|
Search the dblp DataBase
Pim Tuyls:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Boris Skoric, Pim Tuyls, W. Ophey
Robust Key Extraction from Physical Uncloneable Functions. [Citation Graph (0, 0)][DBLP] ACNS, 2005, pp:407-422 [Conf]
- Berry Schoenmakers, Pim Tuyls
Practical Two-Party Computation Based on the Conditional Gate. [Citation Graph (0, 0)][DBLP] ASIACRYPT, 2004, pp:119-136 [Conf]
- Jean-Paul M. G. Linnartz, Pim Tuyls
New Shielding Functions to Enhance Privacy and Prevent Misuse of Biometric Templates. [Citation Graph (0, 0)][DBLP] AVBPA, 2003, pp:393-402 [Conf]
- Pim Tuyls, Anton H. M. Akkermans, Tom A. M. Kevenaar, Geert Jan Schrijen, Asker M. Bazen, Raymond N. J. Veldhuis
Practical Biometric Authentication with Template Protection. [Citation Graph (0, 0)][DBLP] AVBPA, 2005, pp:436-446 [Conf]
- Pim Tuyls, Geert Jan Schrijen, Boris Skoric, Jan van Geloven, Nynke Verhaegh, Rob Wolters
Read-Proof Hardware from Protective Coatings. [Citation Graph (0, 0)][DBLP] CHES, 2006, pp:369-383 [Conf]
- Pim Tuyls, Lejla Batina
RFID-Tags for Anti-counterfeiting. [Citation Graph (0, 0)][DBLP] CT-RSA, 2006, pp:115-131 [Conf]
- Pim Tuyls, Jasper Goseling
Capacity and Examples of Template-Protecting Biometric Authentication Systems. [Citation Graph (0, 0)][DBLP] ECCV Workshop BioAW, 2004, pp:158-170 [Conf]
- Pim Tuyls
Grey-Box Cryptography: Physical Unclonable Functions. [Citation Graph (0, 0)][DBLP] ESAS, 2006, pp:3-5 [Conf]
- Berry Schoenmakers, Pim Tuyls
Efficient Binary Conversion for Paillier Encrypted Values. [Citation Graph (0, 0)][DBLP] EUROCRYPT, 2006, pp:522-537 [Conf]
- Wim F. J. Verhaegh, Aukje E. M. van Duijnhoven, Pim Tuyls, Jan H. M. Korst
Privacy Protection in Memory-Based Collaborative Filtering. [Citation Graph (0, 0)][DBLP] EUSAI, 2004, pp:61-71 [Conf]
- Klaus Kursawe, Gregory Neven, Pim Tuyls
Private Policy Negotiation. [Citation Graph (0, 0)][DBLP] Financial Cryptography, 2006, pp:81-95 [Conf]
- Pim Tuyls, Boris Skoric, S. Stallinga, Anton H. M. Akkermans, W. Ophey
Information-Theoretic Security Analysis of Physical Uncloneable Functions. [Citation Graph (0, 0)][DBLP] Financial Cryptography, 2005, pp:141-155 [Conf]
- Pim Tuyls, Tom A. M. Kevenaar, Geert Jan Schrijen, Toine Staring, Marten van Dijk
Visual Crypto Displays Enabling Secure Communications. [Citation Graph (0, 0)][DBLP] SPC, 2003, pp:271-284 [Conf]
- Pim Tuyls, Henk D. L. Hollmann, Jack H. van Lint, Ludo M. G. M. Tolhuizen
XOR-based Visual Cryptography Schemes. [Citation Graph (0, 0)][DBLP] Des. Codes Cryptography, 2005, v:37, n:1, pp:169-186 [Journal]
- Marten van Dijk, Tom A. M. Kevenaar, Geert Jan Schrijen, Pim Tuyls
Improved constructions of secret sharing schemes by applying (lambda, omega)-decompositions. [Citation Graph (0, 0)][DBLP] Inf. Process. Lett., 2006, v:99, n:4, pp:154-157 [Journal]
- Jorge Guajardo, Sandeep S. Kumar, Geert Jan Schrijen, Pim Tuyls
FPGA Intrinsic PUFs and Their Use for IP Protection. [Citation Graph (0, 0)][DBLP] CHES, 2007, pp:63-80 [Conf]
- Neil Bird, Claudine Conrado, Jorge Guajardo, Stefan Maubach, Geert Jan Schrijen, Boris Skoric, Anton M. H. Tombeur, Peter Thueringer, Pim Tuyls
ALGSICS - Combining Physics and Cryptography to Enhance Security and Privacy in RFID Systems. [Citation Graph (0, 0)][DBLP] ESAS, 2007, pp:187-202 [Conf]
Memory Leakage-Resilient Encryption Based on Physically Unclonable Functions. [Citation Graph (, )][DBLP]
Mutual Information Analysis. [Citation Graph (, )][DBLP]
Efficient Helper Data Key Extractor on FPGAs. [Citation Graph (, )][DBLP]
Low-Overhead Implementation of a Soft Decision Helper Data Algorithm for SRAM PUFs. [Citation Graph (, )][DBLP]
Physical Unclonable Functions, FPGAs and Public-Key Crypto for IP Protection. [Citation Graph (, )][DBLP]
Brand and IP protection with physical unclonable functions. [Citation Graph (, )][DBLP]
Public-Key Cryptography for RFID-Tags. [Citation Graph (, )][DBLP]
Privacy Weaknesses in Biometric Sketches. [Citation Graph (, )][DBLP]
Physical Unclonable Functions and Their Applications to Vehicle System Security. [Citation Graph (, )][DBLP]
Embedded Trusted Computing with Authenticated Non-volatile Memory. [Citation Graph (, )][DBLP]
The Butterfly PUF: Protecting IP on every FPGA. [Citation Graph (, )][DBLP]
Analysis and Design of Active IC Metering Schemes. [Citation Graph (, )][DBLP]
Reconfigurable Physical Unclonable Functions -- Enabling Technology for Tamper-Resistant Storage. [Citation Graph (, )][DBLP]
Physical Unclonable Functions for enhanced security of tokens and tags. [Citation Graph (, )][DBLP]
Robust and Secure Biometrics: Some Application Examples. [Citation Graph (, )][DBLP]
Search in 0.002secs, Finished in 0.303secs
|