| Issue Date | Title | Author(s) |
| Jul-2005 | Case study and application of pre-computation technique for hashing cores aiming at high-throughput implementations | Michail, Harris ; Kakarountas, Athanasios P. ; Goutis, Costas E. |
| Apr-2011 | Cipher block based authentication module: A hardware design perspective | Kakarountas, Athanasios P.; Selimis, Georgios ; Michail, Harris ; Schinianakis, Dimitrios ; Goutis, Costas E. |
| 2012 | Combining traffic simulation with bayesian networks for improved quantification of accident risk index | Michail, Harris ; Mouskos, Kyriacos C. ; Gregoriades, Andreas |
| 7-Sep-2010 | A Data Locality Methodology for Matrix-matrix Multiplication Algorithm | Athanasiou, George S. ; Kritikakou, Angeliki S. ; Goutis, Costas E. ; Kelefouras, Vasileios I. ; Alachiotis, Nikolaos ; Michail, Harris |
| Apr-2007 | A decoupled architecture of processors with scratch-pad memory hierarchy | Michail, Harris ; Milidonis, Athanasios S. ; Alachiotis, Nikolaos |
| Jun-2010 | Decoupled processors architecture for accelerating data intensive applications using scratch-pad memory hierarchy | Michail, Harris ; Milidonis, Athanasios S. ; Alachiotis, Nikolaos |
| Mar-2012 | Design and implementation of a SHA-3 candidate Skein-512 hash/MAC hardware architecture | Michail, Harris ; Athanasiou, George S. ; Tsingkas, Elias N. ; Chalkou, Chara I. ; Theodoridis, G. ; Goutis, Costas E. |
| Sep-2016 | Design and implementation of totally-self checking SHA-1 and SHA-256 hash functions’ architectures | Michail, Harris ; Athanasiou, George S. ; Theodoridis, George ; Gregoriades, Andreas ; Goutis, Costas E. |
| Jul-2018 | Design and validation of an agent-based driving simulator | Gregoriades, Andreas ; Pampaka, Maria ; Michail, Harris ; Viugova, Maria |
| Dec-2010 | Designs and comparisons of authentication modules for IPSec in configurable and extensible embedded processor | Michail, Harris ; Athanasiou, George S. ; Makridakis, George |
| Nov-2014 | Distribution of cultural content through exploitation of cryptographic algorithms and hardware identification | Michail, Harris ; Louca, Constantinos ; Gavrilis, Dimitris ; Gregoriades, Andreas ; Anastasiou, Lazaros ; Ioannides, Marinos |
| 2015 | A driving simulator for discovering requirements in complex systems | Michail, Harris ; Gregoriades, Andreas ; Pampaka, Maria ; Hadjicosti, Jack ; Florides, Christos |
| Aug-2005 | Efficient design of high-level mechanisms for hard safety-critical low-power devices | Kakarountas, A. P. ; Michail, Harris ; Goutis, C. A. ; Spiliotopoulos, V. ; Nikolaidis, S. ; Kokkinos, V. |
| Dec-2004 | Efficient implementation of the Keyed-Hash Message Authentication Code (HMAC) using the SHA-1 hash function | Michail, Harris ; Kakarountas, Athanasios P. ; Milidonis, Athanasios S. |
| Nov-2005 | Efficient small-sized implementation of the keyed-hash message authentication cod | Michail, Harris ; Yiakoumis, Ioannis I. ; Papadonikolakis, Markos E. |
| 1-Dec-2005 | Efficient small-sized implementation of the keyed-hash message authentication code | Yiakoumis, Ioannis ; Michail, Harris ; Papadonikolakis, Markos ; Goutis, Costas E.; Kakarountas, Athanasios P. |
| Oct-2012 | Evolution of the e-Museum concept through exploitation of cryptographic algorithms | Ioannides, Marinos ; Michail, Harris ; Athanasiou, George S. ; Gregoriades, Andreas |
| 30-Oct-2015 | Hardware implementation of the Totally Self-Checking SHA-256 hash core | Michail, Harris ; Kotsiolis, Apostolis ; Kakarountas, Athanasios P. ; Athanasiou, George S. ; Goutis, Costas E. |
| 6-Aug-2015 | High performance pipelined FPGA implementation of the SHA-3 hash algorithm | Ioannou, Lenos ; Michail, Harris ; Voyiatzis, Artemios G. |
| Jun-2010 | High Throughput Hardware/Software Co-Design Approach for SHA-256 Hashing Cryptographic Module In IPSec/IPv6 | Michail, Harris ; Athanasiou, George S. ; Gregoriades, Andreas ; Panagiotou, C. L. |