Theo dõi
Jeroen Delvaux
Jeroen Delvaux
Mục liên kết không xác định
Email được xác minh tại tii.ae
Tiêu đề
Trích dẫn bởi
Trích dẫn bởi
Năm
Helper data algorithms for PUF-based key generation: Overview and analysis
J Delvaux, D Gu, D Schellekens, I Verbauwhede
IEEE Transactions on Computer-Aided Design of Integrated Circuits and …, 2014
3312014
Side channel modeling attacks on 65nm arbiter PUFs exploiting CMOS device noise
J Delvaux, I Verbauwhede
2013 IEEE International Symposium on Hardware-Oriented Security and Trust …, 2013
2352013
A survey on lightweight entity authentication with strong PUFs
J Delvaux, R Peeters, D Gu, I Verbauwhede
ACM Computing Surveys (CSUR) 48 (2), 1-42, 2015
2332015
A lockdown technique to prevent machine learning on PUFs for lightweight authentication
MD Yu, M Hiller, J Delvaux, R Sowell, S Devadas, I Verbauwhede
IEEE Transactions on Multi-Scale Computing Systems 2 (3), 146-159, 2016
2302016
Machine-Learning Attacks on PolyPUFs, OB-PUFs, RPUFs, LHS-PUFs, and PUF–FSMs
J Delvaux
IEEE Transactions on Information Forensics and Security 14 (8), 2043-2058, 2019
2032019
Fault injection modeling attacks on 65 nm arbiter and RO sum PUFs via environmental changes
J Delvaux, I Verbauwhede
IEEE Transactions on Circuits and Systems I: Regular Papers 61 (6), 1701-1713, 2014
1492014
Efficient fuzzy extraction of PUF-induced secrets: Theory and applications
J Delvaux, D Gu, I Verbauwhede, M Hiller, MD Yu
International Conference on Cryptographic Hardware and Embedded Systems, 412-431, 2016
1082016
Secure lightweight entity authentication with strong PUFs: Mission impossible?
J Delvaux, D Gu, D Schellekens, I Verbauwhede
Cryptographic Hardware and Embedded Systems–CHES 2014: 16th International …, 2014
852014
Attacking PUF-based pattern matching key generators via helper data manipulation
J Delvaux, I Verbauwhede
Topics in Cryptology–CT-RSA 2014: The Cryptographer’s Track at the RSA …, 2014
772014
Security Analysis of PUF-Based Key Generation and Entity Authentication
J Delvaux
KU Leuven and Shanghai Jiao Tong University, 2017
762017
Key-recovery attacks on various RO PUF constructions via helper data manipulation
J Delvaux, I Verbauwhede
2014 Design, Automation & Test in Europe Conference & Exhibition (DATE), 1-6, 2014
762014
IoT: Source of test challenges
EJ Marinissen, Y Zorian, M Konijnenburg, CT Huang, PH Hsieh, ...
2016 21th IEEE European test symposium (ETS), 1-10, 2016
422016
A speed area optimized embedded co-processor for McEliece cryptosystem
S Ghosh, J Delvaux, L Uhsadel, I Verbauwhede
2012 IEEE 23rd international conference on application-specific systems …, 2012
412012
Roulette: A diverse family of feasible fault attacks on masked kyber
J Delvaux
Cryptology ePrint Archive, 2021
22*2021
Upper bounds on the min-entropy of RO sum, arbiter, feed-forward arbiter, and S-ArbRO PUFs
J Delvaux, D Gu, I Verbauwhede
2016 IEEE Asian Hardware-Oriented Security and Trust (AsianHOST), 1-6, 2016
182016
A privacy-preserving device tracking system using a low-power wide-area network
T Ashur, J Delvaux, S Lee, P Maene, E Marin, S Nikova, O Reparaz, ...
Cryptology and Network Security: 16th International Conference, CANS 2017 …, 2018
92018
Refutation and Redesign of a Physical Model of TERO-based TRNGs and PUFs
J Delvaux
Cryptology ePrint Archive, 2019
72019
Threshold implementations are not provably secure against fault sensitivity analysis
J Delvaux
Cryptology ePrint Archive, 2020
32020
How to lose some weight: a practical template syndrome decoding attack
S Bitzer, J Delvaux, E Kirshanova, S Maaßen, A May, A Wachter-Zeh
Designs, Codes and Cryptography, 1-17, 2025
22025
Machine Learning Attacks on PolyPUF, OBPUF, RPUF, and PUF–FSM
J Delvaux
IEEE Transactions on Information Forensics and Security 13 (10), 2574-2589, 2018
22018
Hệ thống không thể thực hiện thao tác ngay bây giờ. Hãy thử lại sau.
Bài viết 1–20