


Остановите войну!
for scientists:


default search action
Boris Skoric
Person information

Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2023
- [j32]Kaan Akyuz, Boris Skoric:
A simpler security proof for 6-state quantum key distribution. Quantum Inf. Comput. 23(11&12): 949-960 (2023) - 2022
- [c32]Basheer Joudeh, Boris Skoric:
Collusion-resistant Fingerprinting of Parallel Content Channels. IH&MMSec 2022: 81-89 - [c31]Milan Lopuhaä-Zwakenberg
, Boris Skoric, Ninghui Li:
Fisher Information as a Utility Metric for Frequency Estimation under Local Differential Privacy. WPES@CCS 2022: 41-53 - [i57]Basheer Joudeh, Boris Skoric:
Collusion-resistant fingerprinting of parallel content channels. CoRR abs/2204.08575 (2022) - [i56]E. Marakis, U. Rührmair, M. Lachner, R. Uppu, Boris Skoric, Pepijn W. H. Pinkse:
Clones of the Unclonable: Nanoduplicating Optical PUFs and Applications. CoRR abs/2212.12495 (2022) - 2021
- [j31]Daan Leermakers, Boris Skoric:
Quantum Alice and Silent Bob: Qubit-Based Quantum Key Recycling With Almost No Classical Communication. Quantum Inf. Comput. 21(1&2): 1-18 (2021) - [j30]Daan Leermakers, Boris Skoric:
Qubit-based unclonable encryption with key recycling. Quantum Inf. Comput. 21(11&12): 901-930 (2021) - [j29]Boris Skoric:
Quantum digital signatures with smaller public keys. Quantum Inf. Comput. 21(11&12): 955-973 (2021) - [i55]Boris Skoric, Zef Wolffs:
Diagrammatic security proof for 8-state encoding. CoRR abs/2103.01936 (2021) - 2020
- [c30]Tianhao Wang
, Milan Lopuhaä-Zwakenberg, Zitao Li, Boris Skoric, Ninghui Li:
Locally Differentially Private Frequency Estimation with Consistency. NDSS 2020 - [c29]Zitao Li, Tianhao Wang
, Milan Lopuhaä-Zwakenberg
, Ninghui Li, Boris Skoric:
Estimating Numerical Distributions under Local Differential Privacy. SIGMOD Conference 2020: 621-635 - [c28]Milan Lopuhaä-Zwakenberg
, Zitao Li, Boris Skoric, Ninghui Li:
Improving Frequency Estimation under Local Differential Privacy. WPES@CCS 2020: 123-135 - [i54]Boris Skoric, Wil Michiels:
The Blob: provable incompressibility and traceability in the whitebox model. CoRR abs/2004.04457 (2020) - [i53]Milan Lopuhaä-Zwakenberg, Haochen Tong, Boris Skoric:
Data Sanitisation Protocols for the Privacy Funnel with Differential Privacy Guarantees. CoRR abs/2008.13151 (2020) - [i52]Daan Leermakers, Boris Skoric:
Qubit-based Unclonable Encryption with Key Recycling. IACR Cryptol. ePrint Arch. 2020: 172 (2020)
2010 – 2019
- 2019
- [j28]Taras Stanko, Bin Chen
, Boris Skoric
:
Fingerprint template protection using minutia-pair spectral representations. EURASIP J. Inf. Secur. 2019: 12 (2019) - [j27]Daan Leermakers, Boris Skoric:
Security proof for quantum key recycling with noise. Quantum Inf. Comput. 19(11&12): 913-934 (2019) - [j26]André Schaller, Wenjie Xiong
, Nikolaos Athanasios Anagnostopoulos
, Muhammad Umair Saleem, Sebastian Gabmeyer, Boris Skoric
, Stefan Katzenbeisser, Jakub Szefer
:
Decay-Based DRAM PUFs in Commodity Devices. IEEE Trans. Dependable Secur. Comput. 16(3): 462-475 (2019) - [c27]Behrooz Razeghi
, Taras Stanko, Boris Skoric, Slava Voloshynovskiy
:
Single-Component Privacy Guarantees in Helper Data Systems and Sparse Coding with Ambiguation. WIFS 2019: 1-6 - [i51]Tianhao Wang, Zitao Li, Ninghui Li, Milan Lopuhaä-Zwakenberg, Boris Skoric:
Consistent and Accurate Frequency Oracles under Local Differential Privacy. CoRR abs/1905.08320 (2019) - [i50]Behrooz Razeghi, Taras Stanko, Boris Skoric, Slava Voloshynovskiy:
Single-Component Privacy Guarantees in Helper Data Systems and Sparse Coding. CoRR abs/1907.06388 (2019) - [i49]Milan Lopuhaä-Zwakenberg, Boris Skoric, Ninghui Li:
Information-theoretic metrics for Local Differential Privacy protocols. CoRR abs/1910.07826 (2019) - [i48]Milan Lopuhaä-Zwakenberg, Zitao Li, Boris Skoric, Ninghui Li:
Four accuracy bounds and one estimator for frequency estimation under local differential privacy. CoRR abs/1911.10499 (2019) - [i47]Zitao Li, Tianhao Wang, Milan Lopuhaä-Zwakenberg, Boris Skoric, Ninghui Li:
Estimating Numerical Distributions under Local Differential Privacy. CoRR abs/1912.01051 (2019) - [i46]Daan Leermakers, Boris Skoric:
Quantum Alice and Silent Bob: Qubit-based Quantum Key Recycling with almost no classical communication. IACR Cryptol. ePrint Arch. 2019: 875 (2019) - 2018
- [j25]Boris Skoric
:
A trivial debiasing scheme for Helper Data Systems. J. Cryptogr. Eng. 8(4): 341-349 (2018) - [j24]Daan Leermakers, Boris Skoric
:
Optimal attacks on qubit-based Quantum Key Recycling. Quantum Inf. Process. 17(3): 57 (2018) - [j23]Daan Leermakers, Boris Skoric
:
Security proof for round-robin differential phase shift QKD. Quantum Inf. Process. 17(10): 250 (2018) - [j22]André Schaller
, Taras Stanko, Boris Skoric
, Stefan Katzenbeisser:
Eliminating Leakage in Reverse Fuzzy Extractors. IEEE Trans. Inf. Forensics Secur. 13(4): 954-964 (2018) - [i45]Taras Stanko, Bin Chen
, Boris Skoric:
Fingerprint template protection using minutia-pair spectral representations. CoRR abs/1804.01744 (2018) - [i44]Daan Leermakers, Boris Skoric:
Security proof for Quantum Key Recycling with noise. IACR Cryptol. ePrint Arch. 2018: 264 (2018) - 2017
- [j21]Boris Skoric
, Pepijn W. H. Pinkse, Allard P. Mosk:
Authenticated communication from quantum readout of PUFs. Quantum Inf. Process. 16(8): 200 (2017) - [j20]Taras Stanko, Fitria Nur Andini, Boris Skoric
:
Optimized Quantization in Zero Leakage Helper Data Systems. IEEE Trans. Inf. Forensics Secur. 12(8): 1957-1966 (2017) - [c26]Taras Stanko, Boris Skoric:
Minutia-pair spectral representations for fingerprint template protection. WIFS 2017: 1-6 - [i43]Taras Stanko, Boris Skoric:
Minutia-pair spectral representations for fingerprint template protection. CoRR abs/1703.06811 (2017) - [i42]Boris Skoric:
A short note on the security of Round-Robin Differential Phase-Shift QKD. IACR Cryptol. ePrint Arch. 2017: 52 (2017) - [i41]Daan Leermakers, Boris Skoric:
Optimal attacks on qubit-based Quantum Key Recycling. IACR Cryptol. ePrint Arch. 2017: 331 (2017) - [i40]Daan Leermakers, Boris Skoric:
Security proof for Round Robin Differential Phase Shift QKD. IACR Cryptol. ePrint Arch. 2017: 830 (2017) - 2016
- [j19]Joep A. de Groot, Boris Skoric, Niels de Vreede, Jean-Paul M. G. Linnartz
:
Quantization in zero leakage helper data schemes. EURASIP J. Adv. Signal Process. 2016: 54 (2016) - [j18]Boris Skoric, Sebastiaan J. A. de Hoogh, Nicola Zannone
:
Flow-based reputation with uncertainty: evidence-based subjective logic. Int. J. Inf. Sec. 15(4): 381-402 (2016) - [j17]Boris Skoric:
Security analysis of Quantum-Readout PUFs in the case of challenge-estimation attacks. Quantum Inf. Comput. 16(1&2): 50-60 (2016) - [i39]Boris Skoric:
A trivial debiasing scheme for Helper Data Systems. IACR Cryptol. ePrint Arch. 2016: 241 (2016) - [i38]Taras Stanko, Fitria Nur Andini, Boris Skoric:
Optimized quantization in Zero Leakage Helper Data Systems. IACR Cryptol. ePrint Arch. 2016: 325 (2016) - [i37]Boris Skoric, Pepijn W. H. Pinkse, Allard P. Mosk:
Authenticated communication from Quantum Readout of PUFs. IACR Cryptol. ePrint Arch. 2016: 971 (2016) - [i36]Boris Skoric, Manon de Vries:
Quantum Key Recycling with eight-state encoding (The Quantum One Time Pad is more interesting than we thought). IACR Cryptol. ePrint Arch. 2016: 1122 (2016) - 2015
- [j16]Boris Skoric, Jan-Jaap Oosterwijk:
Binary and q-ary Tardos codes, revisited. Des. Codes Cryptogr. 74(1): 75-111 (2015) - [j15]Antonino Simone, Boris Skoric:
False Negative probabilities in Tardos codes. Des. Codes Cryptogr. 74(1): 159-182 (2015) - [j14]Antonino Simone, Boris Skoric:
False positive probabilities in q-ary Tardos codes: comparison of attacks. Des. Codes Cryptogr. 75(3): 519-542 (2015) - [j13]Boris Skoric:
Tally-Based Simple Decoders for Traitor Tracing and Group Testing. IEEE Trans. Inf. Forensics Secur. 10(6): 1221-1233 (2015) - [j12]Jan-Jaap Oosterwijk, Boris Skoric, Jeroen Doumen:
A Capacity-Achieving Simple Decoder for Bias-Based Traitor Tracing Schemes. IEEE Trans. Inf. Theory 61(7): 3882-3900 (2015) - [c25]André Schaller, Boris Skoric, Stefan Katzenbeisser:
On the Systematic Drift of Physically Unclonable Functions Due to Aging. TrustED@CCS 2015: 15-20 - [c24]Boris Skoric, Wouter de Groot:
Generalised tally-based decoders for traitor tracing and group testing. WIFS 2015: 1-6 - [i35]Boris Skoric, Wouter de Groot:
Generalised tally-based decoders for traitor tracing and group testing. IACR Cryptol. ePrint Arch. 2015: 617 (2015) - 2014
- [j11]Boris Skoric, Niels de Vreede:
The Spammed Code Offset Method. IEEE Trans. Inf. Forensics Secur. 9(5): 875-884 (2014) - [i34]Boris Skoric, Sebastiaan de Hoogh, Nicola Zannone:
Flow-based reputation with uncertainty: Evidence-Based Subjective Logic. CoRR abs/1402.3319 (2014) - [i33]André Schaller, Boris Skoric, Stefan Katzenbeisser:
Eliminating Leakage in Reverse Fuzzy Extractors. IACR Cryptol. ePrint Arch. 2014: 741 (2014) - [i32]Boris Skoric:
Simple-looking joint decoders for traitor tracing and group testing. IACR Cryptol. ePrint Arch. 2014: 781 (2014) - 2013
- [j10]Thijs Laarhoven
, Jeroen Doumen, Peter Roelse, Boris Skoric, Benne de Weger:
Dynamic Tardos Traitor Tracing Schemes. IEEE Trans. Inf. Theory 59(7): 4230-4242 (2013) - [c23]Robbert van den Berg, Boris Skoric, Vincent van der Leest:
Bias-based modeling and entropy analysis of PUFs. TrustED@CCS 2013: 13-20 - [c22]Jan-Jaap Oosterwijk, Boris Skoric, Jeroen Doumen:
Optimal suspicion functions for tardos traitor tracing schemes. IH&MMSec 2013: 19-28 - [c21]Joep A. de Groot, Boris Skoric, Niels de Vreede, Jean-Paul M. G. Linnartz:
Diagnostic Category Leakage in Helper Data Schemes for Biometric Authentication. SECRYPT 2013: 506-511 - [c20]Boris Skoric, Jan-Jaap Oosterwijk, Jeroen Doumen:
