecture and VLSI Implementation of RC5 Encryption Algorithm", proceedings of 10th IEEE International Conference on Electronics, Circuits and Systems (IEEE ICECS'03), pp. 172-175, United Arab Emirates, December 14-17, 2003.
  91. N. Sklavos, G. Dimitroulakos, O. Koufopavlou, "An Ultra High Speed Architecture for VLSI Implementation of Hash Functions", proceedings of 10th IEEE International Conference on Electronics, Circuits and Systems (IEEE ICECS'03), pp. 990-993, United Arab Emirates, December 14-17, 2003.
  92. A.P. Fournaris, N. Sklavos, O. Koufopavlou, "VLSI Architecture and FPGA Implementation of ICE Encryption Algorithm", proceedings of 10th IEEE International Conference on Electronics, Circuits and Systems (IEEE ICECS'03), pp. 88-91, United Arab Emirates, December 14-17, 2003.
  93. G. Selimis, N. Sklavos, O. Koufopavlou, "VLSI Implementation of the Keyed-Hash Message Authentication Code for the Wireless Application Protocol", proceedings of 10th IEEE International Conference on Electronics, Circuits and Systems (IEEE ICECS'03), pp. 24-27, United Arab Emirates, December 14-17, 2003.
  94. N. Sklavos, PhD Thesis on "VLSI Designs of Wireless Communications Security Systems", Received Award, proceedings of 12th International Conference on Very Large Scale Integration, (IFIP VLSI SOC '03), Darmstadt, Germany, December 1-3, 2003.
  95. N. Sklavos, O. Koufopavlou, "Architectures and FPGA Implementations of the SCO (-1,-2,-3) Ciphers Family", proceedings of 12th International Conference on Very Large Scale Integration, (IFIP VLSI SOC '03), pp. 68-73, Darmstadt, Germany, December 1-3, 2003.
  96. N. Sklavos, A.A. Moldovyan, O. Koufopavlou, "Encryption and Data Dependent Permutations: Implementation Cost and Performance Evaluation", International Workshop on Mathematical Methods, Models and Architectures for Computer Networks Security, (MMM-ACNS'03), Springer-Verlag, LNCS 2776, pp. 337-348, Berlin 2003.
  97. N. Sklavos, O. Koufopavlou, "On the Hardware Implementations of the SHA-2 (256, 384, 512) Hash Functions", proceedings of IEEE International Symposium on Circuits & Systems (IEEE ISCAS'03), Vol. V, pp. 153-156, Thailand, May 25-28, 2003.
  98. N. Sklavos, K. Papadomanolakis, P. Kitsos and O. Koufopavlou, "Euclidean Algorithm VLSI Implementations", proceedings of 9th IEEE International Conference on Electronics, Circuits and Systems (IEEE ICECS'02), Vol. II, pp. 557-560, Croatia, September 15-18, 2002.
  99. K.S. Papadomanolakis, A.P. Kakarountas, N. Sklavos, C.E. Goutis, "A Low Power Fault Secure Timer Implementation Based on the Gray Encoding Scheme", proceedings of 9th IEEE International Conference on Electronics, Circuits and Systems (IEEE ICECS'02), Vol. II, pp. 537-540, Croatia, September 15-18, 2002.
  100. N. Sklavos, P. Kitsos, O. Koufopavlou, "VLSI Implementation of Password (PIN) Authentication Unit", proceedings of 9th IEEE International Conference on Electronics, Circuits and Systems (IEEE ICECS'02), Vol. III, pp. 1147-1150, Croatia, September 15-18, 2002.
  101. P. Kitsos, N. Sklavos, O. Koufopavlou, "An Efficient Implementation of the Digital Signature Algorithm", proceedings of 9th IEEE International Conference on Electronics, Circuits and Systems (IEEE ICECS'02), Vol. III, pp. 1151-1154, Croatia, September 15-18, 2002.
  102. G. Dimitroulakos, N.D. Zervas, N. Sklavos, C.E. Goutis, "An Efficient VLSI Implementation for Forward and Inverse Wavelet Transform for JPEG2000", proceedings of 14th IEEE International Conference on Digital Signal Processing (IEEE DSP'02), Vol. I, pp. 233-236, Greece, July 1-3, 2002.
  103. N. Sklavos, P. Kitsos, K. Papadomanolakis, O. Koufopavlou, "Random Number Generator Architecture and VLSI Implementation", proceedings of IEEE International Symposium on Circuits & Systems (IEEE ISCAS'02), Vol. IV, pp. 854-857, USA, May 26-29, 2002.
  104. P. Kitsos, N. Sklavos, O. Koufopavlou, "Hardware Implementation of the SAFER+ Encryption Algorithm for the Bluetooth System", proceedings of IEEE International Symposium on Circuits & Systems (IEEE ISCAS'02),Vol. IV, pp. 878-881, USA, May 26-29, 2002.
  105. K.S. Papadomanolakis, A.P. Kakaroudas, N. Sklavos, C.E. Goutis, "A Fast Johnson-Mobius Encoding Scheme for Fault Secure Binary Counters", proceedings of Design, Automation and Test in Europe, (DATE'02), France, March 4-8, 2002.
  106. K.S. Papadomanolakis, A.P. Kakaroudas, V. Kokkinos, N. Sklavos, C.E. Goutis, "A Comparative Study on Fault Secure Signed Multipliers", proceedings of 11th IFIP International Conference On Very Large Scale Integration (VLSI-SoC'01), pp. 183-188, Montpellier, France, December 3-5, 2001.
  107. P. Kitsos, N. Sklavos, O. Koufopavlou, "An Efficient Hardware Implementation of the SAFER+ Encryption Algorithm", proceedings of ACIT'01, pp. 303-306, Jordan, November 13-15, 2001.
  108. I. Kordoulis, N. Sklavos, P. Kitsos, O. Koufopavlou, "VLSI Design and Implementation of RSA Encryption Algorithm", proceedings of ACIT'01, pp. 299-302, Jordan, November 13-15, 2001.
  109. N. Sklavos, P. Kitsos, N. Zervas, O. Koufopavlou, "A New Low Power and High Speed Bidirectional Shift Register Architecture", proceedings of International Workshop on Power And Timing Modeling, Optimization and Simulation (PATMOS'01), Sect. 10.4, pp. 1-10, Switzerland, September 26-28, 2001.
  110. K.S. Papadomanolakis, A.P. Kakaroudas, V. Kokkinos, N. Sklavos, C.E. Goutis, "The Effect of Fault Secureness in Low Power Multiplier Designs", proceedings International Workshop on Power And Timing Modeling, Optimization and Simulation (PATMOS'01), Sect. 10.3, pp. 1-12, Switzerland, September 26-28, 2001.
  111. N. Sklavos, O. Koufopavlou, "Asynchronous Low Power VLSI Implementation of the International Data Encryption Algorithm", proceedings of 8th IEEE International Conference on Electronics, Circuits and Systems (IEEE ICECS'01), Malta, Vol. III, pp. 1425-1428, September 2-5, 2001.
  112. P. Kitsos, N. Sklavos, N. Zervas, O. Koufopavlou, "A Reconfigurable Linear Feedback Shift Register (LFSR) for the Bluetooth System", proceedings of 8th IEEE International Conference on Electronics, Circuits and Systems (IEEE ICECS'01), Vol. II, pp. 991-993, Malta, September 2-5, 2001.
  113. N. Sklavos, O. Koufopavlou, "Low Power Implementation of an Encryption/Decryption System with Asynchronous Techniques", proceedings of 2000 Conference On Microelectronics, Microsystems and NanoTechnology, (MMN'00), Greece, November 20-22, Word Scientific Publishing, pp. 325-328, ISBN: 9810247699, 2001.

