Konstantinos Limniotis

Konstantinos Limniotis

Personal Info

Konstantinos Limniotis,
Department of Informatics and Telecommunications,
National and Kapodistrian University of Athens,
TYPA Buildings, University Campus,
15784, Athens, Greece.
Email: klimn at di dot uoa dot gr



Biography

I received the B.Sc. degree in computer science (1999), the M.Sc. degree in communications systems and networks (2002), and the Ph.D. degree on ``Signal Processing Techniques in Cryptography'' (2007) from the Department of Informatics and Telecommunications, University of Athens, Greece. My main research interests include cryptography, Boolean functions & sequences, network security, personal data protection & privacy and error control coding.

I have joined the Hellenic Data Protection Authority as an ICT Specialist since 2009.

Since 2022, I am member of ENISA's Ad Hoc Working Group (AHWG) on Data Protection Engineering.

For my detailed CV, please click here.


Publications

Ph.D. Thesis

Books - Volume chapters

  1. A. Varelias, K. Limniotis and N. Kolokotronis, "Cryptographic properties of Boolean functions generaring similar De Bruijn sequences'', chapter in "Analysis, Cryptography and Information Science", World Scientific, 2023 [ link ]

  2. S. Brotsis, N. Kolokotronis and K. Limniotis, "Towards Post-Quantum Blockchain Platforms'', chapter in "Security Technologies and Methods for Advanced Cyber Threat Intelligence, Detection and Mitigation", Now Publishers, pp. 106--130, 2022 [ link ]

  3. N. Baxevanou, S. T. Sotirhou and K. Limniotis, "Contact Tracing Apps in the COVID-19 Pandemic: Exploring the Underlying Personal Data Processing'', chapter in book "Modern Challenges and Approaches to Humanitarian Engineering", IGI Clobal, pp. 194--212, 2022 [ link ]

  4. K. Limniotis and N. Kolokotronis, "Cryptography threats'', chapter in book "Cyber-Security Threats, Actors, and Dynamic Mitigation ", Kolokotronis N., Shiaeles S. (eds), CRC Press, pp. 123--159, 2021. [ link ]

  5. I. Koufos, N. Kolokotronis and K. Limniotis, "Dynamic risk management'', chapter in book "Cyber-Security Threats, Actors, and Dynamic Mitigation ", Kolokotronis N., Shiaeles S. (eds), CRC Press, pp. 247--281, 2021. [ link ]

  6. N. Kolokotronis, K. Limniotis and P. Rizomiliotis, "Applied Cryptography'', chapter in book "Cyberspace Information and Systems Security", Katsikas S., Gritzalis S., Lambrinoudakis K. (eds), NewTech Pubs (in Greek), pp. 235--282, 2021. [ link ]

  7. K. Limniotis, N. Kolokotronis and D. Kotanidis, "De Bruijn sequences and suffix arrays: Analysis and constructions'', chapter in volume "Modern Discrete Mathematics, with applications in Cryptography, Information Systems and Modelling", Daras N., Rassias T. (eds), Springer Optimization and Its Applications, vol 131, pp. 297--316, 2018. [ link ]

  8. K. Limniotis, "Cryptography and Network Security – Principles and Practices", W. Stallings, Editing Greek version, Iwn, 2011 [ link ].

  9. K. Limniotis, "Block ciphers", chapter in book «Modern Cryptography: Theory and Applications», M. Burmester, S. Gritzalis, S. Katsikas, V. Xrysikopoulos (Eds), Papasotiriou (in Greek), 2011 [ link ].

  10. N. Kolokotronis and K. Limniotis, "Abstract Algebra", chapter in book «Modern Cryptography: Theory and Applications», M. Burmester, S. Gritzalis, S. Katsikas, V. Xrysikopoulos (Eds), Papasotiriou (in Greek), 2011 [ link ].

