Skip to main content
Quality Assurance Unit (MODIP)
Aristotle University of Thessaloniki
Login
Home Page
AUTH
Quality Assurance
Quality Management System
You are here
Home
»
Report CV
Curriculum Vitae
Expand
|
Collapse
Konstantinos Draziotis
Assistant Professor, School of Informatics
Personal Information
2310991928
drazioti@csd.auth.gr
http://users.auth.gr/~drazioti
Scopus ID
14048350400
Γνωστικό Αντικείμενο
:
Θεωρητική Κρυπτογραφία-Υπολογιστική Θεωρία αριθμών
Επιστημονική Ειδίκευση
:
Μαθηματικά
Education
Προπτυχιακές Σπουδές
1996
Πτυχίο
Μαθηματικών
Αριστοτέλειο Πανεπίστημιο Θεσσαλονικης
Greece
Καθαρά Μαθηματικά
Διδακτορικό Δίπλωμα
2005
ΔΔ
Μαθηματικών
Αριστοτέλειο Πανεπίστημιο Θεσσαλονικης
Greece
Course Work
Courses of Winter semester of 2024–25 academic year
SCHOOL OF INFORMATICS
NCO-01-01
MATHEMATICAL ANALYSIS I
NCO-01-03
LINEAR ALGEBRA
NGE-07-02
INTERNSHIP
POSTGRADUATE STUDIES PROGRAMME "COMMUNICATION NETWORKS AND SYSTEMS SECURITY"
CNSS106
Cryptography
CNSS301
Postgraduate diploma thesis
POSTGRADUATE STUDIES PROGRAMME "TECHNOLOGIES OF INTERACTIVE SYSTEMS"
IHST301
Postgraduate Diploma Thesis
Courses of Spring semester of 2024–25 academic year
SCHOOL OF INFORMATICS
NCO-02-01
MATHEMATICAL ANALYSIS II
NGE-06-03
FOUNDATIONS OF CRYPTOGRAPHY
NGE-07-02
INTERNSHIP
NNA-08-03
INFORMATION THEORY AND CODING
Theses Supervised
Student Theses within AUTh
In progress
Postgraduate
No title
No title
Doctoral
No title
No title
Postdoctoral
No title
2024–2025
Undergraduate
Detection and mitigation of SQL vulnerabilities
Tools for exploring the SSL/TLS protocols
Use of Homomorphic Encryption in Artificial Ιntelligence
FACTORIZATION AND LATTICES
VULNERABILITY CHECK IN OPENSSL SERVERS
Postgraduate
Study of Cryptographic Accumulators In Antivirus Technology
2023–2024
Postgraduate
Crowdfunding platforms on Ethereum
Attacks on the Bitcoin system based on weak digital signatures
A comprehensive bibliographic study of steganography techniques
Exploring the zbMath Database: Insights and Impacts on AI
The compact knapsack problem and applications in cryptography
Undergraduate
Understanding CVE through Data Analysis
Reverse Engineering in Malware Analysis
Analysis and Application of Malwares and Social Engineering Techniques on android Platforms
Penetration Testing in Active Directory
PROTECTION OF SENSITIVE PERSONAL HEALTH DATA
Cold Βoot Αttacks
The ant colony algorithm and applications
Secure Token Offering
2022–2023
Undergraduate
The Discrete Logarithm in cryptography and Index calculus method
Prediction of Protein-Ligand Binding Affinity with Algebraic Topology and Artificial Neural Networks
Postgraduate
Analysis of factorization algorithms
Online auction systems based on ethereum blockchain
2021–2022
Postgraduate
Evaluation of executable files using reverse engineering
Undergraduate
Study of Quadratic Sieve factorization algorithm
Principles of Reverse Engineering
Attacking Shortest Vector Problem using CUDA
McElice variant using QC-LDPC codes
STATISTICAL ANALYSIS ON PRIVACY
Social Engineering Attacks
An introduction to NTRU cryptosystem
Parallel and distributed implementation of SVP
2020–2021
Undergraduate
Analysis of SSH Brute-force Attacks
Construction of Large Carmichael numbers using the Erdos Algorithm
Scalling Verifiable Computation Using Efficient Set Accumulators
Postgraduate
Boneh-Durfee atttack in RSA
Key exchange system- NewHope
Cross-site scripting: Attacking and Defending
2019–2020
Postgraduate
No title
Undergraduate
Analysis and implementation of Gauss reduction algorithm in GF[2] on CUDA C.