Keynote/Invited Talks

  1. N. Sklavos, ACM Distinguished Speaker, “Hardware Security, for IoT Based Healthcare Applications”, Invited Talk, Karadeniz Technical University, Computer Engineering Department, Trabzon, Turkey, October 2023.
  2. N. Sklavos, ACM Distinguished Speaker, “Cybersecurity for 5G and 6G Technologies”, International Webinar, University of Technology and Applied Sciences, Nizwa, Oman, November 2022.
  3. N. Sklavos, Distinguished Track Speaker, "Security as a Service, for Next Generation: 5G and 6G Challenge", 1st IEEE Next G Summit, Johns Hopkins University, Laurel, Maryland, USA, June, 2022.
  4. N. Sklavos, Invited Speaker, "Cybersecurity of 5G Technologies", EAI International Conference on Privacy and Forensics in Smart Mobility (PFSM'21), Porto, Portugal, November 24-26, 2021.
  5. N. Sklavos, Invited Speaker, "5G, more or less...Security !", 4th International Digital Privacy and Security Conference (DPSC2021) , Porto, Portugal, January 20-21, 2021.
  6. N. Sklavos, Talk, "Securing the 5G Era", IEEE 5G Workshop on First Responder and Tactical Networks (5G-FRTN'20), IEEE and Johns Hopkins University, USA, October 23, 2020.
  7. N. Sklavos, Keynote Speaker, "In Hardware We Trust: Electronic Design Automation", 8th International Symposium on Security in Computing and Communications (SSCC'20), Chennai, India, October 14-17, 2020.
  8. N. Sklavos, Keynote Speaker, "In the Era of Cybersecurity: Cryptographic Hardware and Embedded Systems", 8th Mediterranean Conference on Embedded Computing (MECO'19), Budva, Montenegro, June 10-14, 2019.
  9. N. Sklavos, Invited Talk, "Design and Implementation of Integrated Circuits in Trusted Environments", Design Test Verification and EDA (DTVEDA'17) Workshop, Volos, Hellas, 6-7 July, 2017.
  10. N. Sklavos, Invited Speaker, "Cryptographic Hardware & Embedded Systems for Communications", 1st IEEE-AESS Conference on Space and Satellite Telecommunications, Rome, Italy, October, 2-5, 2012.
  11. N. Sklavos, Keynote Speaker, "Towards to SHA-3 Hashing Standard for Secure Communications: On the Hardware Evaluation Development", 10th International Information and Telecommunication Technologies Symposium (I2TS'11), Brazil, December 19-21, 2011, IEEE Latin America Transactions, Volume 2012, Issue 1, 2012.