Journal publications

  1. P. Christodoulou and K. Limniotis, "Data protection issues in automated decision-making systems based on Machine Learning: Research Challenges", Network, vol. 4, pp. 91-113, 2024. [link]

  2. S. Brotsis, K. P. Grammatikakis, D. Kavallieros, A. I. Mazilu, N. Kolokotronis, K. Limniotis and C. Vassilakis, "Blockchain meets Internet of Things (IoT) forensics: A unified framework for IoT ecosystems,'' Internet of Things, Elsevier, vol. 24, 2023. [ link ]

  3. G. Achilleos, K. Limniotis and N. Kolokotronis, "Exploring personal data processing in video conferencing apps'', Electronics, vol. 12, no. 5:1247, 2023. [ link ]

  4. I. Tzinos, K. Limniotis and N. Kolokotronis, "Evaluating the performance of post-quantum secure algorithms in the TLS protocol'', J. Surveill. Secur. Saf., vol. 3, pp. 101--127, 2022. [ link ]

  5. A. Patergianakis and K. Limniotis, "Privacy issues in stylometric techniques'', Cryptography, vol. 6, no. 17, 2022. [ link ]

  6. S. Monogios, K. Magos, K. Limniotis, N. Kolokotronis and S. Shiaeles, "Privacy issues in Android applications: the cases of GPS navigators and fitness trackers'', International Journal of Electronic Governance (IJEG), vol. 14, no. 1/2, pp. 83-111, Inderscience Publishers, 2022. [ link ]

  7. P. Podimatas and K. Limniotis, "Evaluating the Performance of Lightweight Ciphers in Constrained Environments - The Case of Saturnin ,'' Signals, vol. 3, no. 1, 2022 (technical note). [ link ]

  8. K. Limniotis, "Cryptography as the means to protect fundamental human rights,'' Cryptography, vol. 5, no. 4, 2021. [ link ]

  9. S. Brotsis, K. Limniotis, G. Bendiab, N. Kolokotronis and S. Shiaeles, "On the suitability of blockchain platforms for IoT applications: Architectures, security, privacy, and performance,'' Computer Networks, Elsevier, vol. 191, 2021. [ link ]

  10. K. Limniotis and N. Kolokotronis, "The error linear complexity spectrum as a cryptographic criterion of Boolean functions,'' IEEE Trans. Inform. Theory, vol. 65, no. 12, pp. 8345 - 8356, 2019. [ link ]

  11. V. Chatzistefanou and K. Limniotis, "Anonymity in social networks: The case of anonymous social media'', International Journal of Electronic Governance (IJEG), vol. 11, no. 3/4, pp. 361-385, Inderscience Publishers, 2019. [ link ]

  12. N. Kolokotronis, K. Limniotis, S. Shiaeles and R. Griffiths, "Secured by blockchain: safeguarding Internet of Things devices'', IEEE Consumer Electronics Magazine, vol. 8, no. 3, pp. 28--34, 2019. [ link ]

  13. K. Limniotis and N. Kolokotronis, "Boolean functions with maximum algebraic immunity: further extensions of the Carlet--Feng construction'', Designs, Codes and Cryptography, vol. 86, no. 8, pp. 1685--1706, Springer, 2018. [ link ]

  14. D. Alvanos, K. Limniotis, and S. Stavrou, "On the Cryptographic Features of a VoIP Service", Cryptography, MDPI, no. 2, 3, 2018 (technical note). [ link ].

  15. K. Limniotis, N. Kolokotronis and N. Kalouptsidis, "Secondary constructions of Boolean functions with maximum algebraic immunity'', Cryptography and Communications - Discrete Structures, Boolean Functions and Sequences, Springer, pp. 179–199, no. 3, vol. 5, Sep. 2013. [ link ]

  16. N. Kolokotronis, K. Limniotis and N. Kalouptsidis, "Best affine and quadratic approximations of particular classes of Boolean functions'',  IEEE Trans. Inform. Theory, vol. 55, no. 11, pp. 5211—5222, Nov. 2009. [ link ]

  17. T. Etzion, N. Kalouptsidis, N. Kolokotronis, K. Limniotis and K. G. Paterson, "Properties of the error linear complexity spectrum'',  IEEE Trans. Inform. Theory, vol. 55, no. 10, pp. 4681—4686, Oct. 2009. [ link ]

