Jeroen Delvaux
Jeroen Delvaux
Unknown affiliation
Verified email at osr-tech.com
Title
Cited by
Cited by
Year
Helper data algorithms for PUF-based key generation: Overview and analysis
J Delvaux, D Gu, D Schellekens, I Verbauwhede
IEEE Transactions on Computer-Aided Design of Integrated Circuits and†…, 2014
1582014
Side channel modeling attacks on 65nm arbiter PUFs exploiting CMOS device noise
J Delvaux, I Verbauwhede
2013 IEEE International Symposium on Hardware-Oriented Security and Trust†…, 2013
1332013
A survey on lightweight entity authentication with strong PUFs
J Delvaux, R Peeters, D Gu, I Verbauwhede
ACM Computing Surveys (CSUR) 48 (2), 1-42, 2015
1062015
Fault injection modeling attacks on 65 nm arbiter and RO sum PUFs via environmental changes
J Delvaux, I Verbauwhede
IEEE Transactions on Circuits and Systems I: Regular Papers 61 (6), 1701-1713, 2014
1022014
A lockdown technique to prevent machine learning on PUFs for lightweight authentication
MD Yu, M Hiller, J Delvaux, R Sowell, S Devadas, I Verbauwhede
IEEE Transactions on Multi-Scale Computing Systems 2 (3), 146-159, 2016
882016
Efficient fuzzy extraction of PUF-induced secrets: Theory and applications
J Delvaux, D Gu, I Verbauwhede, M Hiller, MDM Yu
International Conference on Cryptographic Hardware and Embedded Systems, 412-431, 2016
612016
Secure lightweight entity authentication with strong PUFs: Mission impossible?
J Delvaux, D Gu, D Schellekens, I Verbauwhede
International Workshop on Cryptographic Hardware and Embedded Systems, 451-475, 2014
592014
Attacking PUF-based pattern matching key generators via helper data manipulation
J Delvaux, I Verbauwhede
Cryptographers’ Track at the RSA Conference, 106-131, 2014
502014
Key-recovery attacks on various RO PUF constructions via helper data manipulation
J Delvaux, I Verbauwhede
2014 Design, Automation & Test in Europe Conference & Exhibition (DATE), 1-6, 2014
492014
Security Analysis of PUF-Based Key Generation and Entity Authentication
J Delvaux
KU Leuven and Shanghai Jiao Tong University, 2017
382017
Machine-Learning Attacks on PolyPUFs, OB-PUFs, RPUFs, LHS-PUFs, and PUF–FSMs
J Delvaux
IEEE Transactions on Information Forensics and Security 14 (8), 2043-2058, 2019
37*2019
IoT: Source of test challenges
EJ Marinissen, Y Zorian, M Konijnenburg, CT Huang, PH Hsieh, ...
2016 21th IEEE European Test Symposium (ETS), 1-10, 2016
232016
A speed area optimized embedded co-processor for McEliece cryptosystem
S Ghosh, J Delvaux, L Uhsadel, I Verbauwhede
2012 IEEE 23rd International Conference on Application-Specific Systems†…, 2012
232012
Upper bounds on the min-entropy of RO Sum, arbiter, feed-forward arbiter, and S-ArbRO PUFs
J Delvaux, D Gu, I Verbauwhede
2016 IEEE Asian Hardware-Oriented Security and Trust (AsianHOST), 1-6, 2016
72016
Refutation and Redesign of a Physical Model of TERO-based TRNGs and PUFs.
J Delvaux
IACR Cryptol. ePrint Arch. 2019, 810, 2019
32019
A Privacy-Preserving Device Tracking System Using a Low-Power Wide-Area Network
T Ashur, J Delvaux, S Lee, P Maene, E Marin, S Nikova, O Reparaz, ...
International Conference on Cryptology and Network Security, 347-369, 2017
22017
Threshold Implementations Are Not Provably Secure Against Fault Sensitivity Analysis.
J Delvaux
IACR Cryptol. ePrint Arch. 2020, 400, 2020
12020
On The Deployment of Tweak-in-Plaintext Protection Against Differential Fault Analysis
J Delvaux
2020
基于 PUF 密钥生成和实体认证的安全性分析
J Delvaux
上海交通大学, 2017
2017
Een efficiŽnte hardware-implementatie van het McEliece publieke sleutel cryptosysteem
J Delvaux
The system can't perform the operation now. Try again later.
Articles 1–20