 

Tutorials

  1. Nicolas Sklavos, "Security and Trust: the Internet of Things (IoT) World", 32nd IEEE International Conference on Microelectronics, (ICM’20), Jordan, December 14-17, 2020.
  2. Nicolas Sklavos, "Privacy and Security Environments in Internet of Things (IoT)", Cyber-Physical Systems and Internet of Things, (CPS&IoT’19), Summer School, Budva, Montenegro, June 10-15, 2019.
  3. N. Sklavos, I. D. Zaharakis, "Cryptography and Security in Internet of Things (IoT): Models, Schemes, and Implementations", proceedings of the 8th IFIP International Conference on New Technologies, Mobility and Security (NTMS’16), Larnaka, Cyprus, November 21-23, 2016.
  4. N. Sklavos, R. Chaves, F. Regazzoni, "Wireless-SoC-Security: FPGA Based System-On-A-Chip Security Schemes for 4G & 5G", 11th HiPEAC Conference 2016 (HiPEAC’16), Prague, Czech Republic, January 18-20, 2016.
  5. N. Sklavos, "Cryptographic Algorithms on A Chip: Architectures, Designs and Implementation Platforms", 6th Design and Technology of Integrated Systems in Nano Era (DTIS'11), Greece, April 6-8, 2011.
  6. O. Koufopavlou, G. Selimis, N. Sklavos, P. Kitsos, "Cryptography: Circuits and Systems Approach", 5th IEEE International Symposium on Signal Processing and Information Technology (IEEE ISSPIT'05), Greece, December 18-21, 2005.
  7. O. Koufopavlou, G. Selimis, N. Sklavos, P. Kitsos, "Cryptography: Circuits and Systems Approach", International Workshop on Power And Timing Modeling, Optimization and Simulation (PATMOS'05), Belgium, September 21-23, 2005.
  8. O. Koufopavlou, N. Sklavos, P. Kitsos, "Cryptography: Circuits and Systems Approach", Second Conference On Microelectronics, Microsystems and NanoTechnology, (MMN'04), Greece, November 14-17, 2004.
  9. P. Kitsos, O. Koufopavlou, G. Selimis, N. Sklavos, "Low Power Cryptography", 4th MARLOW Workshop 2004, Greece, September 2004.
  10. O. Koufopavlou, N. Sklavos, P. Kitsos, "Cryptography: Circuits and Systems Approach", IEEE International Symposium on Circuits & Systems (IEEE ISCAS'04), Canada, May 23-26, 2004.
  11. O. Koufopavlou, N. Sklavos, P. Kitsos, "Cryptography in Wireless Protocols: Hardware and Software Implementations", IEEE International Symposium on Circuits & Systems (IEEE ISCAS'03), Volume II, pp. 383-424, Thailand, May 25-28, 2003.

