Seguir
Jeroen Delvaux
Jeroen Delvaux
Afiliación desconocida
Dirección de correo verificada de tii.ae
Título
Citado por
Citado por
Año
Helper data algorithms for PUF-based key generation: Overview and analysis
J Delvaux, D Gu, D Schellekens, I Verbauwhede
IEEE Transactions on Computer-Aided Design of Integrated Circuits and …, 2014
3242014
Side channel modeling attacks on 65nm arbiter PUFs exploiting CMOS device noise
J Delvaux, I Verbauwhede
2013 IEEE International Symposium on Hardware-Oriented Security and Trust …, 2013
2292013
A lockdown technique to prevent machine learning on PUFs for lightweight authentication
MD Yu, M Hiller, J Delvaux, R Sowell, S Devadas, I Verbauwhede
IEEE Transactions on Multi-Scale Computing Systems 2 (3), 146-159, 2016
2242016
A survey on lightweight entity authentication with strong PUFs
J Delvaux, R Peeters, D Gu, I Verbauwhede
ACM Computing Surveys (CSUR) 48 (2), 1-42, 2015
2202015
Machine-Learning Attacks on PolyPUFs, OB-PUFs, RPUFs, LHS-PUFs, and PUF–FSMs
J Delvaux
IEEE Transactions on Information Forensics and Security 14 (8), 2043-2058, 2019
1932019
Fault injection modeling attacks on 65 nm arbiter and RO sum PUFs via environmental changes
J Delvaux, I Verbauwhede
IEEE Transactions on Circuits and Systems I: Regular Papers 61 (6), 1701-1713, 2014
1472014
Efficient fuzzy extraction of PUF-induced secrets: Theory and applications
J Delvaux, D Gu, I Verbauwhede, M Hiller, MD Yu
International Conference on Cryptographic Hardware and Embedded Systems, 412-431, 2016
1062016
Secure lightweight entity authentication with strong PUFs: Mission impossible?
J Delvaux, D Gu, D Schellekens, I Verbauwhede
Cryptographic Hardware and Embedded Systems–CHES 2014: 16th International …, 2014
842014
Key-recovery attacks on various RO PUF constructions via helper data manipulation
J Delvaux, I Verbauwhede
2014 Design, Automation & Test in Europe Conference & Exhibition (DATE), 1-6, 2014
762014
Attacking PUF-based pattern matching key generators via helper data manipulation
J Delvaux, I Verbauwhede
Topics in Cryptology–CT-RSA 2014: The Cryptographer’s Track at the RSA …, 2014
752014
Security Analysis of PUF-Based Key Generation and Entity Authentication
J Delvaux
KU Leuven and Shanghai Jiao Tong University, 2017
722017
IoT: Source of test challenges
EJ Marinissen, Y Zorian, M Konijnenburg, CT Huang, PH Hsieh, ...
2016 21th IEEE European test symposium (ETS), 1-10, 2016
402016
A speed area optimized embedded co-processor for McEliece cryptosystem
S Ghosh, J Delvaux, L Uhsadel, I Verbauwhede
2012 IEEE 23rd International Conference on Application-Specific Systems …, 2012
382012
Roulette: A diverse family of feasible fault attacks on masked kyber
J Delvaux
Cryptology ePrint Archive, 2021
18*2021
Upper bounds on the min-entropy of RO sum, arbiter, feed-forward arbiter, and S-ArbRO PUFs
J Delvaux, D Gu, I Verbauwhede
2016 IEEE Asian Hardware-Oriented Security and Trust (AsianHOST), 1-6, 2016
182016
Refutation and Redesign of a Physical Model of TERO-based TRNGs and PUFs
J Delvaux
Cryptology ePrint Archive, 2019
82019
A privacy-preserving device tracking system using a low-power wide-area network
T Ashur, J Delvaux, S Lee, P Maene, E Marin, S Nikova, O Reparaz, ...
Cryptology and Network Security: 16th International Conference, CANS 2017 …, 2018
62018
Threshold implementations are not provably secure against fault sensitivity analysis
J Delvaux
Cryptology ePrint Archive, 2020
32020
A privacy-preserving device tracking system using a Low-Power Wide-Area Network (LPWAN)
T Ashur, J Delvaux, S Lee, P Maene, E Marin, S Nikova, O Reparaz, ...
22017
How to Lose Some Weight-A Practical Template Syndrome Decoding Attack
S Bitzer, J Delvaux, E Kirshanova, S Maaßen, A May, A Wachter-Zeh
Cryptology ePrint Archive, 2024
12024
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20