  18. N. Kolokotronis, K. Limniotis and N. Kalouptsidis, "Factorization of determinants over finite fields and applications in stream ciphers'', Cryptography and Communications - Discrete Structures, Boolean Functions and Sequences, Springer, vol. 1, no. 2, pp. 175—205, Sep. 2009. [ link ]

  19. K. Limniotis, N. Kolokotronis and N. Kalouptsidis, "On the linear complexity of sequences obtained by state space generators'',  IEEE Trans. Inform. Theory, vol. 54, no. 4, pp. 1786—1793, Apr. 2008. [ link ]

  20. K. Limniotis, N. Kolokotronis and N. Kalouptsidis, "On the nonlinear complexity and Lempel-Ziv complexity of finite length sequences,'' IEEE Trans. Inform. Theory, vol. 53, no. 11. pp. 4293—4302, Nov. 2007. [ link ]

  21. K. Limniotis, Y. Tsiatouhas, Th. Haniotakis and A. Arapoyanni, "A design technique for energy reduction in NORA CMOS logic," IEEE Trans. Circuits & Systems I Regul. Pap. vol. 53, no. 12, pp. 2647—2655, Dec. 2006.[ link ]

Conference publications

  1. G. Kermezis, K. Limniotis and N. Kolokotronis, "User-generated pseudonyms through Merkle trees", In Privacy Technologies and Policy - Annual Privacy Forum 2021 (APF), Lecture Notes in Computer Science, Springer, vol. 12703, pp. 89-105, 2021. [link]

  2. S. Brotsis, N. Kolokotronis, K. Limniotis, G. Bendiab and S. Shiaeles, "On the Security and Privacy of Hyperledger Fabric: Challenges and Open Issues", 2020 IEEE World Congress on Services (SERVICES), pp. 197-204, 2020. [link]

  3. C. Braker, S. Shiaeles, G. Bendiab, N. Savage and K. Limniotis, "BotSpot: Deep Learning Classification of Bot Accounts Within Twitter", Internet of Things, Smart Spaces, and Next Generation Networks and Systems (NEW2AN 2020 - ruSMART 2020), Lecture Notes in Computer Science, Springer, vol. 12525, pp. 165-175, 2020. [link]

  4. S. Brotsis, N. Kolokotronis, K. Limniotis and S. Shiaeles, "On the Security of Permissioned Blockchain Solutions for IoT Applications", 6th IEEE Conference on Network Softwarization (IEEE NetSoft), pp. 465-472, 2020. [link]

  5. S. Monogios, K. Limniotis, N. Kolokotronis and S. Shiaeles, "A case study of intra-library privacy issues on Android GPS navigation apps", e-Democracy 2019: Safeguarding Democracy and Human Rights in the Digital Age, Communications in Computer and Information Science, Springer, vol. 1111, pp. 34--48, Dec. 2019. [link]

  6. O. Gkotsopoulou, E. Charalambous, K. Limniotis, P. Quinn, D. Kavallieros, G. Sargsyan, S. Shiaeles, N. Kolokotronis, "Data protection by design for cybersecurity systems in a Smart Home environment", IEEE Conference on Network Softwarization (IEEE NetSoft), pp. 101-109, 2019. [link] [arXiv version]

  7. S. Brotsis, N. Kolokotronis, K. Limniotis, S. Shiaeles, D. Kavallieros, E. Bellini and C. Pavue, "Blockchain solutions for forensic evidence preservation in IoT environments", IEEE Conference on Network Softwarization (IEEE NetSoft), pp. 110-114, 2019. [link] [arXiv version]

  8. V. Chatzistefanou and K. Limniotis, "On the (non-)anonymity of anonymous social networks", E-Democracy – Privacy-Preserving, Secure, Intelligent E-Government Services, Communications in Computer and Information Science, Springer, vol. 792, pp. 153--168, Dec. 2017. [link]

