Follow
Jeroen Delvaux
Jeroen Delvaux
Unknown affiliation
Verified email at tii.ae
Title
Cited by
Cited by
Year
Helper data algorithms for PUF-based key generation: Overview and analysis
J Delvaux, D Gu, D Schellekens, I Verbauwhede
IEEE Transactions on Computer-Aided Design of Integrated Circuits and …, 2014
3022014
Side channel modeling attacks on 65nm arbiter PUFs exploiting CMOS device noise
J Delvaux, I Verbauwhede
2013 IEEE International Symposium on Hardware-Oriented Security and Trust …, 2013
2252013
A lockdown technique to prevent machine learning on PUFs for lightweight authentication
MD Yu, M Hiller, J Delvaux, R Sowell, S Devadas, I Verbauwhede
IEEE Transactions on Multi-Scale Computing Systems 2 (3), 146-159, 2016
2122016
A survey on lightweight entity authentication with strong PUFs
J Delvaux, R Peeters, D Gu, I Verbauwhede
ACM Computing Surveys (CSUR) 48 (2), 1-42, 2015
2092015
Machine-Learning Attacks on PolyPUFs, OB-PUFs, RPUFs, LHS-PUFs, and PUF–FSMs
J Delvaux
IEEE Transactions on Information Forensics and Security 14 (8), 2043-2058, 2019
1762019
Fault injection modeling attacks on 65 nm arbiter and RO sum PUFs via environmental changes
J Delvaux, I Verbauwhede
IEEE Transactions on Circuits and Systems I: Regular Papers 61 (6), 1701-1713, 2014
1452014
Efficient fuzzy extraction of PUF-induced secrets: Theory and applications
J Delvaux, D Gu, I Verbauwhede, M Hiller, MD Yu
International Conference on Cryptographic Hardware and Embedded Systems, 412-431, 2016
1002016
Secure lightweight entity authentication with strong PUFs: Mission impossible?
J Delvaux, D Gu, D Schellekens, I Verbauwhede
Cryptographic Hardware and Embedded Systems–CHES 2014: 16th International …, 2014
812014
Key-recovery attacks on various RO PUF constructions via helper data manipulation
J Delvaux, I Verbauwhede
2014 Design, Automation & Test in Europe Conference & Exhibition (DATE), 1-6, 2014
732014
Attacking PUF-based pattern matching key generators via helper data manipulation
J Delvaux, I Verbauwhede
Topics in Cryptology–CT-RSA 2014: The Cryptographer’s Track at the RSA …, 2014
722014
Security Analysis of PUF-Based Key Generation and Entity Authentication
J Delvaux
KU Leuven and Shanghai Jiao Tong University, 2017
662017
IoT: Source of test challenges
EJ Marinissen, Y Zorian, M Konijnenburg, CT Huang, PH Hsieh, ...
2016 21th IEEE European test symposium (ETS), 1-10, 2016
392016
A speed area optimized embedded co-processor for McEliece cryptosystem
S Ghosh, J Delvaux, L Uhsadel, I Verbauwhede
2012 IEEE 23rd International Conference on Application-Specific Systems …, 2012
362012
Upper bounds on the min-entropy of RO sum, arbiter, feed-forward arbiter, and S-ArbRO PUFs
J Delvaux, D Gu, I Verbauwhede
2016 IEEE Asian Hardware-Oriented Security and Trust (AsianHOST), 1-6, 2016
182016
Roulette: A diverse family of feasible fault attacks on masked kyber
J Delvaux
Cryptology ePrint Archive, 2021
15*2021
Refutation and Redesign of a Physical Model of TERO-based TRNGs and PUFs
J Delvaux
Cryptology ePrint Archive, 2019
82019
A privacy-preserving device tracking system using a low-power wide-area network
T Ashur, J Delvaux, S Lee, P Maene, E Marin, S Nikova, O Reparaz, ...
Cryptology and Network Security: 16th International Conference, CANS 2017 …, 2018
62018
Threshold implementations are not provably secure against fault sensitivity analysis
J Delvaux
Cryptology ePrint Archive, 2020
32020
A privacy-preserving device tracking system using a Low-Power Wide-Area Network (LPWAN)
T Ashur, J Delvaux, S Lee, P Maene, E Marin, S Nikova, O Reparaz, ...
22017
Machine Learning Attacks on PolyPUF, OBPUF, RPUF, and PUF–FSM
J Delvaux
1
The system can't perform the operation now. Try again later.
Articles 1–20