1. K. Tsantikidou, N. Sklavos, "An Area Efficient Architecture of a Novel Chaotic System for High Randomness Security in e-Health", IEEE Computer Architecture Letters, Vol. ##, Number #, pp. ###-###, 2024.
  2. S. Dincer, G. Ulutas, B. Ustubioglu, G. Tahaoglu, N. Sklavos, "Golden Ratio Based Deep Fake Video Detection System with Fusion of Capsule Networks", Computers and Electrical Engineering, Elsevier, Vol. ##, Number #, pp. ###-###, 2024.
  3. H. N. Noura, O. Salman, N. Kaaniche, N. Sklavos, A. Chehab, R. Couturier, "TRESC: Towards Redesigning Existing Symmetric Ciphers"Microprocessors and Microsystems, Elsevier, Vol. 87, Issue November, 2021.
  4. S. Zeadally, A. K. Das, N. Sklavos, "Cryptographic Technologies and Protocol Standards for Internet of Things", Internet of Things: Engineering Cyber Physical Human Systems, Elsevier, Vol. 14, Issue June, 2021.
  5. K. G. Liakos, G. K. Georgakilas, S. Moustakidis, N. Sklavos, F. C. Plessas, "Conventional and Machine Learning Approaches as Countermeasures against Hardware Trojan Attacks"Microprocessors and Microsystems, Elsevier, Vol. 79, Issue November, 2020.
  6. P. Panagiotou, N. Sklavos, E. Darra, I. D. Zaharakis, "Cryptographic System for Data Applications, in the Context of the Internet of Things", Microprocessors and Microsystems, Elsevier, Vol. 72, Issue February, pp. 1-12, 2020.
  7. A. N. Bikos, N. Sklavos, "Architecture Design of an Area Efficient High Speed Crypto Processor for 4G LTE", IEEE Transactions on Dependable and Secure Computing, Vol. 15, Issue 5, pp. 729-741, 2018.
  8. A. P. Fournaris, N. Sklavos, "Secure Embedded System Hardware Design – A Flexible Security and Trust Enhanced Approach", Computers and Electrical Engineering, Elsevier, Vol. 40, Issue 1, pp. 121-133, 2014.
  9. A. Bikos, N. Sklavos, "LTE/SAE Security Issues on 4G Wireless Networks", IEEE Security and Privacy, Issue March/April, Vol. 11, No. 2, pp. 55-62, 2013.
  10. P. Kitsos, N. Sklavos, G. Provelengios, A. N. Skodras, “FPGA-based Performance Analysis of Stream Ciphers ZUC, Snow3g, Grain v1, Mickey v2, Trivium and E0”, Embedded Hardware Design: Microprocessors and Microsystems, Elsevier, Vol. 37, Issue 2, pp. 235-245, 2013.
  11. P. Kitsos, N. Sklavos, M. Parousi, A. N. Skodras, "On the Hardware Implementation of Lightweight Block Ciphers for RFID", Computers and Electrical Engineering, Elsevier, Vol. 38, Number 1, pp. 148-160, 2012.
  12. A. Bechtsoudis, N. Sklavos, "Aiming at Higher Network Security Through Extensive Penetration Trees", IEEE Latin America Transactions, Volume 10, Issue 3, 2012.
  13. Rodrigo Roman, Cristina Alcaraz Tello, Javier Lopez, Nicolas Sklavos, "Key Management Systems for Sensor Networks in the Context of the Internet of Things", Computers & Electrical Engineering, Elsevier, Vol. 37, Number 2, pp. 147-159, 2011.
  14. Anil Kumar, Rhouma Rhouma, Yong Wang, Nicolas Sklavos, M.K. Ghose, "A blind source separation-based method for multiple images encryption", Comments on, Communications in Nonlinear Science and Numerical Simulation, Elsevier, Volume 16, Issue 3, pp. 1675-1686, March 2011.
  15. N. Sklavos, "On the Hardware Implementation Cost of Crypto-Processors Architectures", Information Systems Security, The official journal of (ISC)2, A Taylor & Francis Group Publication, Vol. 19, Issue: 2, pp. 53-60, 2010.
  16. P. Kitsos, N. Sklavos, O. Koufopavlou, "UMTS Security: System Architecture and Hardware Implementation", Wireless Communications and Mobile Computing Journal, John Wiley Editions, Vol. 7, Issue: 4, pp. 483-494, 2007.
  17. S. Zeadally, N. Sklavos, M. Rathakrishnan, S. Fowler, "End-to-End Security Across Wired-Wireless Networks for Mobile Users", Information Systems Security, The official journal of (ISC)2, A Taylor & Francis Group Publication, Vol. 16, Issue: 5, pp. 264-277, 2007.
  18. N. Sklavos, P. Kitsos, K. Papadopoulos, O. Koufopavlou,"Design, Architecture and Performance Evaluation of the Wireless Transport Layer Security", Journal of Supercomputing, Springer-Verlag, Vol. 36, No 4, pp. 33-50, 2006.
  19. N. Sklavos, P. Souras, "Economic Models and Approaches in Information Security for Computer Networks", International Journal of Network Security (IJNS), Science Publications, Vol. 2, No 1, Issue: January 2006, pp. 14-20, 2006.
  20. A.A. Moldovyan, N.A. Moldovyan, N. Sklavos, "Controlled Elements for Designing Ciphers Suitable to Efficient VLSI Implementation", Telecommunications Systems Journal, Springer-Verlag, Selected Paper from IEEE Mediterranean Electrotechnical Conference 2004, Vol. 32, No 2-3, pp. 149-163, Issue: July 2006.
  21. N. Sklavos, O. Koufopavlou, "On the Hardware Implementation of RIPEMD Family Processor: Networking High Speed Hashing, up to 2 Gbps", Computers and Electrical Engineering, Elsevier, Vol. 31, Issue: 6, pp. 361-379, 2005.
  22. N. Sklavos, P. Kitsos, E. Alexopoulos, O. Koufopavlou, "Open Mobile Alliance (OMA) Security Layer: Architecture Implementation and Performance Evaluation of the Integrity Unit", New Generation Computing: Computing Paradigms and Computational Intelligence, Springer-Verlag, Vol. 23, No 1, pp. 77-100, 2005.
  23. N. Sklavos, N.A. Moldovyan, O. Koufopavlou, "High Speed Networking: Design and Implementation of Two New DDP-Based Ciphers", Mobile Networks and Applications-MONET, Springer-Verlag , Vol. 25, Issue 1-2, pp. 219-231, 2005.
  24. N. Sklavos, O. Koufopavlou, "Implementation of the SHA-2 Hash Family Standard Using FPGAs", Journal of Supercomputing, Springer-Verlag , Vol. 31, No 3, pp. 227-248, 2005.
  25. P. Kitsos, N. Sklavos, M.D. Galanis, O. Koufopavlou, "64-bit Block Ciphers: Hardware Implementations and Comparison Analysis", Computers and Electrical Engineering, Elsevier, Vol. 30, Issue: 8, pp. 593-604, 2004.
  26. N. Sklavos, O. Koufopavlou,"Data Dependent Rotations, a Trustworthy Approach for Future Encryption Systems/Ciphers: Low Cost and High Performance", Computers and Security, Elsevier, Vol. 22, Number 7, pp. 585-588, 2003.
  27. P. Kitsos, N. Sklavos, K. Papadomanolakis, O. Koufopavlou, "Hardware Implementation of the Bluetooth Security", IEEE Pervasive Computing, Mobile and Ubiquitous Systems, Volume 2, Number 1, pp. 21-29, 2003.
  28. N. Sklavos, A. Papakonstantinou, Sp. Theoharis, O. Koufopavlou,"Low Power Implementation of an Encryption/Decryption System with Asynchronous Techniques", VLSI Design, An International Journal of Custom-Chip Design, Simulation, and Testing, Taylor and Francis Journal, Vol. 15, Issue 1, pp. 455-468, 2002.
  29. N. Sklavos, O. Koufopavlou, "Architectures and VLSI Implementations of the AES-Proposal Rijndael", IEEE Transactions on Computers, Vol. 51, Issue 12, pp. 1454-1459, 2002.