K.A.Draziotis
School of Informatics,
Aristotle University of Thessaloniki,
P.O. Box 114, Thessaloniki 54124, Greece
tel. +30-2310-991928
e-mail : drazioti [at] csd [dot] auth [dot] gr

my cv
pgp
Genealogy
courses
Introduction to cryptography (textbook in Greek with CC license)
students
crypto group

About authorship
About Publication rates

bookmarks
Guidelines for a Recommendation Letter (in Greek)


Open Source Software

GNU/Linux

Debian
Ubuntu
Other Linux distros
Linux distributions for students

Sagemath

Download (mirror in Greece)
online sagemath calculator
tutorial
book (Creative Commons)
linear algebra
Sage support

Pari gp

tutorial

Fpylll
Big Blue Button (web conferencing system)
Free software in school/universities
AuTh Computer Science Department Open source projects
Libreoffice- Download
Mirror server- our mirror for FOSS

Digital Privacy

degoogle
degoogle2
degoogle (reddit)
https://www.eff.org/
https://epic.org/
https://privacy.ellak.gr/ (in greek)

Coronovirus

Covid-19: Awesome write up by N.Christakis
The Curve Is a Lie
Open source
Map (J.Hopkins)
The hammer and the dance
Epidemic calculator
opencovidpledge.org
Prof. J. Ioannidis talks bout covid-19 (in Greek)

High Quality Math Journals/Free of Charge/Fair Open Access Principles

Discrete Analysis
Algebraic Combinatorics
Advances in Combinatorics
The Electronic Journal of Combinatorics
The Épijournal de Géometrie Algébrique
Journal of Integer Sequences
Theory of Computing

Publications

Talks

Mathscinet

Zentralblatt (open source)

My papers in Github

My phd ( in Greek) : [1]

J1. Integer Points on the curve Y^2=X^3 \pm p^kX. Mathematics of Computation , Vol. 75, 255, Pages 1493-1505, American Mathematical Society (2006). [1]

J2. Practical Solution of the Diophantine Equation y^2 = x(x + 2^ap^b)(x- 2^ap^b). Mathematics of Computation, Vol. 75, 255, Pages 1585-1593, American Mathematical Society (2006). [1] - Joint work with D. Poulakis

J3. The Ljunggren Equation revisited, Colloquium Mathematicum, Vol.109, Number 1, Pages 9-11, Inst. of Math.-Polish Academy of Sciences (2007). [1]

J4. Explicit Chevalley-Weil Theorem for Affine Plane Curves. Rocky Mountain Journal of Mathematics, Vol.39, no.1, Pages 49-70, Rocky Mountain Mathematics Consortium (2009). [1] - Joint work with D. Poulakis

J5. Solving the Diophantine Equation y^2=x(x^2-n^2). Journal of Number Theory, Volume 129, Issue 1, Pages 102-121, Science Direct (2009). [1] -Joint work with D. Poulakis

J6. An effective version of Chevalley-Weil Theorem for projective plane curves. Houston Journal of Mathematics, p. 29--39, 38(1) (2012). [1] - Joint work with D. Poulakis

J7. Practical solution of the Diophantine Equation X^{nr}+Y^{n}=q, Elemente der Mathematik, 66, Pages 19-25, European Mathematical Society (2011). [1].

J8. On the number of Integer Points on the Elliptic Curve y^2=x^3+Ax. International Journal of Number Theory, Vol.7(3), Pages 611-621, World Scientific (2011). [1]

J9. Integer Solutions of the Equation y^2 = Ax^4 + B, Journal of Integer Sequences, vol.18 (4) (2015) (14 pages) [1] - Joint work with Dr. Paraskevas K. Alvanos

J10. (EC)DSA lattice attacks based on Coppersmith's method, Information Processing Letters 116(8), Elsevier (2016), Pages 541–545 [1]

J11. Improved attacks on knapsack problem with their variants and a knapsack type ID-scheme. Advances in Mathematics of Communications 2018, 12(3), Pages 429-449, American Institute of Mathematical Sciences [1] - Joint work with A. Papadopoulou.

J12. Birthday type attacks to the Naccache-Stern Knapsack cryptosystem. Information Processing Letters, Vol. 138, October 2018, Pages 39 - 43, Elsevier, [1] - Joint work with N. Chatzis and M. Anastasiadis.

J13. Asymptotic formulas for Vasyunin cotangent sums, Applied Mathematics and Computation, Volume 383, 15 October 2020 (20 pages) Elsevier [1] - Joint work with G. Fikioris

J14. Attacking (EC)DSA With Partially Known Multiples of Nonces, Information and Computation, Volume 301, Part B, December 2024, Elsevier, preprint version : [1] - Joint work with Marios Adamoudis and Dimitrios Poulakis

J15. Message recovery attack to NTRU using a lattice independent from the public key, Advances in Mathematics of Communications, 2025, 19(1): 109-125, American Institute of Mathematical Sciences 10.3934/amc.2023040, preprint version : [1] - Joint work with Marios Adamoudis

J16. Descent methods for studying integer points on y^2=f(x), for p odd prime, Houston Journal of Mathematics, Vol.50 (1), 2024. [1]

J17. Attacking (EC)DSA scheme with ephemeral keys sharing specific bits. Theoretical Computer Science, Vol. 1001, June 2024, Elsevier, 2024. - Joint work with Marios Adamoudis and D. Poulakis

J18. Cryptographic Primitives based on Compact Knapsack. Journal of information security and applications ,Volume 83, Elsevier, 2024, arxiv:2303.08973 - Joint work with G. S. Rizos

J19. Parallel Algorithm for the Inversion of Matrices with Simultaneously Diagonalizable Blocks. Computers & Mathematics with Applications, Volume 83, Elsevier, 2024, - Joint work with D. S. Lazaridis and N. L. Tsitsas

C1. Computation of Pell Number of the Form px^2. Third International Conference, CAI 2009, Thessaloniki, Greece, May 19-22, 2009, Proceedings. LNCS 5725 , Springer (2009). [1]

C2. Lattice Attacks on DSA schemes based on Lagrange's Algorithm, CAI 2013 (France), LNCS 8080, Pages 119-13, Springer (2011). [1] - Joint work with D. Poulakis

C3. Balanced Integer solutions of linear equations, AMIMS 2013(Greece), Optimization and its Applications (SOIA), vol.91, Pages 173-188, Springer (2014). [1]

C4. Implementing Private K- Means Clustering Using a LWE -based Cryptosystem, 2017 IEEE Symposium on Computers and Communications (ISCC) , Pages 88–93 [1] - with A. Gounaris and A. Theodouli

C5. Solutions of hard knapsack problems using extreme pruning. 3rd CryCybIW, 26-27 May 2016, Athens, Greece, Modern Discrete Mathematics and Analysis, Springer Optimization and Its Applications book series (SOIA), volume vol.131, Pages 81-95, Springer (2018) [1] - Joint work with A. Papadopoulou and E. Daravigkas.

C6. Enhancing an Attack to DSA Schemes, CAI 2019, p. 13-25. LNCS 11545, Springer, 2019, [1] - with M. Adamoudis and D. Poulakis

C7. Towards message recovery in NTRU Encryption with auxiliary data, NUTMIC 2024. LNCS 14966, Springer - with M. Adamoudis and E. Poimenidou

BC1. Product Subset Problem : Applications to number theory and cryptography, Book Chapter, Analysis, Cryptography and Information Science, Chapter 5, Vol. 10 , World Scientific, 2023, [1] - Joint work with V. Martidis and S. Tiganourias.

If you find an error, bug, or you have to report something please email me.