B Skoric
B Skoric
Verified email at tue.nl
Cited by
Cited by
Read-proof hardware from protective coatings
P Tuyls, GJ Schrijen, B Škorić, J van Geloven, N Verhaegh, R Wolters
Cryptographic Hardware and Embedded Systems-CHES 2006, 369-383, 2006
Security with noisy data: on private biometrics, secure key storage and anti-counterfeiting
P Tuyls, B Škoriš, T Kevenaar
Springer, 2007
Measuring intrusion detection capability: An information-theoretic approach
G Gu, P Fogla, D Dagon, W Lee, B Skorić
Proceedings of the 2006 ACM Symposium on Information, computer andá…, 2006
Robust key extraction from physical uncloneable functions
B Škorić, P Tuyls, W Ophey
International Conference on Applied Cryptography and Network Security, 407-422, 2005
Reconfigurable physical unclonable functions-enabling technology for tamper-resistant storage
K Kursawe, AR Sadeghi, D Schellekens, B Škorić, P Tuyls
Hardware-Oriented Security and Trust, 2009. HOST'09. IEEE Internationalá…, 2009
Symmetric Tardos fingerprinting codes for arbitrary alphabet sizes
B Škorić, S Katzenbeisser, MU Celik
Designs, Codes and Cryptography 46 (2), 137-166, 2008
Quantum-secure authentication of a physical unclonable key
SA Goorden, M Horstmann, AP Mosk, B Škorić, PWH Pinkse
Optica 1 (6), 421-424, 2014
Information-theoretic security analysis of physical uncloneable functions
P Tuyls, B Škorić, S Stallinga, AHM Akkermans, W Ophey
International Conference on Financial Cryptography and Data Security, 141-155, 2005
Strong authentication with physical unclonable functions
P Tuyls, B Škorić
Security, Privacy, and Trust in Modern Data Management, 133-148, 2007
Tardos fingerprinting is better than we thought
B Skoric, TU Vladimirova, M Celik, JC Talstra
IEEE Transactions on Information Theory 54 (8), 3663-3676, 2008
(Mis-) handling gauge invariance in the theory of the quantum Hall effect. III. The instanton vacuum and chiral-edge physics
AMM Pruisken, B Škorić, MA Baranov
Physical Review B 60 (24), 16838, 1999
Estimating the secrecy-rate of physical unclonable functions with the context-tree weighting method
T Ignatenko, GJ Schrijen, B Skoric, P Tuyls, F Willems
2006 IEEE International Symposium on Information Theory, 499-503, 2006
Anti-counterfeiting, key distribution, and key storage in an ambient world via physical unclonable functions
J Guajardo, B Škorić, P Tuyls, SS Kumar, T Bel, AHM Blom, GJ Schrijen
Information Systems Frontiers 11 (1), 19-41, 2009
Information-theoretic analysis of capacitive physical unclonable functions
B Skoric, S Maubach, T Kevenaar, P Tuyls
Journal of Applied physics 100 (2), 024902-024902-11, 2006
Method and apparatus for detection of a speckle based physically unclonable function
S Stallinga, B Skoric, PT Tuyls, WG Ophey, AHM Akkermans
US Patent 7,432,485, 2008
Secret key generation from classical physics: Physical uncloneable functions
P Tuyls, B Škorić
AmIware Hardware Technology Drivers of Ambient Intelligence, 421-447, 2006
Towards an information-theoretic framework for analyzing intrusion detection systems
G Gu, P Fogla, D Dagon, W Lee, B Skoric
European Symposium on Research in Computer Security, 527-546, 2006
Key extraction from general nondiscrete signals
EA Verbitskiy, P Tuyls, C Obi, B Schoenmakers, B Skoric
Information Forensics and Security, IEEE Transactions on 5 (2), 269-279, 2010
(Mis-)handling gauge invariance in the theory of the quantum Hall effect. 1. Unifying action and the nu = 1/2 state
AMM Pruisken, MA Baranov, B Skoric
arXiv preprint cond-mat/9712322, 0
Design and implementation of a terrorist fraud resilient distance bounding system
A Ranganathan, NO Tippenhauer, B Škorić, D SingelÚe, S Čapkun
European Symposium on Research in Computer Security, 415-432, 2012
The system can't perform the operation now. Try again later.
Articles 1–20