Follow
B Skoric
B Skoric
Verified email at tue.nl
Title
Cited by
Cited by
Year
Read-proof hardware from protective coatings
P Tuyls, GJ Schrijen, B Škorić, J van Geloven, N Verhaegh, R Wolters
Cryptographic Hardware and Embedded Systems-CHES 2006, 369-383, 2006
5672006
Security with noisy data: on private biometrics, secure key storage and anti-counterfeiting
P Tuyls, B Škoriç, T Kevenaar
Springer, 2007
2942007
Measuring intrusion detection capability: An information-theoretic approach
G Gu, P Fogla, D Dagon, W Lee, B Skorić
Proceedings of the 2006 ACM Symposium on Information, computer and …, 2006
2552006
Quantum-secure authentication of a physical unclonable key
SA Goorden, M Horstmann, AP Mosk, B Škorić, PWH Pinkse
Optica 1 (6), 421-424, 2014
2232014
Reconfigurable physical unclonable functions-enabling technology for tamper-resistant storage
K Kursawe, AR Sadeghi, D Schellekens, B Škorić, P Tuyls
Hardware-Oriented Security and Trust, 2009. HOST'09. IEEE International …, 2009
2172009
Robust key extraction from physical uncloneable functions
B Škorić, P Tuyls, W Ophey
International Conference on Applied Cryptography and Network Security, 407-422, 2005
2152005
Symmetric Tardos fingerprinting codes for arbitrary alphabet sizes
B Škorić, S Katzenbeisser, MU Celik
Designs, Codes and Cryptography 46 (2), 137-166, 2008
1642008
Information-theoretic security analysis of physical uncloneable functions
P Tuyls, B Škorić, S Stallinga, AHM Akkermans, W Ophey
International Conference on Financial Cryptography and Data Security, 141-155, 2005
1312005
Strong authentication with physical unclonable functions
P Tuyls, B Škorić
Security, Privacy, and Trust in Modern Data Management, 133-148, 2007
1262007
Tardos fingerprinting is better than we thought
B Skoric, TU Vladimirova, M Celik, JC Talstra
IEEE Transactions on Information Theory 54 (8), 3663-3676, 2008
1132008
(Mis-) handling gauge invariance in the theory of the quantum Hall effect. III. The instanton vacuum and chiral-edge physics
AMM Pruisken, B Škorić, MA Baranov
Physical Review B 60 (24), 16838, 1999
109*1999
Anti-counterfeiting, key distribution, and key storage in an ambient world via physical unclonable functions
J Guajardo, B Škorić, P Tuyls, SS Kumar, T Bel, AHM Blom, GJ Schrijen
Information Systems Frontiers 11, 19-41, 2009
1012009
Estimating the secrecy-rate of physical unclonable functions with the context-tree weighting method
T Ignatenko, GJ Schrijen, B Skoric, P Tuyls, F Willems
2006 IEEE International Symposium on Information Theory, 499-503, 2006
942006
Information-theoretic analysis of capacitive physical unclonable functions
B Skoric, S Maubach, T Kevenaar, P Tuyls
Journal of Applied physics 100 (2), 024902-024902-11, 2006
93*2006
Method and apparatus for detection of a speckle based physically unclonable function
S Stallinga, B Skoric, PT Tuyls, WG Ophey, AHM Akkermans
US Patent 7,432,485, 2008
812008
Estimating numerical distributions under local differential privacy
Z Li, T Wang, M Lopuhaä-Zwakenberg, N Li, B Škoric
Proceedings of the 2020 ACM SIGMOD International Conference on Management of …, 2020
772020
NOISY LOW-POWER PUF AUTHENTICATION WITHOUT DATABASE
B Skoric, PT Tuyls, AMH Tombeur
US Patent App. 12/296,682, 2007
772007
Quantum readout of physical unclonable functions
B Škorić
Progress in Cryptology–AFRICACRYPT 2010, 369-386, 2010
702010
Secret key generation from classical physics: Physical uncloneable functions
P Tuyls, B Škorić
AmIware Hardware Technology Drivers of Ambient Intelligence, 421-447, 2006
692006
Towards an information-theoretic framework for analyzing intrusion detection systems
G Gu, P Fogla, D Dagon, W Lee, B Skoric
Computer Security–ESORICS 2006: 11th European Symposium on Research in …, 2006
632006
The system can't perform the operation now. Try again later.
Articles 1–20