| Issue Date | Title | Author(s) |
| Mar-2012 | Design and implementation of a SHA-3 candidate Skein-512 hash/MAC hardware architecture | Michail, Harris ; Athanasiou, George S. ; Tsingkas, Elias N. ; Chalkou, Chara I. ; Theodoridis, G. ; Goutis, Costas E. |
| Sep-2016 | Design and implementation of totally-self checking SHA-1 and SHA-256 hash functions’ architectures | Michail, Harris ; Athanasiou, George S. ; Theodoridis, George ; Gregoriades, Andreas ; Goutis, Costas E. |
| Jul-2018 | Design and validation of an agent-based driving simulator | Gregoriades, Andreas ; Pampaka, Maria ; Michail, Harris ; Viugova, Maria |
| Dec-2010 | Designs and comparisons of authentication modules for IPSec in configurable and extensible embedded processor | Michail, Harris ; Athanasiou, George S. ; Makridakis, George |
| Nov-2014 | Distribution of cultural content through exploitation of cryptographic algorithms and hardware identification | Michail, Harris ; Louca, Constantinos ; Gavrilis, Dimitris ; Gregoriades, Andreas ; Anastasiou, Lazaros ; Ioannides, Marinos |
| 2015 | A driving simulator for discovering requirements in complex systems | Michail, Harris ; Gregoriades, Andreas ; Pampaka, Maria ; Hadjicosti, Jack ; Florides, Christos |
| Aug-2005 | Efficient design of high-level mechanisms for hard safety-critical low-power devices | Kakarountas, A. P. ; Michail, Harris ; Goutis, C. A. ; Spiliotopoulos, V. ; Nikolaidis, S. ; Kokkinos, V. |
| Dec-2004 | Efficient implementation of the Keyed-Hash Message Authentication Code (HMAC) using the SHA-1 hash function | Michail, Harris ; Kakarountas, Athanasios P. ; Milidonis, Athanasios S. |
| Nov-2005 | Efficient small-sized implementation of the keyed-hash message authentication cod | Michail, Harris ; Yiakoumis, Ioannis I. ; Papadonikolakis, Markos E. |
| 1-Dec-2005 | Efficient small-sized implementation of the keyed-hash message authentication code | Yiakoumis, Ioannis ; Michail, Harris ; Papadonikolakis, Markos ; Goutis, Costas E.; Kakarountas, Athanasios P. |
| Oct-2012 | Evolution of the e-Museum concept through exploitation of cryptographic algorithms | Ioannides, Marinos ; Michail, Harris ; Athanasiou, George S. ; Gregoriades, Andreas |
| 30-Oct-2015 | Hardware implementation of the Totally Self-Checking SHA-256 hash core | Michail, Harris ; Kotsiolis, Apostolis ; Kakarountas, Athanasios P. ; Athanasiou, George S. ; Goutis, Costas E. |
| 6-Aug-2015 | High performance pipelined FPGA implementation of the SHA-3 hash algorithm | Ioannou, Lenos ; Michail, Harris ; Voyiatzis, Artemios G. |
| Jun-2010 | High Throughput Hardware/Software Co-Design Approach for SHA-256 Hashing Cryptographic Module In IPSec/IPv6 | Michail, Harris ; Athanasiou, George S. ; Gregoriades, Andreas ; Panagiotou, C. L. |
| Nov-2005 | High throughput implementation of the new Secure Hash Algorithm through partial unrolling | Michail, Harris ; Goutis, Costas E.; Aisopos, Konstantinos; Kakarountas, Athanasios P. |
| Jan-2013 | High-performance FPGA implementations of the cryptographic hash function JH | Athanasiou, George S. ; Michail, Harris ; Theodoridis, G. ; Goutis, Costas E. |
| Aug-2006 | High-speed FPGA implementation of secure hash algorithm for IPSec and VPN applications | Kakarountas, Athanasios P.; Theodoridis, George; Milidonis, Athanasios ; Goutis, Costas E.; Michail, Harris |
| Jul-2012 | High-throughput hardware architectures of the JH round-three SHA-3 candidate: An FPGA design and implementation approach | Athanasiou, George S.; Theodoridis, George; Chalkou, Chara I. ; Goutis, Costas E.; Michail, Harris ; Bardis, D. |
| 1-Dec-2009 | High-throughput implementation of the RIPEMD-160 | Kakarountas, Athanasios P. ; Michail, Harris ; Goutis, Costas E. ; Rjoub, Abdoul M. |
| 1-Dec-2008 | Holistic methodology for designing ultra high-speed SHA-1 hashing cryptographic module in hardware | Michail, Harris ; Goutis, C. |