Read-proof hardware from protective coatings P Tuyls, GJ Schrijen, B Škorić, J van Geloven, N Verhaegh, R Wolters Cryptographic Hardware and Embedded Systems-CHES 2006, 369-383, 2006 | 581 | 2006 |
Security with noisy data: on private biometrics, secure key storage and anti-counterfeiting P Tuyls, B Škoriç, T Kevenaar Springer, 2007 | 302 | 2007 |
Measuring intrusion detection capability: An information-theoretic approach G Gu, P Fogla, D Dagon, W Lee, B Skorić Proceedings of the 2006 ACM Symposium on Information, computer and …, 2006 | 257 | 2006 |
Quantum-secure authentication of a physical unclonable key SA Goorden, M Horstmann, AP Mosk, B Škorić, PWH Pinkse Optica 1 (6), 421-424, 2014 | 229 | 2014 |
Reconfigurable physical unclonable functions-enabling technology for tamper-resistant storage K Kursawe, AR Sadeghi, D Schellekens, B Škorić, P Tuyls Hardware-Oriented Security and Trust, 2009. HOST'09. IEEE International …, 2009 | 221 | 2009 |
Robust key extraction from physical uncloneable functions B Škorić, P Tuyls, W Ophey International Conference on Applied Cryptography and Network Security, 407-422, 2005 | 219 | 2005 |
Symmetric Tardos fingerprinting codes for arbitrary alphabet sizes B Škorić, S Katzenbeisser, MU Celik Designs, Codes and Cryptography 46 (2), 137-166, 2008 | 167 | 2008 |
Information-theoretic security analysis of physical uncloneable functions P Tuyls, B Škorić, S Stallinga, AHM Akkermans, W Ophey International Conference on Financial Cryptography and Data Security, 141-155, 2005 | 135 | 2005 |
Strong authentication with physical unclonable functions P Tuyls, B Škorić Security, Privacy, and Trust in Modern Data Management, 133-148, 2007 | 130 | 2007 |
Tardos fingerprinting is better than we thought B Skoric, TU Vladimirova, M Celik, JC Talstra IEEE Transactions on Information Theory 54 (8), 3663-3676, 2008 | 114 | 2008 |
Anti-counterfeiting, key distribution, and key storage in an ambient world via physical unclonable functions J Guajardo, B Škorić, P Tuyls, SS Kumar, T Bel, AHM Blom, GJ Schrijen Information Systems Frontiers 11, 19-41, 2009 | 110 | 2009 |
(Mis-) handling gauge invariance in the theory of the quantum Hall effect. III. The instanton vacuum and chiral-edge physics AMM Pruisken, B Škorić, MA Baranov Physical Review B 60 (24), 16838, 1999 | 109* | 1999 |
Estimating the secrecy-rate of physical unclonable functions with the context-tree weighting method T Ignatenko, GJ Schrijen, B Skoric, P Tuyls, F Willems 2006 IEEE International Symposium on Information Theory, 499-503, 2006 | 98 | 2006 |
Information-theoretic analysis of capacitive physical unclonable functions B Skoric, S Maubach, T Kevenaar, P Tuyls Journal of Applied physics 100 (2), 024902-024902-11, 2006 | 98* | 2006 |
Estimating numerical distributions under local differential privacy Z Li, T Wang, M Lopuhaä-Zwakenberg, N Li, B Škoric Proceedings of the 2020 ACM SIGMOD International Conference on Management of …, 2020 | 92 | 2020 |
Method and apparatus for detection of a speckle based physically unclonable function S Stallinga, B Skoric, PT Tuyls, WG Ophey, AHM Akkermans US Patent 7,432,485, 2008 | 81 | 2008 |
Quantum readout of physical unclonable functions B Škorić Progress in Cryptology–AFRICACRYPT 2010, 369-386, 2010 | 79* | 2010 |
NOISY LOW-POWER PUF AUTHENTICATION WITHOUT DATABASE B Skoric, PT Tuyls, AMH Tombeur US Patent App. 12/296,682, 2007 | 79 | 2007 |
Secret key generation from classical physics: Physical uncloneable functions P Tuyls, B Škorić AmIware Hardware Technology Drivers of Ambient Intelligence, 421-447, 2006 | 69 | 2006 |
Locally differentially private frequency estimation with consistency T Wang, Z Li, N Li, M Lopuhaä-Zwakenberg, B Skoric NDSS, 2020 | 67 | 2020 |