default search action
Georgios N. Selimis
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [c22]Shayesteh Masoumian, Georgios N. Selimis, Rui Wang, Geert Jan Schrijen, Said Hamdioui, Mottaqiallah Taouil:
Reliability Analysis of FinFET-Based SRAM PUFs for 16nm, 14nm, and 7nm Technology Nodes. DATE 2022: 1189-1192 - 2020
- [c21]Georgios N. Selimis, Rui Wang, Roel Maes, Geert Jan Schrijen, Mario Münzer, Stefan Ilic, Frans M. J. Willems, Lieneke Kusters:
RESCURE: a security solution for IoT life cycle. ARES 2020: 95:1-95:10 - [c20]Rui Wang, Georgios N. Selimis, Roel Maes, Sven Goossens:
Long-term Continuous Assessment of SRAM PUF and Source of Random Numbers. DATE 2020: 7-12 - [c19]Maksim Jenihhin, Said Hamdioui, Matteo Sonza Reorda, Milos Krstic, Peter Langendörfer, Christian Sauer, Anton Klotz, Michael Hübner, Jörg Nolte, Heinrich Theodor Vierhaus, Georgios N. Selimis, Dan Alexandrescu, Mottaqiallah Taouil, Geert Jan Schrijen, Jaan Raik, Luca Sterpone, Giovanni Squillero, Zoya Dyka:
RESCUE: Interdependent Challenges of Reliability, Security and Quality in Nanoelectronic Systems. DATE 2020: 388-393 - [c18]Shayesteh Masoumian, Georgios N. Selimis, Roel Maes, Geert Jan Schrijen, Said Hamdioui, Mottaqiallah Taouil:
Modeling Static Noise Margin for FinFET based SRAM PUFs. ETS 2020: 1-6 - [c17]Xinhui Lai, Maksim Jenihhin, Georgios N. Selimis, Sven Goossens, Roel Maes, Kolin Paul:
Early RTL Analysis for SCA Vulnerability in Fuzzy Extractors of Memory-Based PUF Enabled Devices. VLSI-SOC 2020: 16-21 - [i4]Rui Wang, Georgios N. Selimis, Roel Maes, Sven Goossens:
Long-term continuous assessment of SRAM PUF and source of random numbers. CoRR abs/2007.15909 (2020) - [i3]Xinhui Lai, Maksim Jenihhin, Georgios N. Selimis, Sven Goossens, Roel Maes, Kolin Paul:
Early RTL Analysis for SCA Vulnerability in Fuzzy Extractors of Memory-Based PUF Enabled Devices. CoRR abs/2008.08409 (2020)
2010 – 2019
- 2019
- [i2]Maksim Jenihhin, Said Hamdioui, Matteo Sonza Reorda, Milos Krstic, Peter Langendörfer, Christian Sauer, Anton Klotz, Michael Hübner, Jörg Nolte, Heinrich Theodor Vierhaus, Georgios N. Selimis, Dan Alexandrescu, Mottaqiallah Taouil, Geert Jan Schrijen, Jaan Raik, Luca Sterpone, Giovanni Squillero, Zoya Dyka:
RESCUE: Interdependent Challenges of Reliability, Security and Quality in Nanoelectronic Systems. CoRR abs/1912.01561 (2019) - 2017
- [c16]Bin Chen, Tanya Ignatenko, Frans M. J. Willems, Roel Maes, Erik van der Sluis, Georgios N. Selimis:
A Robust SRAM-PUF Key Generation Scheme Based on Polar Codes. GLOBECOM 2017: 1-6 - [c15]Lieneke Kusters, Tanya Ignatenko, Frans M. J. Willems, Roel Maes, Erik van der Sluis, Georgios N. Selimis:
Security of helper data schemes for SRAM-PUF in multiple enrollment scenarios. ISIT 2017: 1803-1807 - [i1]Bin Chen, Tanya Ignatenko, Frans M. J. Willems, Roel Maes, Erik van der Sluis, Georgios N. Selimis:
High-Rate Error Correction Schemes for SRAM-PUFs based on Polar Codes. CoRR abs/1701.07320 (2017) - 2015
- [c14]Yao-Hong Liu, Christian Bachmann, Xiaoyan Wang, Yan Zhang, Ao Ba, Benjamin Busze, Ming Ding, Pieter Harpe, Gert-Jan van Schaik, Georgios N. Selimis, Hans Giesen, Jordy Gloudemans, Adnane Sbai, Li Huang, Hiromu Kato, Guido Dolmans, Kathleen Philips, Harmke de Groot:
13.2 A 3.7mW-RX 4.4mW-TX fully integrated Bluetooth Low-Energy/IEEE802.15.4/proprietary SoC with an ADPLL-based fast frequency offset compensation in 40nm CMOS. ISSCC 2015: 1-3 - 2013
- [c13]Jac Romme, Johan H. C. van den Heuvel, Guido Dolmans, George N. Selimis, Kathleen Philips, Harmke de Groot:
On remote RF-based orientation detection. ICC 2013: 4797-4801 - [c12]Georgios N. Selimis, Jac Romme, Hans W. Pflug, Kathleen Philips, Guido Dolmans, Harmke de Groot:
Sub-meter UWB localization: Low complexity design and evaluation in a real localization system. PIMRC 2013: 186-191 - 2011