  9. K. Limniotis and N. Kolokotronis, "Boolean Functions with Maximum Algebraic Immunity Based on Properties of Punctured Reed-Muller Codes", BalkanCryptSec 2015, Lecture Notes in Computer Science, Springer, vol. 9540, pp. 3--16, Sept. 2015. [link]

  10. N. Kolokotronis and K. Limniotis, "On the second-order nonlinearity of cubic Maiorana-McFarland Boolean functions", International Symposium on Information Theory and its Applications (ISITA), pp. 596—600, October 2012. [ link ]

  11. N. Kolokotronis and K. Limniotis, "A greedy algorithm for checking normality of cryptographic Boolean functions", International Symposium on Information Theory and its Applications (ISITA), pp. 601—605, October 2012. [ link ]

  12. K. Limniotis, N. Kolokotronis and N. Kalouptsidis, "Constructing Boolean functions in odd number of variables with maximum algebraic immunity", in IEEE International Symposium on Information Theory (ISIT), pp. 2686—2690, August 2011. [ link ]

  13. T. Etzion, N. Kalouptsidis, N. Kolokotronis, K. Limniotis and K. G. Paterson, "On the error linear complexity profiles of binary sequences of period 2n", in IEEE International Symposium on Information Theory (ISIT), pp. 2400—2404, July 2008. [ link ]

  14. N. Kolokotronis, K. Limniotis and N. Kalouptsidis, "Efficient computation of the best quadratic approximations of cubic boolean functions", in 11th IMA International Conference on Cryptography and Coding, Lecture Notes in Computer Science, Springer, vol. 4887, pp. 73—91, Dec. 2007. [ link ]

  15. N. Kolokotronis, K. Limniotis and N. Kalouptsidis, "Improved bounds on the linear complexity of keystreams obtained by filter generators", in 3rd SKLOIS Conference on Information Security and Cryptology (Inscrypt 2007), Lecture Notes in Computer Science, Springer, vol. 4990, pp. 246—255, Sept. 2007. [ link ]

  16. N. Kolokotronis, K. Limniotis and N. Kalouptsidis, "Best affine approximations of Boolean functions and applications to low order approximations",  in IEEE International Symposium on Information Theory (ISIT), pp. 1836—1840, June 2007. [ link ]

  17. K. Limniotis, N. Kolokotronis and N. Kalouptsidis, "Nonlinear complexity of binary sequences and connections with Lempel-Ziv compression", in Sequences and Their Applications (SETA), Lecture Notes in Computer Science, Springer, vol. 4086, pp. 168—179, Sept. 2006. [ link ]

  18. N. Kolokotronis, K. Limniotis and N. Kalouptsidis, "Lower bounds on sequence complexity via generalised Vandermonde determinants", in Sequences and Their Applications (SETA), Lecture Notes in Computer Science, Springer, vol. 4086, pp. 271—284, Sept. 2006. [ link ]

  19. K. Limniotis, N. Kolokotronis and N. Kalouptsidis, "New results on the linear complexity of binary sequences", in IEEE International Symposium on Information Theory (ISIT), pp. 2003—2007, July 2006. [ link ]

  20. N. Kalouptsidis and K. Limniotis, "Nonlinear span, minimal realizations of sequences over finite fields and De Bruijn generators", International Symposium on Information Theory and its Applications (ISITA), pp. 794—799, October 2004.

  21. Y. Tsiatouhas, K. Limniotis, A. Arapoyanni and Th. Haniotakis, "A low power NORA design technique based on charge recycling", IEEE International Conference on Electronics, Circuits and Systems (ICECS), pp. 224—227, December 2003.  [ link ]

Expository papers

  1. K. Limniotis, "Algebraic attacks on stream ciphers: Recent developments and new results", Journal of Applied Mathematics and Bioinformatics, Scienpress Ltd., vol. 3, n. 1, pp. 57—81, 2013.  [ link ]

