2008 | ||
---|---|---|
25 | EE | Christoph Bösch, Jorge Guajardo, Ahmad-Reza Sadeghi, Jamshid Shokrollahi, Pim Tuyls: Efficient Helper Data Key Extractor on FPGAs. CHES 2008: 181-197 |
24 | EE | Benedikt Gierlichs, Lejla Batina, Pim Tuyls, Bart Preneel: Mutual Information Analysis. CHES 2008: 426-442 |
23 | EE | Sandeep S. Kumar, Jorge Guajardo, R. Maes, Geert Jan Schrijen, Pim Tuyls: The Butterfly PUF: Protecting IP on every FPGA. HOST 2008: 67-70 |
22 | EE | Jorge Guajardo, Sandeep S. Kumar, Geert Jan Schrijen, Pim Tuyls: Brand and IP protection with physical unclonable functions. ISCAS 2008: 3186-3189 |
21 | EE | Dries Schellekens, Pim Tuyls, Bart Preneel: Embedded Trusted Computing with Authenticated Non-volatile Memory. TRUST 2008: 60-74 |
20 | EE | Blaise Gassend, Marten van Dijk, Dwaine E. Clarke, Emina Torlak, Srinivas Devadas, Pim Tuyls: Controlled physical random functions and applications. ACM Trans. Inf. Syst. Secur. 10(4): (2008) |
2007 | ||
19 | EE | Jorge Guajardo, Sandeep S. Kumar, Geert Jan Schrijen, Pim Tuyls: FPGA Intrinsic PUFs and Their Use for IP Protection. CHES 2007: 63-80 |
18 | EE | Neil Bird, Claudine Conrado, Jorge Guajardo, Stefan Maubach, Geert Jan Schrijen, Boris Skoric, Anton M. H. Tombeur, Peter Thueringer, Pim Tuyls: ALGSICS - Combining Physics and Cryptography to Enhance Security and Privacy in RFID Systems. ESAS 2007: 187-202 |
17 | EE | Jorge Guajardo, Sandeep Kumar, Geert Jan Schrijen, Pim Tuyls: Physical Unclonable Functions, FPGAs and Public-Key Crypto for IP Protection. FPL 2007: 189-195 |
16 | EE | Lejla Batina, Jorge Guajardo, Tim Kerins, Nele Mentens, Pim Tuyls, Ingrid Verbauwhede: Public-Key Cryptography for RFID-Tags. PerCom Workshops 2007: 217-222 |
2006 | ||
15 | EE | Pim Tuyls, Geert Jan Schrijen, Boris Skoric, Jan van Geloven, Nynke Verhaegh, Rob Wolters: Read-Proof Hardware from Protective Coatings. CHES 2006: 369-383 |
14 | EE | Pim Tuyls, Lejla Batina: RFID-Tags for Anti-counterfeiting. CT-RSA 2006: 115-131 |
13 | EE | Pim Tuyls: Grey-Box Cryptography: Physical Unclonable Functions. ESAS 2006: 3-5 |
12 | EE | Berry Schoenmakers, Pim Tuyls: Efficient Binary Conversion for Paillier Encrypted Values. EUROCRYPT 2006: 522-537 |
11 | EE | Klaus Kursawe, Gregory Neven, Pim Tuyls: Private Policy Negotiation. Financial Cryptography 2006: 81-95 |
10 | EE | Marten van Dijk, Tom A. M. Kevenaar, Geert Jan Schrijen, Pim Tuyls: Improved constructions of secret sharing schemes by applying (lambda, omega)-decompositions. Inf. Process. Lett. 99(4): 154-157 (2006) |
2005 | ||
9 | EE | Boris Skoric, Pim Tuyls, W. Ophey: Robust Key Extraction from Physical Uncloneable Functions. ACNS 2005: 407-422 |
8 | EE | Pim Tuyls, Anton H. M. Akkermans, Tom A. M. Kevenaar, Geert Jan Schrijen, Asker M. Bazen, Raymond N. J. Veldhuis: Practical Biometric Authentication with Template Protection. AVBPA 2005: 436-446 |
7 | EE | Pim Tuyls, Boris Skoric, S. Stallinga, Anton H. M. Akkermans, W. Ophey: Information-Theoretic Security Analysis of Physical Uncloneable Functions. Financial Cryptography 2005: 141-155 |
6 | EE | Pim Tuyls, Henk D. L. Hollmann, Jack H. van Lint, Ludo M. G. M. Tolhuizen: XOR-based Visual Cryptography Schemes. Des. Codes Cryptography 37(1): 169-186 (2005) |
2004 | ||
5 | EE | Berry Schoenmakers, Pim Tuyls: Practical Two-Party Computation Based on the Conditional Gate. ASIACRYPT 2004: 119-136 |
4 | EE | Pim Tuyls, Jasper Goseling: Capacity and Examples of Template-Protecting Biometric Authentication Systems. ECCV Workshop BioAW 2004: 158-170 |
3 | EE | Wim F. J. Verhaegh, Aukje E. M. van Duijnhoven, Pim Tuyls, Jan H. M. Korst: Privacy Protection in Memory-Based Collaborative Filtering. EUSAI 2004: 61-71 |
2003 | ||
2 | EE | Jean-Paul M. G. Linnartz, Pim Tuyls: New Shielding Functions to Enhance Privacy and Prevent Misuse of Biometric Templates. AVBPA 2003: 393-402 |
1 | EE | Pim Tuyls, Tom A. M. Kevenaar, Geert Jan Schrijen, Toine Staring, Marten van Dijk: Visual Crypto Displays Enabling Secure Communications. SPC 2003: 271-284 |