- [j6]Harris E. Michail, Dimitrios M. Schinianakis, Costas E. Goutis, Athanasios P. Kakarountas, Georgios N. Selimis:
Cipher Block Based Authentication Module: a Hardware Design Perspective. J. Circuits Syst. Comput. 20(2): 163-184 (2011) - [j5]Georgios N. Selimis, Li Huang, Fabien Massé, Ioanna Tsekoura, Maryam Ashouei, Francky Catthoor, Jos Huisken, Jan Stuyt, Guido Dolmans, Julien Penders, Harmke de Groot:
A Lightweight Security Scheme for Wireless Body Area Networks: Design, Energy Evaluation and Proposed Microprocessor Design. J. Medical Syst. 35(5): 1289-1298 (2011) - [c11]Georgios N. Selimis, Mario Konijnenburg, Maryam Ashouei, Jos Huisken, Harmke de Groot, Vincent van der Leest, Geert Jan Schrijen, Marten van Hulst, Pim Tuyls:
Evaluation of 90nm 6T-SRAM as Physical Unclonable Function for secure key generation in wireless sensor nodes. ISCAS 2011: 567-570 - 2010
- [c10]Ioanna Tsekoura, Georgios N. Selimis, Jos Hulzink, Francky Catthoor, Jos Huisken, Harmke de Groot, Constantinos E. Goutis:
Exploration of cryptographic ASIP designs for wireless sensor nodes. ICECS 2010: 827-830
2000 – 2009
- 2009
- [j4]Georgios N. Selimis, Apostolos P. Fournaris, Giorgos Kostopoulos, Odysseas G. Koufopavlou:
Software and Hardware Issues in Smart Card Technology. IEEE Commun. Surv. Tutorials 11(3): 143-152 (2009) - [j3]George N. Selimis, Apostolos P. Fournaris, Harris E. Michail, Odysseas G. Koufopavlou:
Improved throughput bit-serial multiplier for GF(2m) fields. Integr. 42(2): 217-226 (2009) - 2008
- [j2]Harris E. Michail, Georgios N. Selimis, Michalis D. Galanis, Dimitrios M. Schinianakis, Constantinos E. Goutis:
Novel Hardware Implementation of the Cipher Message Authentication Code. J. Comput. Networks Commun. 2008: 923079:1-923079:6 (2008) - [c9]Paris Kitsos, George N. Selimis, Odysseas G. Koufopavlou, Athanassios N. Skodras:
A Hardware Implementation of CURUPIRA Block Cipher for Wireless Sensors. DSD 2008: 850-853 - 2007
- [j1]George N. Selimis, Athanasios P. Kakarountas, Apostolos P. Fournaris, Athanasios Milidonis, Odysseas G. Koufopavlou:
A Low Power Design for Sbox Cryptographic Primitive of Advanced Encryption Standard for Mobile End-Users. J. Low Power Electron. 3(3): 327-336 (2007) - [c8]Harris E. Michail, Athanasios P. Kakarountas, Georgios N. Selimis, Constantinos E. Goutis:
Throughput Optimization of the Cipher Message Authentication Code. DSP 2007: 495-498 - 2006
- [c7]George N. Selimis, Apostolos P. Fournaris, Odysseas G. Koufopavlou:
Applying Low Power Techniques in AES MixColumn/InvMixColumn Transformations. ICECS 2006: 1089-1092 - 2005
- [c6]Georgios N. Selimis, N. Lazarou, Harris E. Michail, Odysseas G. Koufopavlou:
VLSI design and implementation of reconfigurable cryptographic systems for symmetric encryption. ICECS 2005: 1-4 - [c5]Haralambos Michail, Athanasios Kakarountas, George N. Selimis, Costas E. Goutis:
Optimizing SHA-1 Hash Function for High Throughput with a Partial Unrolling Study. PATMOS 2005: 591-600 - [c4]Odysseas G. Koufopavlou, George N. Selimis, Nicolas Sklavos, Paris Kitsos:
Cryptography: Circuits and Systems Approach. PATMOS 2005: 750 - 2004
- [c3]Georgios N. Selimis, Paris Kitsos, Odysseas G. Koufopavlou:
High performance cryptographic engine PANAMA: hardware implementation. ICECS 2004: 575-578 - [c2]Nicolas Sklavos, Georgios N. Selimis, Odysseas G. Koufopavlou:
Bulk encryption crypto-processor for smart cards: design and implementation. ICECS 2004: 579-582 - 2003
- [c1]George N. Selimis, Nicolas Sklavos, Odysseas G. Koufopavlou:
VLSI implementation of the keyed-hash message authentication code for the wireless application protocol. ICECS 2003: 24-27
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:22 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint