Ikuti
Jeroen Delvaux
Jeroen Delvaux
Afiliasi tidak diketahui
Email yang diverifikasi di tii.ae
Judul
Dikutip oleh
Dikutip oleh
Tahun
Helper data algorithms for PUF-based key generation: Overview and analysis
J Delvaux, D Gu, D Schellekens, I Verbauwhede
IEEE Transactions on Computer-Aided Design of Integrated Circuits and …, 2014
3292014
Side channel modeling attacks on 65nm arbiter PUFs exploiting CMOS device noise
J Delvaux, I Verbauwhede
2013 IEEE International Symposium on Hardware-Oriented Security and Trust …, 2013
2342013
A survey on lightweight entity authentication with strong PUFs
J Delvaux, R Peeters, D Gu, I Verbauwhede
ACM Computing Surveys (CSUR) 48 (2), 1-42, 2015
2312015
A lockdown technique to prevent machine learning on PUFs for lightweight authentication
MD Yu, M Hiller, J Delvaux, R Sowell, S Devadas, I Verbauwhede
IEEE Transactions on Multi-Scale Computing Systems 2 (3), 146-159, 2016
2302016
Machine-Learning Attacks on PolyPUFs, OB-PUFs, RPUFs, LHS-PUFs, and PUF–FSMs
J Delvaux
IEEE Transactions on Information Forensics and Security 14 (8), 2043-2058, 2019
1992019
Fault injection modeling attacks on 65 nm arbiter and RO sum PUFs via environmental changes
J Delvaux, I Verbauwhede
IEEE Transactions on Circuits and Systems I: Regular Papers 61 (6), 1701-1713, 2014
1492014
Efficient fuzzy extraction of PUF-induced secrets: Theory and applications
J Delvaux, D Gu, I Verbauwhede, M Hiller, MD Yu
International Conference on Cryptographic Hardware and Embedded Systems, 412-431, 2016
1082016
Secure lightweight entity authentication with strong PUFs: Mission impossible?
J Delvaux, D Gu, D Schellekens, I Verbauwhede
Cryptographic Hardware and Embedded Systems–CHES 2014: 16th International …, 2014
852014
Attacking PUF-based pattern matching key generators via helper data manipulation
J Delvaux, I Verbauwhede
Topics in Cryptology–CT-RSA 2014: The Cryptographer’s Track at the RSA …, 2014
772014
Key-recovery attacks on various RO PUF constructions via helper data manipulation
J Delvaux, I Verbauwhede
2014 Design, Automation & Test in Europe Conference & Exhibition (DATE), 1-6, 2014
762014
Security Analysis of PUF-Based Key Generation and Entity Authentication
J Delvaux
KU Leuven and Shanghai Jiao Tong University, 2017
752017
IoT: Source of test challenges
EJ Marinissen, Y Zorian, M Konijnenburg, CT Huang, PH Hsieh, ...
2016 21th IEEE European test symposium (ETS), 1-10, 2016
402016
A speed area optimized embedded co-processor for McEliece cryptosystem
S Ghosh, J Delvaux, L Uhsadel, I Verbauwhede
2012 IEEE 23rd international conference on application-specific systems …, 2012
402012
Roulette: A diverse family of feasible fault attacks on masked kyber
J Delvaux
Cryptology ePrint Archive, 2021
22*2021
Upper bounds on the min-entropy of RO sum, arbiter, feed-forward arbiter, and S-ArbRO PUFs
J Delvaux, D Gu, I Verbauwhede
2016 IEEE Asian Hardware-Oriented Security and Trust (AsianHOST), 1-6, 2016
182016
A privacy-preserving device tracking system using a low-power wide-area network
T Ashur, J Delvaux, S Lee, P Maene, E Marin, S Nikova, O Reparaz, ...
Cryptology and Network Security: 16th International Conference, CANS 2017 …, 2018
92018
Refutation and Redesign of a Physical Model of TERO-based TRNGs and PUFs
J Delvaux
Cryptology ePrint Archive, 2019
72019
Threshold implementations are not provably secure against fault sensitivity analysis
J Delvaux
Cryptology ePrint Archive, 2020
32020
How to lose some weight-a practical template syndrome decoding attack
S Bitzer, J Delvaux, E Kirshanova, S Maaßen, A May, A Wachter-Zeh
Cryptology ePrint Archive, 2024
22024
Machine Learning Attacks on PolyPUF, OBPUF, RPUF, and PUF–FSM
J Delvaux
IEEE Transactions on Information Forensics and Security 13 (10), 2574-2589, 2018
22018
Sistem tidak dapat melakukan operasi ini. Coba lagi nanti.
Artikel 1–20