Zobrazeno 1 - 10
of 18
pro vyhledávání: '"Jeroen Delvaux"'
Autor:
Jeroen Delvaux
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2022, Iss 4 (2022)
At Indocrypt 2021, Hermelink, Pessl, and Pöppelmann presented a fault attack against Kyber in which a system of linear inequalities over the private key is generated and solved. The attack requires a laser and is, understandably, demonstrated with s
Externí odkaz:
https://doaj.org/article/9e4499adfc2744ef8d9a4e771487ab70
Autor:
Jeroen Delvaux
Publikováno v:
AsianHOST
In an article from HOST 2018, which appears in extended form in the Cryptology ePrint Archive, Baksi, Bhasin, Breier, Khairallah, and Peyrin proposed the tweak-in-plaintext method to protect block ciphers against a differential fault analysis (DFA).
Publikováno v:
ACM Computing Surveys. 48:1-42
© 2015 ACM 0360-0300/2015/10-ART26 s15.00. Physically unclonable functions (PUFs) exploit the unavoidable manufacturing variations of an Integrated Circuit (IC). Their input-output behavior serves as a unique IC "fingerprint." Therefore, they have b
Autor:
Svetla Nikova, Eduard Marin, Jeroen Delvaux, Bohan Yang, Oscar Reparaz, Sanghan Lee, Vladimir Rožić, Pieter Maene, Dave Singelée, Bart Preneel, Tomer Ashur
Publikováno v:
Lecture Notes in Computer Science
Lecture Notes in Computer Science-Cryptology and Network Security
Cryptology and Network Security-16th International Conference, CANS 2017, Hong Kong, China, November 30—December 2, 2017, Revised Selected Papers
Cryptology and Network Security ISBN: 9783030026400
CANS
Lecture Notes in Computer Science-Cryptology and Network Security
Cryptology and Network Security-16th International Conference, CANS 2017, Hong Kong, China, November 30—December 2, 2017, Revised Selected Papers
Cryptology and Network Security ISBN: 9783030026400
CANS
© Springer Nature Switzerland AG 2018. This paper presents the design and implementation of a low-power privacy-preserving device tracking system based on Internet of Things (IOT) technology. The system consists of low-power nodes and a set of dedic
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::60ab2e599e398017230d07f1bec79f16
https://zenodo.org/record/2643354
https://zenodo.org/record/2643354
Autor:
Jeroen Delvaux
No two physical objects are exactly the same, even when manufactured with a nominally identical process. For example, two sheets of paper that are indistinguishable with the naked eye, still differ considerably in their nanoscale fiber structures. Al
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::70787537af72ecd29f1887a14c36425f
Autor:
Jeroen Delvaux, Ingrid Verbauwhede
Publikováno v:
IEEE Transactions on Circuits and Systems I: Regular Papers. 61:1701-1713
Physically Unclonable Functions (PUFs) are emerging as hardware security primitives. So-called strong PUFs provide a mechanism to authenticate chips which is inherently unique for every manufactured sample. To prevent cloning, modeling of the challen
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783662531396
CHES
Conference on Cryptographic Hardware and Embedded Systems 2016
CHES
Conference on Cryptographic Hardware and Embedded Systems 2016
© International Association for Cryptologic Research 2016. The device-unique response of a physically unclonable function (PUF) can serve as the root of trust in an embedded cryptographic system. Fuzzy extractors transform this noisy non-uniformly d
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::b929ec0a13ca3438551e716f850cb39d
https://doi.org/10.5281/zenodo.55449
https://doi.org/10.5281/zenodo.55449
Autor:
Bohan Yang, Cocoy Reyes, Cedric Mayor, Dave Singelée, Peter Cockburn, Ingrid Verbauwhede, Yervant Zorian, Vladimir Rozic, Mario Konijnenburg, Erik Jan Marinissen, Robert van Rijsinge, Ping-Hsuan Hsieh, Chih-Tsun Huang, Jeroen Delvaux
Publikováno v:
Proceedings-2016 21st IEEE European Test Symposium, ETS 2016
ETS
ETS
The semiconductor industry has been driving a major part of its growth through first the PC and more recently the mobile market. Unfortunately, the PC market is in decline and also the end of the growth curve for mobile products is in sight now that
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::85f24a4e7c9b77221b084e3cd321d8dd
https://doi.org/10.1109/ets.2016.7519331
https://doi.org/10.1109/ets.2016.7519331
Autor:
Richard Sowell, Matthias Hiller, Meng-Day (Mandel) Yu, Ingrid Verbauwhede, Srinivas Devadas, Jeroen Delvaux
Publikováno v:
MIT Web Domain
We present a lightweight PUF-based authentication approach that is practical in settings where a server authenticates a device, and for use cases where the number of authentications is limited over a device's lifetime. Our scheme uses a server-manage
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::9b671833f87d3a62773c329522449516
http://hdl.handle.net/1721.1/110985
http://hdl.handle.net/1721.1/110985
Autor:
Martin DEUTSCHMANN, Sandra LATTACHER, Jeroen DELVAUX, Vladimir ROZIC, Bohan YANG, Dave SINGELEE, Lilian BOSSUET, Viktor FISCHER, Ugo MUREDDU, Oto PETURA, Alexandre ANZALA YAMAJAKO, Bernard KASSER, Gerard BATTUM
This report represents the final version of Deliverable 2.1 of the HECTOR work package WP2. It is a result of discussions and work on Task 2.1 of all HECTOR partners involved in WP2. The aim of the Deliverable 2.1 is to select principles of random nu
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::e10c6a1c9a7868bb604e64daef81c9e5