The holey grail A special score function for non-binary traitor tracing. WIFS 2013: 180-185 - [i31]Boris Skoric, Allard P. Mosk, Pepijn W. H. Pinkse:
Security of Quantum-Readout PUFs against quadrature based challenge estimation attacks. IACR Cryptol. ePrint Arch. 2013: 84 (2013) - [i30]Jan-Jaap Oosterwijk, Boris Skoric, Jeroen Doumen:
Optimal Suspicion Functions for Tardos Traitor Tracing Schemes. IACR Cryptol. ePrint Arch. 2013: 154 (2013) - [i29]Jan-Jaap Oosterwijk, Boris Skoric, Jeroen Doumen:
A Capacity-Achieving Simple Decoder for Bias-Based Traitor Tracing Schemes. IACR Cryptol. ePrint Arch. 2013: 389 (2013) - [i28]Boris Skoric, Jan-Jaap Oosterwijk, Jeroen Doumen:
The Holey Grail: A special score function for non-binary traitor tracing. IACR Cryptol. ePrint Arch. 2013: 420 (2013) - [i27]Boris Skoric:
Security analysis of Quantum-Readout PUFs in the case of generic challenge-estimation attacks. IACR Cryptol. ePrint Arch. 2013: 479 (2013) - [i26]Boris Skoric, Niels de Vreede:
The Spammed Code Offset Method. IACR Cryptol. ePrint Arch. 2013: 527 (2013) - [i25]Robbert van den Berg, Boris Skoric, Vincent van der Leest:
Bias-based modeling and entropy analysis of PUFs. IACR Cryptol. ePrint Arch. 2013: 656 (2013) - [i24]Sarah Ibrahimi, Boris Skoric, Jan-Jaap Oosterwijk:
Riding the Saddle Point: asymptotics of the capacity-achieving simple decoder for bias-based traitor tracing. IACR Cryptol. ePrint Arch. 2013: 809 (2013) - 2012
- [j9]Antonino Simone, Boris Skoric:
Accusation probabilities in Tardos codes: beyond the Gaussian approximation. Des. Codes Cryptogr. 63(3): 379-412 (2012) - [j8]Antonino Simone, Boris Skoric, Nicola Zannone
:
Flow-Based Reputation: More than Just Ranking. Int. J. Inf. Technol. Decis. Mak. 11(3): 551-578 (2012) - [c19]Aanjhan Ranganathan
, Nils Ole Tippenhauer
, Boris Skoric, Dave Singelée, Srdjan Capkun:
Design and Implementation of a Terrorist Fraud Resilient Distance Bounding System. ESORICS 2012: 415-432 - [c18]Dion Boesten, Boris Skoric:
Asymptotic Fingerprinting Capacity in the Combined Digit Model. Information Hiding 2012: 255-268 - [i23]Antonino Simone, Boris Skoric, Nicola Zannone:
Flow-based reputation: more than just ranking. CoRR abs/1203.1820 (2012) - [i22]Dion Boesten, Boris Skoric:
Asymptotic fingerprinting capacity in the Combined Digit Model. IACR Cryptol. ePrint Arch. 2012: 184 (2012) - [i21]Boris Skoric, Jan-Jaap Oosterwijk:
Binary and q-ary Tardos codes, revisited. IACR Cryptol. ePrint Arch. 2012: 249 (2012) - [i20]Antonino Simone, Boris Skoric:
False Positive probabilities in q-ary Tardos codes: comparison of attacks. IACR Cryptol. ePrint Arch. 2012: 522 (2012) - [i19]Joep A. de Groot, Boris Skoric, Niels de Vreede, Jean-Paul M. G. Linnartz:
Information Leakage of Continuous-Source Zero Secrecy Leakage Helper Data Schemes. IACR Cryptol. ePrint Arch. 2012: 566 (2012) - [i18]Antonino Simone, Boris Skoric:
False Negative probabilities in Tardos codes. IACR Cryptol. ePrint Arch. 2012: 667 (2012) - 2011
- [j7]Boris Skoric, Chibuzo Obi, Evgeny A. Verbitskiy
, Berry Schoenmakers:
Sharp lower bounds on the extractable randomness from non-uniform sources. Inf. Comput. 209(8): 1184-1196 (2011) - [j6]Boris Skoric, Stefan Katzenbeisser, Hans Georg Schaathun, Mehmet Utku Celik:
Tardos Fingerprinting Codes in the Combined Digit Model. IEEE Trans. Inf. Forensics Secur. 6(3-2): 906-919 (2011) - [c17]Dion Boesten, Boris Skoric:
