On the resistance of Boolean functions against algebraic attacks using univariate polynomial representation P Rizomiliotis IEEE Transactions on Information Theory 56 (8), 4014-4024, 2010 | 76 | 2010 |
Feedback phase in optically generated chaos: A secret key for cryptographic applications A Bogris, P Rizomiliotis, KE Chlouverakis, A Argyris, D Syvridis IEEE Journal of Quantum Electronics 44 (2), 119-124, 2008 | 72 | 2008 |
Security analysis of the Song-Mitchell authentication protocol for low-cost RFID tags P Rizomiliotis, E Rekleitis, S Gritzalis IEEE Communications letters 13 (4), 274-276, 2009 | 70 | 2009 |
Results on the nonlinear span of binary sequences P Rizomiliotis, N Kalouptsidis IEEE transactions on information theory 51 (4), 1555-1563, 2005 | 57 | 2005 |
Cryptography goes to the cloud I Agudo, D Nuñez, G Giammatteo, P Rizomiliotis, C Lambrinoudakis Secure and Trust Computing, Data Management, and Applications: STA 2011 …, 2011 | 54 | 2011 |
ORAM based forward privacy preserving dynamic searchable symmetric encryption schemes P Rizomiliotis, S Gritzalis Proceedings of the 2015 ACM Workshop on Cloud Computing Security Workshop, 65-76, 2015 | 36 | 2015 |
GHB#: A Provably Secure HB-Like Lightweight Authentication Protocol P Rizomiliotis, S Gritzalis International Conference on Applied Cryptography and Network Security, 489-506, 2012 | 31 | 2012 |
Relay selection for secure 5G green communications N Nomikos, A Nieto, P Makris, DN Skoutas, D Vouyioukas, P Rizomiliotis, ... Telecommunication Systems 59, 169-187, 2015 | 29 | 2015 |
On the quadratic span of binary sequences P Rizomiliotis, N Kolokotronis, N Kalouptsidis IEEE transactions on information theory 51 (5), 1840-1848, 2005 | 28 | 2005 |
How to protect security and privacy in the IoT: a policy‐based RFID tag management protocol E Rekleitis, P Rizomiliotis, S Gritzalis Security and Communication Networks 7 (12), 2669-2683, 2014 | 26 | 2014 |
Minimum linear span approximation of binary sequences N Kolokotronis, P Rizomiliotis, N Kalouptsidis IEEE Transactions on Information Theory 48 (10), 2758-2764, 2002 | 25 | 2002 |
New constructions of high-performance low-complexity convolutional codes A Katsiotis, P Rizomiliotis, N Kalouptsidis IEEE Transactions on Communications 58 (7), 1950-1961, 2010 | 23 | 2010 |
Constructing periodic binary sequences with maximum nonlinear span P Rizomiliotis IEEE transactions on information theory 52 (9), 4257-4261, 2006 | 22 | 2006 |
A user-oriented, customizable infrastructure sharing approach for hybrid cloud computing environments P Makris, DN Skoutas, P Rizomiliotis, C Skianis 2011 IEEE Third International Conference on Cloud Computing Technology and …, 2011 | 17 | 2011 |
Flexible convolutional codes: variable rate and complexity A Katsiotis, P Rizomiliotis, N Kalouptsidis IEEE transactions on communications 60 (3), 608-613, 2011 | 16 | 2011 |
Digital forensics in the cloud computing era N Marangos, P Rizomiliotis, L Mitrou 2012 IEEE Globecom Workshops, 775-780, 2012 | 14 | 2012 |
Time synchronization: pivotal element in cloud forensics N Marangos, P Rizomiliotis, L Mitrou Security and Communication Networks 9 (6), 571-582, 2016 | 12 | 2016 |
Improving the high order nonlinearity lower bound for Boolean functions with given algebraic immunity P Rizomiliotis Discrete applied mathematics 158 (18), 2049-2055, 2010 | 12 | 2010 |
On the security of the Feng–Liao–Yang Boolean functions with optimal algebraic immunity against fast algebraic attacks P Rizomiliotis Designs, Codes and Cryptography 57, 283-292, 2010 | 11 | 2010 |
HB − MAC: Improving the Random − HB # Authentication Protocol P Rizomiliotis Trust, Privacy and Security in Digital Business: 6th International …, 2009 | 11 | 2009 |