National Conferences with International Participation

  1. D. Kontogeorgis, K. Limniotis and I. Kantzavelou, "An evaluation of the HTTPS adoption in websites in Greece: estimating the users awareness", 22th Pan-Hellenic Conference on Informatics (PCI), ACM International Conference Proceeding Series (ICPS), pp. 46-51, 2018.  [ link ]

  2. E. Iosifidis and K. Limniotis, "A study of lightweight block ciphers in TLS: The case of Speck", 20th Pan-Hellenic Conference on Informatics (PCI), ACM International Conference Proceeding Series (ICPS), article no. 64, 2016.  [ link ]

Opinion papers on personal data protection

  1. K. Limniotis and G. Panagopoulou, "Data Loss Preventions Systems: Security vs. Privacy", Annual Privacy Forum (APF) 2014 - Opinion papers (Positions & views on different aspects of the proposed EU data protection reform package), pp. 11—13, Athens, Greece, May 2014 (Available here).

  2. Z. Kardasiadou, E. Chatziliasi and K. Limniotis, "e-Government in Greece: serving state’s economic needs – respecting the fundamental right to data protection", in the 7th International Conference in Global Security, Safety and Sustainability (ICGS3) / 4th e-Democracy Joint Conferences, Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, Springer, vol. 99, pp. 179—185, 2012.  [ link ]

Technical reports - Preprints

  1. K. Limniotis, N. Kolokotronis and N. Kalouptsidis, "Modifying Boolean functions to ensure maximum algebraic immunity", Cryptology ePrint Archive, Report 2012/046 (2012), http://eprint.iacr.org.

  2. (This is a first draft of the work that has been subsequently published, in a revised form, in the "Cryptography and Commmunications" journal, Springer, Sept. 2013).
  3. N. Kolokotronis and K. Limniotis, "Maiorana-McFarland functions with high second-order nonlinearity", Cryptology ePrint Archive, Report 2011/212 (2011), http://eprint.iacr.org.

    (This is an extended version of the paper that has been published in Proceedings of ISITA 2012).
  4. N. Kolokotronis, K. Limniotis and N. Kalouptsidis, "Best Quadratic Approximations of Cubic Boolean Functions", Cryptology ePrint Archive, Report 2007/037 (2007), http://eprint.iacr.org.

    (This is a first draft of the work that has been subsequently published, in a revised form, in the "IEEE Trans. Inform. Theory" journal, Nov. 2009).

Contribution in reports of European Union Agency for Cybersecurity (ENISA)

  1. "Engineering Personal Data Sharing: Emerging use cases and technologies", P. Drogkaris and M. Adamczyk (Eds), ENISA Report (contributors: ENISA AHWG on Data Protection Engineering), January 2023 [link]

  2. "Data pseudonymisation: Advanced techniques and use cases", A. Bourka and P. Drogkaris (Eds), ENISA Report (contributors: C. Lauradoux, K. Limniotis, M. Hansen, M. Jensen, P. Eftasthopoulos), January 2021 [link]

  3. "Pseudonymisation techniques and best practices", A. Bourka, P. Drogkaris and I. Agrafiotis (Eds), ENISA Report (contributors: M. Jensen, C. Lauradoux, K. Limniotis), December 2019 [link]

  4. "Recommendations on shaping technology according to GDPR provisions - An overview on data pseudonymisation ", A. Bourka and P. Drogkaris (Eds), ENISA Report (contributors: K. Limniotis, M. Hansen), January 2019 [link]

  5. "Recommendations on shaping technology according to GDPR provisions - Exploring the notion of data protection by default ", A. Bourka and P. Drogkaris (Eds), ENISA Report (contributors: M. Hansen, K. Limniotis), December 2018 [link]

Educational Textbooks

  1. K. Limniotis and G. Rousopoulos, "General Data Protection Regulation: The Public Administration's obligations", National Centre for Public Administration and Local Government, 2022 (in Greek). [link].

 

My public google scholar profile is available here.

My DBLP profile is available here.

My Erdös number is 3 (through Prof. Tuvi Etzion).


Teaching


Awards


Invited talks

Cryptography

Personal Data Protection


Useful Links