Dries Schellekens
Dries Schellekens
COSIC, KU Leuven
Geverifieerd e-mailadres voor esat.kuleuven.be
Titel
Geciteerd door
Geciteerd door
Jaar
FPGA vendor agnostic true random number generator
D Schellekens, B Preneel, I Verbauwhede
Field Programmable Logic and Applications, 2006. FPL'06. International …, 2006
1662006
Helper data algorithms for PUF-based key generation: Overview and analysis
J Delvaux, D Gu, D Schellekens, I Verbauwhede
IEEE Transactions on Computer-Aided Design of Integrated Circuits and …, 2014
1582014
Reconfigurable Physical Unclonable Functions-Enabling Technology for Tamper-Resistant Storage
K Kursawe, AR Sadeghi, D Schellekens, B Skoric, P Tuyls
Hardware-Oriented Security and Trust, 2009. HOST'09. IEEE International …, 2009
1542009
Remote attestation on legacy operating systems with trusted platform modules
D Schellekens, B Wyseur, B Preneel
Science of Computer Programming 74 (1-2), 13-22, 2008
1432008
Reconfigurable trusted computing in hardware
T Eisenbarth, T Güneysu, C Paar, AR Sadeghi, D Schellekens, M Wolf
Proceedings of the 2007 ACM workshop on Scalable trusted computing, 15-20, 2007
902007
Analyzing trusted platform communication
K Kursawe, D Schellekens, B Preneel
ECRYPT Workshop, CRASH-CRyptographic Advances in Secure Hardware, 2005
742005
A Pay-per-Use Licensing Scheme for Hardware IP Cores in Recent SRAM based FPGAs
R Maes, D Schellekens, I Verbauwhede
Information Forensics and Security, IEEE Transactions on 7 (1), 98-108, 2012
662012
Secure lightweight entity authentication with strong PUFs: Mission impossible?
J Delvaux, D Gu, D Schellekens, I Verbauwhede
International Workshop on Cryptographic Hardware and Embedded Systems, 451-475, 2014
592014
Embedded Trusted Computing with Authenticated Non-Volatile Memory
D Schellekens, P Tuyls, B Preneel
Trusted Computing-Challenges and Applications, 60-74, 2008
532008
Self-encrypting code to protect against analysis and tampering
J Cappaert, N Kisserli, D Schellekens, B Preneel
1st Benelux Workshop Inf. Syst. Security, 14, 2006
422006
Threat modelling for security tokens in web applications
D De Cock, K Wouters, D Schellekens, D Singelee, B Preneel
Communications and multimedia security, 183-193, 2005
382005
Analysis and Design of Active IC Metering Schemes
R Maes, D Schellekens, P Tuyls, I Verbauwhede
Hardware-Oriented Security and Trust, 2009. HOST'09. IEEE International …, 2009
332009
Secure interrupts on low-end microcontrollers
R De Clercq, F Piessens, D Schellekens, I Verbauwhede
2014 IEEE 25th International Conference on Application-Specific Systems …, 2014
222014
Flexible μTPMs through Disembedding
K Kursawe, D Schellekens
Proceedings of the 4th International Symposium on Information, Computer, and …, 2009
142009
Design and Analysis of Trusted Computing Platforms
D Schellekens
PhD thesis, KU Leuven, 2013
122013
Practical feasibility evaluation and improvement of a pay-per-use licensing scheme for hardware IP cores in Xilinx FPGAs
J Vliegen, N Mentens, D Koch, D Schellekens, I Verbauwhede
Journal of Cryptographic Engineering 5 (2), 113-122, 2015
82015
Random number generators for integrated circuits and FPGAs
B Sunar, D Schellekens
Secure Integrated Circuits and Systems, 107-124, 2010
42010
Vision towards an Open Electronic Wallet on NFC Smartphones
G Ergeerts, D Schellekens, F Schrooyen, R Beyers, K De Kock, ...
International Journal on Advances in Internet Technology 5 (3), 2012
32012
Self-encrypting code to protect against analysis and tampering
N Kisserli, D Schellekens, B Preneel
1st Benelux Workshop on Information and System Security (WISSec, 2006
32006
Integrating the Belgian e-ID into Android
G Van Damme, K Wouters, D De Cock, D Schellekens
1*2011
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20