Parallelization of Nearest Plane Algorithm using CUDA
2018–2019
Postgraduate
Security assessment using penetration testing
No title
No title
No title
Undergraduate
ALGORITHMS OF MATHEMATICAL CRYPTOGRAFY
CRYPTANALYSIS OF KNAPSACK NACCACHE-STERN CRYPTOSYSTEM
2017–2018
Postgraduate
No title
No title
Undergraduate
ATTACKS ON SSL/TLS
Implementation of Homomorphic Cryptosystems Based on (R)LWE
2016–2017
Undergraduate
Solving the Hard Knapsack Problems
Postgraduate
No title
2015–2016
Undergraduate
A Bitcoin Price Prediction System
: COPPERSMITH'S ATTACK ON RSA
2014–2015
Undergraduate
A LATTICE ATTACK ON DSA
Theses outside AUTh
Undergraduate Level
2015–2016
Τυχερός Δημήτριος
.
Coppersmith's attack on RSA
.
Μέκεσης Σταύρος
.
A bitcoin price prediction system
.
2014–2015
Πολυχρόνης Ψαράς
.
A lattice attacks on DSA
.
Χρήστος Γκαρίπης
.
Probabilistic model checking with PRISM tool-analysis of BB84 protocol
.
Administrative Work
Τμήματος
#
Από
Έως
Θέση Όργανο / Επιτροπή
2
2021
Coordinator, Υπεύθυνος πρακτικής άσκησης τμήματος
3
2018
Member, Επιτροπή Προγράμματος Σπουδών
1
2014
2017
Επιτροπή Πρόχειρων Διαγωνισμών προμήθειας ειδών & οργάνων
Research Projects
Coordinator
2023–2026
Enhancing Security of European SMEs in Response to Cybersecurity Threats
2013–2014
Applications of lattices in public key cryptography
Participant
2023–2024
Internship of Aristotle University of Thessaloniki
2020–2024
2018–2022
Internship of Aristotle University of Thessaloniki
2016–2017
Personalized product recommendation.
2016–2017
Introduction to programming with Python
Publications
(2018)
Journal Article
Anastasiadis M
,
Chatzis N
,
Draziotis Konstantinos
(2018)
.
Birthday type attacks to the Naccache–Stern knapsack cryptosystem
.
Information Processing Letters
.
vol.138 p.39-43
.
Daravigkas E
,
Draziotis Konstantinos
,
Papadopoulou Anastasia
(2018)
.
Solutions of Hard Knapsack Problems Using Extreme Pruning
.
Springer Optimization and Its Applications
.
vol.131 p.81-95
.
Draziotis Konstantinos
,
Papadopoulou Anastasia
(2018)
.
Improved attacks on knapsack problem with their variants and a knapsack type id-scheme
.
Advances in Mathematics of Communications
.
vol.12 no.3 p.429-449
.
(2017)
Conference Proceedings Article
Theodouli A
,
Draziotis Konstantinos
,
Gounaris Anastasios
(2017)
.
Implementing private k-means clustering using a LWE-based cryptosystem
.
2017 IEEE Symposium on Computers and Communications (ISCC)
.
03/07/2017-06/07/2017
.
p.88-93
.
(2016)
Journal Article
Draziotis Konstantinos
(2016)
.
(EC)DSA lattice attacks based on Coppersmith's method
.
Information Processing Letters
.
vol.116 no.8 p.541-545
.
(2013)
Conference Proceedings Article
Draziotis Konstantinos
,
Poulakis Dimitrios
(2013)
.
Lattice Attacks on DSA Schemes Based on Lagrange’s Algorithm
.
Lattice Attacks on DSA Schemes Based on Lagrange’s Algorithm : 5th International Conference, CAI 2013, Porquerolles, France, September 3-6, 2013. Proceedings
.
Porquerolles - France
.
p.119-131
.
(2012)
Journal Article
Poulakis Dimitrios
,
Draziotis Konstantinos
(2012)
.
An effective version of Chevalley-Weil theorem for projective plane curves
.
Houston Journal of Mathematics
.
vol.38 no.1 p.29-39
.
(2009)
Journal Article
Draziotis K
,
Poulakis D
(2009)
.
Solving the Diophantine equation y2 = x(x2−n2)
.
Journal of Number Theory
.
vol.129 no.1 p.102-121
.
Draziotis K
,
Poulakis D
(2009)
.
Corrigendum to 'Solving the Diophantine equation y2 = x(x2−n2)'
.
Journal of Number Theory
.
vol.129 no.3 p.739-740
.
Poulakis D
,
Draziotis K
(2009)
.
Explicit Chevalley-Weil Theorem for Affine Plane Curves
.
Rocky Mountain Journal of Mathematics
.
vol.39 no.1 p.49-70
.
(2006)
Journal Article
Draziotis Konstantinos
(2006)
.
Integer Points on the curve Y^2=X^3 \pm p^kX
.
Mathematics of Computation
.
vol.75 no.255 p.1493-1505
.
Draziotis Konstantinos
,
Poulakis Dimitrios
(2006)
.
Practical solution of the Diophantine equation y2 = x(x+2apb)(x-2apb)
.
Mathematics of Computation
.
vol.75 no.255 p.1585-1593
.
Updated: 2024-10-15