2008 |
25 | EE | Christoph Bösch,
Jorge Guajardo,
Ahmad-Reza Sadeghi,
Jamshid Shokrollahi,
Pim Tuyls:
Efficient Helper Data Key Extractor on FPGAs.
CHES 2008: 181-197 |
24 | EE | Benedikt Gierlichs,
Lejla Batina,
Pim Tuyls,
Bart Preneel:
Mutual Information Analysis.
CHES 2008: 426-442 |
23 | EE | Sandeep S. Kumar,
Jorge Guajardo,
R. Maes,
Geert Jan Schrijen,
Pim Tuyls:
The Butterfly PUF: Protecting IP on every FPGA.
HOST 2008: 67-70 |
22 | EE | Jorge Guajardo,
Sandeep S. Kumar,
Geert Jan Schrijen,
Pim Tuyls:
Brand and IP protection with physical unclonable functions.
ISCAS 2008: 3186-3189 |
21 | EE | Dries Schellekens,
Pim Tuyls,
Bart Preneel:
Embedded Trusted Computing with Authenticated Non-volatile Memory.
TRUST 2008: 60-74 |
20 | EE | Blaise Gassend,
Marten van Dijk,
Dwaine E. Clarke,
Emina Torlak,
Srinivas Devadas,
Pim Tuyls:
Controlled physical random functions and applications.
ACM Trans. Inf. Syst. Secur. 10(4): (2008) |
2007 |
19 | EE | Jorge Guajardo,
Sandeep S. Kumar,
Geert Jan Schrijen,
Pim Tuyls:
FPGA Intrinsic PUFs and Their Use for IP Protection.
CHES 2007: 63-80 |
18 | EE | Neil Bird,
Claudine Conrado,
Jorge Guajardo,
Stefan Maubach,
Geert Jan Schrijen,
Boris Skoric,
Anton M. H. Tombeur,
Peter Thueringer,
Pim Tuyls:
ALGSICS - Combining Physics and Cryptography to Enhance Security and Privacy in RFID Systems.
ESAS 2007: 187-202 |
17 | EE | Jorge Guajardo,
Sandeep Kumar,
Geert Jan Schrijen,
Pim Tuyls:
Physical Unclonable Functions, FPGAs and Public-Key Crypto for IP Protection.
FPL 2007: 189-195 |
16 | EE | Lejla Batina,
Jorge Guajardo,
Tim Kerins,
Nele Mentens,
Pim Tuyls,
Ingrid Verbauwhede:
Public-Key Cryptography for RFID-Tags.
PerCom Workshops 2007: 217-222 |
2006 |
15 | EE | Pim Tuyls,
Geert Jan Schrijen,
Boris Skoric,
Jan van Geloven,
Nynke Verhaegh,
Rob Wolters:
Read-Proof Hardware from Protective Coatings.
CHES 2006: 369-383 |
14 | EE | Pim Tuyls,
Lejla Batina:
RFID-Tags for Anti-counterfeiting.
CT-RSA 2006: 115-131 |
13 | EE | Pim Tuyls:
Grey-Box Cryptography: Physical Unclonable Functions.
ESAS 2006: 3-5 |
12 | EE | Berry Schoenmakers,
Pim Tuyls:
Efficient Binary Conversion for Paillier Encrypted Values.
EUROCRYPT 2006: 522-537 |
11 | EE | Klaus Kursawe,
Gregory Neven,
Pim Tuyls:
Private Policy Negotiation.
Financial Cryptography 2006: 81-95 |
10 | EE | Marten van Dijk,
Tom A. M. Kevenaar,
Geert Jan Schrijen,
Pim Tuyls:
Improved constructions of secret sharing schemes by applying (lambda, omega)-decompositions.
Inf. Process. Lett. 99(4): 154-157 (2006) |
2005 |
9 | EE | Boris Skoric,
Pim Tuyls,
W. Ophey:
Robust Key Extraction from Physical Uncloneable Functions.
ACNS 2005: 407-422 |
8 | EE | Pim Tuyls,
Anton H. M. Akkermans,
Tom A. M. Kevenaar,
Geert Jan Schrijen,
Asker M. Bazen,
Raymond N. J. Veldhuis:
Practical Biometric Authentication with Template Protection.
AVBPA 2005: 436-446 |
7 | EE | Pim Tuyls,
Boris Skoric,
S. Stallinga,
Anton H. M. Akkermans,
W. Ophey:
Information-Theoretic Security Analysis of Physical Uncloneable Functions.
Financial Cryptography 2005: 141-155 |
6 | EE | Pim Tuyls,
Henk D. L. Hollmann,
Jack H. van Lint,
Ludo M. G. M. Tolhuizen:
XOR-based Visual Cryptography Schemes.
Des. Codes Cryptography 37(1): 169-186 (2005) |
2004 |
5 | EE | Berry Schoenmakers,
Pim Tuyls:
Practical Two-Party Computation Based on the Conditional Gate.
ASIACRYPT 2004: 119-136 |
4 | EE | Pim Tuyls,
Jasper Goseling:
Capacity and Examples of Template-Protecting Biometric Authentication Systems.
ECCV Workshop BioAW 2004: 158-170 |
3 | EE | Wim F. J. Verhaegh,
Aukje E. M. van Duijnhoven,
Pim Tuyls,
Jan H. M. Korst:
Privacy Protection in Memory-Based Collaborative Filtering.
EUSAI 2004: 61-71 |
2003 |
2 | EE | Jean-Paul M. G. Linnartz,
Pim Tuyls:
New Shielding Functions to Enhance Privacy and Prevent Misuse of Biometric Templates.
AVBPA 2003: 393-402 |
1 | EE | Pim Tuyls,
Tom A. M. Kevenaar,
Geert Jan Schrijen,
Toine Staring,
Marten van Dijk:
Visual Crypto Displays Enabling Secure Communications.
SPC 2003: 271-284 |