Helper data algorithms for PUF-based key generation: Overview and analysis J Delvaux, D Gu, D Schellekens, I Verbauwhede IEEE Transactions on Computer-Aided Design of Integrated Circuits and …, 2014 | 248 | 2014 |
Reconfigurable Physical Unclonable Functions-Enabling Technology for Tamper-Resistant Storage K Kursawe, AR Sadeghi, D Schellekens, B Skoric, P Tuyls Hardware-Oriented Security and Trust, 2009. HOST'09. IEEE International …, 2009 | 188 | 2009 |
FPGA vendor agnostic true random number generator D Schellekens, B Preneel, I Verbauwhede Field Programmable Logic and Applications, 2006. FPL'06. International …, 2006 | 188 | 2006 |
Remote attestation on legacy operating systems with trusted platform modules D Schellekens, B Wyseur, B Preneel Science of Computer Programming 74 (1-2), 13-22, 2008 | 158 | 2008 |
Reconfigurable trusted computing in hardware T Eisenbarth, T Güneysu, C Paar, AR Sadeghi, D Schellekens, M Wolf Proceedings of the 2007 ACM workshop on Scalable trusted computing, 15-20, 2007 | 96 | 2007 |
Analyzing trusted platform communication K Kursawe, D Schellekens, B Preneel ECRYPT Workshop, CRASH-CRyptographic Advances in Secure Hardware, 2005 | 77 | 2005 |
Secure lightweight entity authentication with strong PUFs: Mission impossible? J Delvaux, D Gu, D Schellekens, I Verbauwhede International Workshop on Cryptographic Hardware and Embedded Systems, 451-475, 2014 | 74 | 2014 |
A Pay-per-Use Licensing Scheme for Hardware IP Cores in Recent SRAM based FPGAs R Maes, D Schellekens, I Verbauwhede Information Forensics and Security, IEEE Transactions on 7 (1), 98-108, 2012 | 70 | 2012 |
Analysis and Design of Active IC Metering Schemes R Maes, D Schellekens, P Tuyls, I Verbauwhede Hardware-Oriented Security and Trust, 2009. HOST'09. IEEE International …, 2009 | 60 | 2009 |
Embedded Trusted Computing with Authenticated Non-Volatile Memory D Schellekens, P Tuyls, B Preneel Trusted Computing-Challenges and Applications, 60-74, 2008 | 57 | 2008 |
Self-encrypting code to protect against analysis and tampering J Cappaert, N Kisserli, D Schellekens, B Preneel 1st Benelux Workshop Inf. Syst. Security, 14, 2006 | 44 | 2006 |
Threat Modelling for Security Tokens in Web Applications B Preneel, D Schellekens, D De Cock, D Singelee, K Wouters IFIP International Federation for Information Processing 175 (1), 183-193, 2005 | 39* | 2005 |
Secure interrupts on low-end microcontrollers R De Clercq, F Piessens, D Schellekens, I Verbauwhede 2014 IEEE 25th International Conference on Application-Specific Systems …, 2014 | 24 | 2014 |
Flexible μTPMs through Disembedding K Kursawe, D Schellekens Proceedings of the 4th International Symposium on Information, Computer, and …, 2009 | 16 | 2009 |
Design and Analysis of Trusted Computing Platforms D Schellekens PhD thesis, KU Leuven, 2013 | 14 | 2013 |
Practical feasibility evaluation and improvement of a pay-per-use licensing scheme for hardware IP cores in Xilinx FPGAs J Vliegen, N Mentens, D Koch, D Schellekens, I Verbauwhede Journal of Cryptographic Engineering 5 (2), 113-122, 2015 | 10 | 2015 |
Random number generators for integrated circuits and FPGAs B Sunar, D Schellekens Secure Integrated Circuits and Systems, 107-124, 2010 | 7 | 2010 |
Vision towards an open electronic wallet on NFC smartphones G Ergeerts, D Schellekens, F Schrooyen, R Beyers, K De Kock, ... International Journal on Advances in Internet Technology 5 (3), 2012 | 4 | 2012 |
Self-encrypting code to protect against analysis and tampering N Kisserli, D Schellekens, B Preneel 1st Benelux Workshop on Information and System Security (WISSec, 2006 | 4 | 2006 |
Integrating the Belgian e-ID into Android G Van Damme, K Wouters, D De Cock, D Schellekens | 1* | 2011 |