Read-proof hardware from protective coatings P Tuyls, GJ Schrijen, B Škorić, J van Geloven, N Verhaegh, R Wolters Cryptographic Hardware and Embedded Systems-CHES 2006, 369-383, 2006 | 458 | 2006 |
Security with noisy data: on private biometrics, secure key storage and anti-counterfeiting P Tuyls, B Škoriç, T Kevenaar Springer, 2007 | 246 | 2007 |
Measuring intrusion detection capability: An information-theoretic approach G Gu, P Fogla, D Dagon, W Lee, B Skorić Proceedings of the 2006 ACM Symposium on Information, computer and …, 2006 | 212 | 2006 |
Robust key extraction from physical uncloneable functions B Škorić, P Tuyls, W Ophey International Conference on Applied Cryptography and Network Security, 407-422, 2005 | 178 | 2005 |
Reconfigurable physical unclonable functions-enabling technology for tamper-resistant storage K Kursawe, AR Sadeghi, D Schellekens, B Škorić, P Tuyls Hardware-Oriented Security and Trust, 2009. HOST'09. IEEE International …, 2009 | 160 | 2009 |
Symmetric Tardos fingerprinting codes for arbitrary alphabet sizes B Škorić, S Katzenbeisser, MU Celik Designs, Codes and Cryptography 46 (2), 137-166, 2008 | 150 | 2008 |
Quantum-secure authentication of a physical unclonable key SA Goorden, M Horstmann, AP Mosk, B Škorić, PWH Pinkse Optica 1 (6), 421-424, 2014 | 136 | 2014 |
Information-theoretic security analysis of physical uncloneable functions P Tuyls, B Škorić, S Stallinga, AHM Akkermans, W Ophey International Conference on Financial Cryptography and Data Security, 141-155, 2005 | 113 | 2005 |
Strong authentication with physical unclonable functions P Tuyls, B Škorić Security, Privacy, and Trust in Modern Data Management, 133-148, 2007 | 110 | 2007 |
(Mis-) handling gauge invariance in the theory of the quantum Hall effect. III. The instanton vacuum and chiral-edge physics AMM Pruisken, B Škorić, MA Baranov Physical Review B 60 (24), 16838, 1999 | 107* | 1999 |
Tardos fingerprinting is better than we thought B Skoric, TU Vladimirova, M Celik, JC Talstra IEEE Transactions on Information Theory 54 (8), 3663-3676, 2008 | 106 | 2008 |
Estimating the secrecy-rate of physical unclonable functions with the context-tree weighting method T Ignatenko, GJ Schrijen, B Skoric, P Tuyls, F Willems 2006 IEEE International Symposium on Information Theory, 499-503, 2006 | 83 | 2006 |
Anti-counterfeiting, key distribution, and key storage in an ambient world via physical unclonable functions J Guajardo, B Škorić, P Tuyls, SS Kumar, T Bel, AHM Blom, GJ Schrijen Information Systems Frontiers 11 (1), 19-41, 2009 | 82 | 2009 |
Method and apparatus for detection of a speckle based physically unclonable function S Stallinga, B Skoric, PT Tuyls, WG Ophey, AHM Akkermans US Patent 7,432,485, 2008 | 79 | 2008 |
Information-theoretic analysis of capacitive physical unclonable functions B Skoric, S Maubach, T Kevenaar, P Tuyls Journal of Applied physics 100 (2), 024902-024902-11, 2006 | 79* | 2006 |
Secret key generation from classical physics: Physical uncloneable functions P Tuyls, B Škorić AmIware Hardware Technology Drivers of Ambient Intelligence, 421-447, 2006 | 62 | 2006 |
Towards an information-theoretic framework for analyzing intrusion detection systems G Gu, P Fogla, D Dagon, W Lee, B Skoric European Symposium on Research in Computer Security, 527-546, 2006 | 55 | 2006 |
Key extraction from general nondiscrete signals EA Verbitskiy, P Tuyls, C Obi, B Schoenmakers, B Skoric Information Forensics and Security, IEEE Transactions on 5 (2), 269-279, 2010 | 50 | 2010 |
(Mis-)handling gauge invariance in the theory of the quantum Hall effect. 1. Unifying action and the nu = 1/2 state AMM Pruisken, MA Baranov, B Skoric arXiv preprint cond-mat/9712322, 0 | 46* | |
NOISY LOW-POWER PUF AUTHENTICATION WITHOUT DATABASE B Skoric, PT Tuyls, AMH Tombeur US Patent App. 12/296,682, 2007 | 44 | 2007 |