The SCEAS System
Navigation Menu

Search the dblp DataBase


Pim Tuyls: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Boris Skoric, Pim Tuyls, W. Ophey
    Robust Key Extraction from Physical Uncloneable Functions. [Citation Graph (0, 0)][DBLP]
    ACNS, 2005, pp:407-422 [Conf]
  2. Berry Schoenmakers, Pim Tuyls
    Practical Two-Party Computation Based on the Conditional Gate. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2004, pp:119-136 [Conf]
  3. Jean-Paul M. G. Linnartz, Pim Tuyls
    New Shielding Functions to Enhance Privacy and Prevent Misuse of Biometric Templates. [Citation Graph (0, 0)][DBLP]
    AVBPA, 2003, pp:393-402 [Conf]
  4. Pim Tuyls, Anton H. M. Akkermans, Tom A. M. Kevenaar, Geert Jan Schrijen, Asker M. Bazen, Raymond N. J. Veldhuis
    Practical Biometric Authentication with Template Protection. [Citation Graph (0, 0)][DBLP]
    AVBPA, 2005, pp:436-446 [Conf]
  5. Pim Tuyls, Geert Jan Schrijen, Boris Skoric, Jan van Geloven, Nynke Verhaegh, Rob Wolters
    Read-Proof Hardware from Protective Coatings. [Citation Graph (0, 0)][DBLP]
    CHES, 2006, pp:369-383 [Conf]
  6. Pim Tuyls, Lejla Batina
    RFID-Tags for Anti-counterfeiting. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2006, pp:115-131 [Conf]
  7. Pim Tuyls, Jasper Goseling
    Capacity and Examples of Template-Protecting Biometric Authentication Systems. [Citation Graph (0, 0)][DBLP]
    ECCV Workshop BioAW, 2004, pp:158-170 [Conf]
  8. Pim Tuyls
    Grey-Box Cryptography: Physical Unclonable Functions. [Citation Graph (0, 0)][DBLP]
    ESAS, 2006, pp:3-5 [Conf]
  9. Berry Schoenmakers, Pim Tuyls
    Efficient Binary Conversion for Paillier Encrypted Values. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2006, pp:522-537 [Conf]
  10. Wim F. J. Verhaegh, Aukje E. M. van Duijnhoven, Pim Tuyls, Jan H. M. Korst
    Privacy Protection in Memory-Based Collaborative Filtering. [Citation Graph (0, 0)][DBLP]
    EUSAI, 2004, pp:61-71 [Conf]
  11. Klaus Kursawe, Gregory Neven, Pim Tuyls
    Private Policy Negotiation. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2006, pp:81-95 [Conf]
  12. Pim Tuyls, Boris Skoric, S. Stallinga, Anton H. M. Akkermans, W. Ophey
    Information-Theoretic Security Analysis of Physical Uncloneable Functions. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2005, pp:141-155 [Conf]
  13. Pim Tuyls, Tom A. M. Kevenaar, Geert Jan Schrijen, Toine Staring, Marten van Dijk
    Visual Crypto Displays Enabling Secure Communications. [Citation Graph (0, 0)][DBLP]
    SPC, 2003, pp:271-284 [Conf]
  14. Pim Tuyls, Henk D. L. Hollmann, Jack H. van Lint, Ludo M. G. M. Tolhuizen
    XOR-based Visual Cryptography Schemes. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2005, v:37, n:1, pp:169-186 [Journal]
  15. Marten van Dijk, Tom A. M. Kevenaar, Geert Jan Schrijen, Pim Tuyls
    Improved constructions of secret sharing schemes by applying (lambda, omega)-decompositions. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 2006, v:99, n:4, pp:154-157 [Journal]
  16. Jorge Guajardo, Sandeep S. Kumar, Geert Jan Schrijen, Pim Tuyls
    FPGA Intrinsic PUFs and Their Use for IP Protection. [Citation Graph (0, 0)][DBLP]
    CHES, 2007, pp:63-80 [Conf]
  17. Neil Bird, Claudine Conrado, Jorge Guajardo, Stefan Maubach, Geert Jan Schrijen, Boris Skoric, Anton M. H. Tombeur, Peter Thueringer, Pim Tuyls
    ALGSICS - Combining Physics and Cryptography to Enhance Security and Privacy in RFID Systems. [Citation Graph (0, 0)][DBLP]
    ESAS, 2007, pp:187-202 [Conf]

  18. Memory Leakage-Resilient Encryption Based on Physically Unclonable Functions. [Citation Graph (, )][DBLP]

  19. Mutual Information Analysis. [Citation Graph (, )][DBLP]

  20. Efficient Helper Data Key Extractor on FPGAs. [Citation Graph (, )][DBLP]

  21. Low-Overhead Implementation of a Soft Decision Helper Data Algorithm for SRAM PUFs. [Citation Graph (, )][DBLP]

  22. Physical Unclonable Functions, FPGAs and Public-Key Crypto for IP Protection. [Citation Graph (, )][DBLP]

  23. Brand and IP protection with physical unclonable functions. [Citation Graph (, )][DBLP]

  24. Public-Key Cryptography for RFID-Tags. [Citation Graph (, )][DBLP]

  25. Privacy Weaknesses in Biometric Sketches. [Citation Graph (, )][DBLP]

  26. Physical Unclonable Functions and Their Applications to Vehicle System Security. [Citation Graph (, )][DBLP]

  27. Embedded Trusted Computing with Authenticated Non-volatile Memory. [Citation Graph (, )][DBLP]

  28. The Butterfly PUF: Protecting IP on every FPGA. [Citation Graph (, )][DBLP]

  29. Analysis and Design of Active IC Metering Schemes. [Citation Graph (, )][DBLP]

  30. Reconfigurable Physical Unclonable Functions -- Enabling Technology for Tamper-Resistant Storage. [Citation Graph (, )][DBLP]

  31. Physical Unclonable Functions for enhanced security of tokens and tags. [Citation Graph (, )][DBLP]

  32. Robust and Secure Biometrics: Some Application Examples. [Citation Graph (, )][DBLP]

Search in 0.003secs, Finished in 0.004secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002