./About Me

Hey! My name is Dimitris Mouris (Δημήτρης Μούρης) and I am a Ph.D. candidate in the Electrical & Computer Engineering Dept. at the University of Delaware under the supervision of Dr. Nektarios Tsoutsos. I hold my Master's and Bachelor's degrees in Computer Systems and Computer Science, respectively, from the Dept. of Informatics, University of Athens, Greece.

I like applied cryptography, computer security, and privacy, particularly in the areas of private and verifiable computation using techniques such as zero-knowledge proofs, homomorphic encryption, and secure multi-party computation. I am motivated by the impact of cryptography in contemporary society and on humanity.

In the summer of 2021, I interned at AWS and worked on role-based access control for Amazon Redshift. In the summer of 2022, I interned at Meta as a Research Scientist in the Statistics & Privacy team and worked on private record linkage protocols.



D. Mouris, C. Gouert, and N. G. Tsoutsos, "Privacy-Preserving IP Verification", IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2021, (IEEEXplore)

D. Mouris and N. G. Tsoutsos, "Zilch: A Framework for Deploying Transparent Zero-Knowledge Proofs", IEEE Transactions on Information Forensics and Security, 2021, (IEEEXplore), (Cryptology ePrint Archive, Report 2020/1155),

D. Mouris*, C. Gouert*, N. Gupta and N. G. Tsoutsos, "Peak your Frequency: Advanced Search of 3D CAD Files in the Fourier Domain", IEEE Access, 2020, (IEEEXplore),
* The authors had equal contribution.

D. Mouris, N. G. Tsoutsos and M. Maniatakos, "TERMinator Suite: Benchmarking Privacy-Preserving Architectures", IEEE Computer Architecture Letters, 2018, (IEEEXplore), (Cryptology ePrint Archive, Report 2017/1218),


D. Mouris, C. Gouert, and N. G. Tsoutsos, "zk-Sherlock: Exposing Hardware Trojans in Zero-Knowledge", IEEE Computer Society Annual Symposium on VLSI (ISVLSI), 2022, (IEEEXplore), (Cryptology ePrint Archive, Report 2022/516)

D. Mouris and N. G. Tsoutsos, "Pythia: Intellectual Property Verification in Zero-Knowledge", 57th ACM/EDAC/IEEE Design Automation Conference (DAC), 2020, (IEEEXplore)

P. Cronin, C. Gouert, D. Mouris, N. G. Tsoutsos, and C. Yang, "Covert Data Exfiltration Using Light and Power Channels", 37th IEEE International Conference on Computer Design (ICCD), 2019, (IEEEXplore)

Open-access Archives

C. Gouert*, D. Mouris*, and N. G. Tsoutsos, "New Insights into Fully Homomorphic Encryption Libraries via Standardized Benchmarks", Cryptology ePrint Archive, Report 2022/425, 2022.
* The authors had equal contribution and are listed in alphabetical order.

D. Mouris and N. G. Tsoutsos, "Masquerade: Verifiable Multi-Party Aggregation with Secure Multiplicative Commitments", Cryptology ePrint Archive, Report 2021/1370, 2021.


T. Giannopoulos* and D. Mouris*, "Privacy Preserving Medical Data Analytics using Secure Multi Party Computation. An End-To-End Use Case.", M.Sc. thesis, University of Athens, 2018, (Pergamos Digital Library),
* The authors had equal contribution and are listed in alphabetical order.


D. Mouris and N. G. Tsoutsos, "NFTs For 3D Models: Sustaining Ownership In Industry 4.0", IEEE Consumer Electronics Magazine, 2022, (IEEEXplore)

./Open-Source Projects

liboqs-java: Java wrapper for liboqs. liboqs is an open source C library for quantum-resistant cryptographic algorithms. See more about liboqs at openquantumsafe.org.

CSAW 2021 Embedded Security Challenge (ESC). ESC is an educational, research-oriented tournament aimed at hacking into the hardware of embedded systems. ESC'2021 focused on side channel attacks (SCAs) and fault injection attacks (FIAs), which can be employed to exfiltrate private information from hardware.

CSAW 2020 Embedded Security Challenge (ESC). ESC'2020 focused on the security of Internet of Things (IoT) where contestants were tasked to hack the firmware of a wifi access point running on a RISC-V IoT platform.

Zilch. A Framework for Deploying Transparent Zero Knowledge Proofs

ZeroJava to zMIPS compiler. A compiler to translate ZeroJava code to zMIPS assembly and create zero-knowledge proofs using the Zilch framework.

SMPC Analytics. Source code for "Privacy Preserving Medical Data Analytics using Secure Multi Party Computation. An End-To-End Use Case" A. Giannopoulos, D. Mouris M.Sc. thesis for the National and Kapodistrian University of Athens. See more about liboqs at mhmd.madgik.di.uoa.gr.

TERMinator Suite. Data-oblivious benchmarks for encrypted data computation.

QR-secret-sharing. Create QR codes to secret share a message using Shamir's secret sharing algorithm. Ideal for cryptocurrency wallet recovery keys, passwords, etc. Protect your message by sharing it to secrets. Print the created QR codes and store them separately somewhere safe.

FFS: Fourier Fingerprint Search. Advanced search of 3D CAD files in the Fourier domain.

Auction Website. An e-commerce marketplace template. An online auction and shopping website for buying and selling a wide variety of goods and services worldwide.

Parallel Convolution. An image-filtering project optimized with parallel programming techniques (MPI, MPI & OpenMP, and CUDA).


You can reach me via e-mail: jimouris at gmail dot com.

Need some privacy?

PGP Key ID: 51131AD7
PGP Key Fingerprint: 2EEC 8214 2AEC 04E4 5C08 2A24 CCA9 8AEF 5113 1AD7