Asymptotic Fingerprinting Capacity for Non-binary Alphabets. Information Hiding 2011: 1-13 - [c16]Antonino Simone, Boris Skoric:
Asymptotically False-Positive-Maximizing Attack on Non-binary Tardos Codes. Information Hiding 2011: 14-27 - [i17]Dion Boesten, Boris Skoric:
Asymptotic fingerprinting capacity for non-binary alphabets. CoRR abs/1102.0445 (2011) - [i16]Antonino Simone, Boris Skoric:
Asymptotically false-positive-maximizing attack on non-binary Tardos codes. CoRR abs/1102.0451 (2011) - [i15]Thijs Laarhoven
, Jeroen Doumen, Peter Roelse, Boris Skoric, Benne de Weger:
Dynamic Tardos Traitor Tracing Schemes. CoRR abs/1111.3597 (2011) - 2010
- [j5]Boris Skoric, Marc X. Makkes
:
Flowchart description of security primitives for controlled physical unclonable functions. Int. J. Inf. Sec. 9(5): 327-335 (2010) - [j4]Evgeny A. Verbitskiy
, Pim Tuyls, Chibuzo Obi, Berry Schoenmakers, Boris Skoric:
Key extraction from general nondiscrete signals. IEEE Trans. Inf. Forensics Secur. 5(2): 269-279 (2010) - [c15]Boris Skoric:
Quantum Readout of Physical Unclonable Functions. AFRICACRYPT 2010: 369-386 - [c14]Boris Skoric:
Security with Noisy Data - (Extended Abstract of Invited Talk). Information Hiding 2010: 48-50 - [i14]Antonino Simone, Boris Skoric:
Accusation probabilities in Tardos codes: the Gaussian approximation is better than we thought. IACR Cryptol. ePrint Arch. 2010: 472 (2010)
2000 – 2009
- 2009
- [j3]Jorge Guajardo, Boris Skoric, Pim Tuyls, Sandeep S. Kumar, Thijs Bel, Antoon H. M. Blom, Geert Jan Schrijen
:
Anti-counterfeiting, key distribution, and key storage in an ambient world via physical unclonable functions. Inf. Syst. Frontiers 11(1): 19-41 (2009) - [c13]Klaus Kursawe, Ahmad-Reza Sadeghi, Dries Schellekens, Boris Skoric, Pim Tuyls:
Reconfigurable Physical Unclonable Functions -- Enabling Technology for Tamper-Resistant Storage. HOST 2009: 22-29 - [c12]Sebastiaan de Hoogh, Berry Schoenmakers, Boris Skoric, José Villegas:
Verifiable Rotation of Homomorphic Encryptions. Public Key Cryptography 2009: 393-410 - [c11]Boris Skoric, Stefan Katzenbeisser, Hans Georg Schaathun, Mehmet Utku Celik:
Tardos fingerprinting codes in the combined digit model. WIFS 2009: 41-45 - [i13]Boris Skoric, Marc X. Makkes:
Simplification of Controlled PUF primitives. Foundations for Forgery-Resilient Cryptographic Hardware 2009 - [i12]Boris Skoric, Pim Tuyls:
An efficient fuzzy extractor for limited noise. Foundations for Forgery-Resilient Cryptographic Hardware 2009 - [i11]Boris Skoric, Pim Tuyls:
An efficient fuzzy extractor for limited noise. IACR Cryptol. ePrint Arch. 2009: 30 (2009) - [i10]Boris Skoric, Stefan Katzenbeisser, Hans Georg Schaathun, Mehmet Utku Celik:
Tardos Fingerprinting Codes in the Combined Digit Model. IACR Cryptol. ePrint Arch. 2009: 244 (2009) - [i9]Evgeny A. Verbitskiy, Pim Tuyls, Chibuzo Obi, Berry Schoenmakers, Boris Skoric:
Key extraction from general non-discrete signals. IACR Cryptol. ePrint Arch. 2009: 303 (2009) - [i8]Boris Skoric, Marc X. Makkes:
Flowchart description of security primitives for Controlled Physical Unclonable Functions. IACR Cryptol. ePrint Arch. 2009: 328 (2009) - [i7]Boris Skoric:
Quantum readout of Physical Unclonable Functions: Remote authentication without trusted readers and authenticated Quantum Key Exchange without initial shared secrets. IACR Cryptol. ePrint Arch. 2009: 369 (2009) - 2008
- [j2]Boris Skoric, Stefan Katzenbeisser, Mehmet Utku Celik:
Symmetric Tardos fingerprinting codes for arbitrary alphabet sizes. Des. Codes Cryptogr. 46(2): 137-166 (2008) - [j1]Boris Skoric, T. U. Vladimirova, Mehmet Utku Celik, Joop Talstra:
Tardos Fingerprinting is Better Than We Thought. IEEE Trans. Inf. Theory 54(8): 3663-3676 (2008) - [i6]Boris Skoric:
Steganography from weak cryptography. CoRR abs/0804.0659 (2008) - [i5]Boris Skoric, Chibuzo Obi, Evgeny A. Verbitskiy, Berry Schoenmakers:
Sharp lower bounds on the extractable randomness from non-uniform sources. IACR Cryptol. ePrint Arch. 2008: 484 (2008) - 2007
- [c10]Neil Bird, Claudine Conrado, Jorge Guajardo, Stefan Maubach, Geert Jan Schrijen
, Boris Skoric, Anton M. H. Tombeur, Peter Thueringer, Pim Tuyls:
ALGSICS - Combining Physics and Cryptography to Enhance Security and Privacy in RFID Systems. ESAS 2007: 187-202 - [c9]Stefan Katzenbeisser, Boris Skoric, Mehmet Utku Celik, Ahmad-Reza Sadeghi:
Combining Tardos Fingerprinting Codes and Fingercasting. Information Hiding 2007: 294-310 - [p1]Pim Tuyls, Boris Skoric:
Strong Authentication with Physical Unclonable Functions. Security, Privacy, and Trust in Modern Data Management 2007: 133-148 - [i4]Boris Skoric:
The entropy of keys derived from laser speckle. CoRR abs/0710.5002 (2007) - [i3]Boris Skoric, Stefan Katzenbeisser, Mehmet Utku Celik:
Symmetric Tardos fingerprinting codes for arbitrary alphabet sizes. IACR Cryptol. ePrint Arch. 2007: 41 (2007) - 2006
- [c8]Guofei Gu, Prahlad Fogla, David Dagon, Wenke Lee, Boris Skoric:
Measuring intrusion detection capability: an information-theoretic approach. AsiaCCS 2006: 90-101 - [c7]Pim Tuyls, Geert Jan Schrijen
, Boris Skoric, Jan van Geloven, Nynke Verhaegh, Rob Wolters:
Read-Proof Hardware from Protective Coatings. CHES 2006: 369-383 - [c6]Guofei Gu, Prahlad Fogla, David Dagon, Wenke Lee, Boris Skoric:
Towards an Information-Theoretic Framework for Analyzing Intrusion Detection Systems. ESORICS 2006: 527-546 - [c5]Tanya Ignatenko, Geert Jan Schrijen
, Boris Skoric, Pim Tuyls, Frans M. J. Willems:
Estimating the Secrecy-Rate of Physical Unclonable Functions with the Context-Tree Weighting Method. ISIT 2006: 499-503 - [c4]Pim Tuyls, Boris Skoric:
Physical Unclonable Functions for enhanced security of tokens and tags. ISSE 2006: 30-37 - [i2]Boris Skoric, T. U. Vladimirova, Mehmet Utku Celik, Joop Talstra:
Tardos fingerprinting is better than we thought. CoRR abs/cs/0607131 (2006) - [i1]Boris Skoric, Stefan Maubach, Tom A. M. Kevenaar, Pim Tuyls:
Information-theoretic analysis of coating PUFs. IACR Cryptol. ePrint Arch. 2006: 101 (2006) - 2005
- [c3]Boris Skoric, Pim Tuyls, W. Ophey:
Robust Key Extraction from Physical Uncloneable Functions. ACNS 2005: 407-422 - [c2]Pim Tuyls, Boris Skoric, S. Stallinga, Anton H. M. Akkermans, W. Ophey:
Information-Theoretic Security Analysis of Physical Uncloneable Functions. Financial Cryptography 2005: 141-155 - 2004
- [c1]Pim Tuyls, Boris Skoric, S. Stallinga, Ton H. Akkermans, W. Ophey:
An information theoretic model for physical uncloneable functions. ISIT 2004: 141