 

Other Talks, Presentations, etc

  1. K. Tsantikidou, N. Sklavos, "Hardware Security for IoT-Based, Healthcare Applications", New England Hardware Security Day 2021 Workshop, New England, USA, April 9, 2021.
  2. A. N. Bikos, N. Sklavos, "On the Architectural Efficiency, of 5G Security and Beyond", New England Hardware Security Day 2021 Workshop, New England, USA, April 9, 2021.
  3. N. Sklavos, Invited Seminar, "Introduction to Cybersecurity: Hack by Heart, Secure by Soul", Cybersecurity EESTech Challenge, organised by EESTEC (Electrical Engineering Students' European assoCiation), Patra, Hellas, February 27, 2021.
  4. I. Ognjanovic, N. Sklavos, R. Sendelj, "Multi Criteria, for Decision Making Systems, in Face Recognition Process", 3rd MULTI-modal Imaging of FOREnsic SciEnce Evidence tools for Forensic Science 2019, Catania, Italy, September 16-18, 2019.
  5. I. Ioannidou, N. Sklavos, "Digital Forensics: Video Manipulation Detection Techniques and Security Systems", 3rd MULTI-modal Imaging of FOREnsic SciEnce Evidence tools for Forensic Science 2019, Catania, Italy, September 16-18, 2019.
  6. N. Sklavos, Invited Seminar, "Hack by Heart, Secure by Soul", CEID Seminars and Social Hour Series 2019, Computer Engineering and Informatics Dept., University of Patras, Greece, March, 2019.
  7. N. Sklavos, Invited Seminar, "UMI-Sci-Ed: Internet of Things (IoT) and Security", 3rd Summer School on “ICT and Applications”, Computer Engineering and Informatics Department (CEID), Polytechnic School, University of Patras, Patra, Hellas, June 25-26, 2018.
  8. N. Sklavos, Invited Seminar, "Asymmetric Encryption and Trusted Devices", Workshop on "Hardware Security", organised by EESTEC (Electrical Engineering Students' European assoCiation), LC Patras & University of Patras, Patra, Hellas, May 13-20, 2018.
  9. N. Sklavos, Apostolos Fournaris, "Processors, from Design to Programming: Modern Trends and Future Applications", 2nd Summer School on “ICT and Applications”, Computer Engineering and Informatics Department (CEID), Polytechnic School, University of Patras, Patra, Hellas, July 3-5, 2017.
  10. N. Sklavos, Invited Seminar, "Hardware Security & Trusted Environments: The Art of Design", Bar Ilan University, Faculty of Engineering, Tel Aviv, Israel, 11 May, 2017.
  11. N. Sklavos, Apostolos Fournaris, "White-Box Cryptography, and AES Implementations", 2nd Cryptography for Secure Digital Interaction Symposium, March 27-28, Amsterdam, The Netherlands, 2017.
  12. E. Isa, N. Sklavos, "Hardware Trojans and Confidentiality", CRYPTACUS Workshop, March 14-15, Sutomore, Montenegro, 2017.
  13. N. Sklavos, Invited Seminar, "3S: Safe, Sure, Secure", 1st Summer School on “ICT and Applications”, Computer Engineering and Informatics Department (CEID), Polytechnic School, University of Patras, Patra, Greece, 21-24 June, 2016.
  14. N. Sklavos, Giorgio Di Natale, "TRUDEVICE Project: Trustworthy Manufacturing and Utilization of Secure Devices", HiPEAC Computing Systems Week (CSW), Athens, Greece, 8-10 October 2014.
  15. G. Kalogeridou, N. Sklavos, A. W. Moore, O. Koufopavlou, "Detecting Hardware Trojans in Wireless Communications", HiPEAC Computing Systems Week (CSW), Athens, Greece, 8-10 October 2014.
  16. N. Sklavos, Invited Talk, "Security – Attacks for Wireless Networks on Silicon", TRUDEVICE Training School on: Trustworthy Manufacturing and Utilization of Secure Devices, Lisbon, Portugal, July 14-18, 2014.
  17. N. Sklavos, Invited Talk, "Fundamental Primitives for Security: Hardware Vs Software Perspectives", TRUDEVICE Training School on: Trustworthy Manufacturing and Utilization of Secure Devices, Lisbon, Portugal, July 14-18, 2014.
  18. N. Sklavos, Invited Talk, "First Time on Interview: The Good, the Bad and the Ugly", TRUDEVICE Training School on: Trustworthy Manufacturing and Utilization of Secure Devices, Lisbon, Portugal, July 14-18, 2014.
  19. N. Sklavos, Invited Talk, "System-On-Chip (Soc) Design Primitives for Wireless Network Security", Summer School on: Design and Security of Cryptographic Algorithms and Devices for Real-World Applications, Sibenik, Croatia, June 1-6, 2014.
  20. A. Bechtsoudis, N. Sklavos, Invited Talk, "Aiming at Higher Network Security Through Extensive Penetration Trees", 2nd IEEE Greece GOLD A.G. ATHENA Summer School, Pyrgos, Hellas, July 3-8, 2011, IEEE Latin America Transactions, Volume 10, Issue 3, 2012.