Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Giorgos Kostopoulos is active.

Publication


Featured researches published by Giorgos Kostopoulos.


midwest symposium on circuits and systems | 2003

Hardware implementation of the RC4 stream cipher

Paris Kitsos; Giorgos Kostopoulos; Nicolas Sklavos; Odysseas G. Koufopavlou

In this paper, an efficient hardware implementation of the RC4 stream-cipher is proposed. In contrary to previous designs, which support only fixed length key, the proposed implementation integrates in the same hardware module an 8-bit up to 128-bit key length capability. Independently of the key length, the proposed VLSI implementation achieves a data throughput up to 22 Mbytes/sec in a maximum frequency of 64 MHz. The whole design was captured by using VHDL language and a FPGA device was used for the hardware implementation of the architecture. A detailed analysis, in terms of performance, and covered area is shown.


international conference on electronics circuits and systems | 2004

Comparison of the hardware architectures and FPGA implementations of stream ciphers

Michalis D. Galanis; Paris Kitsos; Giorgos Kostopoulos; Nicolas Sklavos; Odysseas G. Koufopavlou; Costas E. Goutis

In this paper, the hardware implementations of five representative stream ciphers are compared in terms of performance and consumed area. The ciphers used for the comparison are the A5/1, W7, E0, RC4 and Helix. The first three ones have been used for the security part of well-known standards. The Helix cipher is a recently introduced fast, word oriented, stream cipher. The W7 algorithm has been recently proposed as a more trustworthy solution for GSM, due to the security problems that occurred concerning the A5/1 strength. The designs were coded using the VHDL language. For the hardware implementation of the designs, an FPGA device was used. The implementation results illustrate the hardware performance of each cipher in terms of throughput-to-area ratio. This ratio equals: 5.88 for the A5/1, 1.26 for the W7, 0.21 for the E0, 2.45 for the Helix and 0.86 for the RC4.


IEEE Communications Surveys and Tutorials | 2009

Software and Hardware Issues in Smart Card Technology

Georgios N. Selimis; Apostolos P. Fournaris; Giorgos Kostopoulos; Odysseas G. Koufopavlou

An efficient and strongly secure smart card mechanism involves the use of a technological background taken from the fields of computers, VLSI design and material science. The result of such a mixture is a miniature, fully operational, computation system. The nature of the data involved in smart card transactions and smart card intended uses, introduce another important factor in the smart card design mechanism which is security. The evolution of VLSI technology allows the efficient implementation of costly cryptographic operations in the smart card design methodology. Apart from the traditional cryptographic algorithms, additional techniques and special design materials have been introduced in order to protect the smart card system from cryptanalytic attacks. New architectures of software design, like object-oriented programming, give the opportunity to implement programmable multi-application cards. Thus, smart cards are transformed into highly secure devices and their establishment in the modern computer market can be considered certain. This establishment is bound to finance upcoming research in smart cards so that this product can become the basic component of electronic commerce worldwide.


International Journal of Network Management | 2008

Towards a resource management and service employment framework

Christos Chrysoulas; Evangelos Haleplidis; Giorgos Kostopoulos; Robert Haas; Odysseas G. Koufopavlou

Owing to the increase in both heterogeneity and complexity in todays networking systems, the need arises for new network-based services architectures. They must provide flexibility and efficiency in the definition, deployment and execution of the services and, at the same time, handle the adaptability and evolution of such services. In this paper we present an approach that applies a Web-service-based resource management framework. It enables the provision of parallel applications as QoS-aware applications, whose performance characteristics may be dynamically negotiated between a client application and service providers. Our component model allows context dependencies to be explicitly expressed and dynamically managed with respect to the hosting environment, computational resources and dependencies on other components. In such a model the resource management, in terms of representation, allocation and management of the resources, plays a vital role regarding the efficiency of the entire dynamic service deployment architecture.


international conference on mobile multimedia communications | 2007

NASS-IMS bundled authentication study through core network concepts

Giorgos Kostopoulos; Odysseas G. Koufopavlou

Emerging broadband access technologies are enabling the introduction of IP services to an increasing number of users. The market forecasts suggest that a new class of network providers will deploy public wireless or not networks based on these new technologies. In order to offer uninterrupted IP service combined with ubiquitous seamless mobility, these multi-provider networks need to be integrated with each other. As the latest descendant of such networks, the IP Multimedia Subsystem (IMS) has been envisaged to build up the extra functionality required to bridge such functionality gaps, hence accelerate services harmonisation in the context of mixed technology networks. Based on IMS architectural perception as well on ETSI TISPAN architecture, this article presents a complementary study of NASS-IMS bundled authentication on a core network communication concept. Finally, it concludes by focusing on its performance assessment through comparisons to different core network architectures and density of users.


international conference on networking and services | 2007

Security Analysis of SIP Signalling during NASS-IMS bundled Authentication

Giorgos Kostopoulos; Odysseas G. Koufopavlou

This paper deals with issues related to the way in which clients authenticate to NASS and simultaneously also gain service layer authentication using the single sign-on NASS bundled authentication. A security analysis of SIP sequence messages during NASS-IMS bundled authentication is presented. Through this analysis we aim to identify the SIP vulnerabilities during the NASS-IMS bundled authentication. To demonstrate the signaling we will use emulation software and we will design specific test cases. From this we will identify vulnerability issues during SIP signaling in the NASS-IMS bundled Authentication as well as interesting conclusions regarding NASS functionalities.


The International Arab Journal of Information Technology | 2005

Comparison of the Hardware Implementation of Stream Ciphers.

Michalis D. Galanis; Paris Kitsos; Giorgos Kostopoulos; Nicolas Sklavos; Constantinos E. Goutis


Archive | 2007

State-of-the-Art Security in Grid Computing

Nicolas Sklavos; Giorgos Kostopoulos; Odysseas G. Koufopavlou


communication systems and networks | 2008

Towards a service-enabled distributed router architecture

Christos Chrysoulas; Evangelos Haleplidis; Giorgos Kostopoulos; Robert Haas; Spyros G. Denazis; Odysseas G. Koufopavlou


Archive | 2008

Pervasive Computing Security: Bluetooth Example

Giorgos Kostopoulos; Paris Kitsos; Odysseas G. Koufopavlou

Collaboration


Dive into the Giorgos Kostopoulos's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Nicolas Sklavos

Technological Educational Institute of Patras

View shared research outputs
Top Co-Authors

Avatar

Paris Kitsos

Hellenic Open University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge