Boris Skoric

Orcid: 0000-0003-1409-4127

According to our database1, Boris Skoric authored at least 91 papers between 2004 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Entropically secure encryption with faster key expansion.
Quantum Inf. Process., April, 2024

Average entropy of Gaussian mixtures.
CoRR, 2024

Continuous-Variable QKD with key rates far above Devetak-Winter.
CoRR, 2024

2023
A simpler security proof for 6-state quantum key distribution.
Quantum Inf. Comput., September, 2023

2022
Clones of the Unclonable: Nanoduplicating Optical PUFs and Applications.
CoRR, 2022

Fisher Information as a Utility Metric for Frequency Estimation under Local Differential Privacy.
Proceedings of the 21st Workshop on Privacy in the Electronic Society, 2022

Collusion-resistant Fingerprinting of Parallel Content Channels.
Proceedings of the IH&MMSec '22: ACM Workshop on Information Hiding and Multimedia Security, Santa Barbara, CA, USA, June 27, 2022

2021
Quantum digital signatures with smaller public keys.
Quantum Inf. Comput., 2021

Qubit-based unclonable encryption with key recycling.
Quantum Inf. Comput., 2021

Quantum Alice and Silent Bob: Qubit-Based Quantum Key Recycling With Almost No Classical Communication.
Quantum Inf. Comput., 2021

Diagrammatic security proof for 8-state encoding.
CoRR, 2021

2020
Data Sanitisation Protocols for the Privacy Funnel with Differential Privacy Guarantees.
CoRR, 2020

The Blob: provable incompressibility and traceability in the whitebox model.
CoRR, 2020

Improving Frequency Estimation under Local Differential Privacy.
Proceedings of the WPES'20: Proceedings of the 19th Workshop on Privacy in the Electronic Society, 2020

Estimating Numerical Distributions under Local Differential Privacy.
Proceedings of the 2020 International Conference on Management of Data, 2020

Locally Differentially Private Frequency Estimation with Consistency.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020

2019
Decay-Based DRAM PUFs in Commodity Devices.
IEEE Trans. Dependable Secur. Comput., 2019

Security proof for quantum key recycling with noise.
Quantum Inf. Comput., 2019

Fingerprint template protection using minutia-pair spectral representations.
EURASIP J. Inf. Secur., 2019

Four accuracy bounds and one estimator for frequency estimation under local differential privacy.
CoRR, 2019

Information-theoretic metrics for Local Differential Privacy protocols.
CoRR, 2019

Single-Component Privacy Guarantees in Helper Data Systems and Sparse Coding.
CoRR, 2019

Consistent and Accurate Frequency Oracles under Local Differential Privacy.
CoRR, 2019

Single-Component Privacy Guarantees in Helper Data Systems and Sparse Coding with Ambiguation.
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2019

2018
Eliminating Leakage in Reverse Fuzzy Extractors.
IEEE Trans. Inf. Forensics Secur., 2018

A trivial debiasing scheme for Helper Data Systems.
J. Cryptogr. Eng., 2018

2017
Optimized Quantization in Zero Leakage Helper Data Systems.
IEEE Trans. Inf. Forensics Secur., 2017

A short note on the security of Round-Robin Differential Phase-Shift QKD.
IACR Cryptol. ePrint Arch., 2017

Security proof for Round Robin Differential Phase Shift QKD.
IACR Cryptol. ePrint Arch., 2017

Optimal attacks on qubit-based Quantum Key Recycling.
IACR Cryptol. ePrint Arch., 2017

Minutia-pair spectral representations for fingerprint template protection.
Proceedings of the 2017 IEEE Workshop on Information Forensics and Security, 2017

2016
Security analysis of Quantum-Readout PUFs in the case of challenge-estimation attacks.
Quantum Inf. Comput., 2016

Flow-based reputation with uncertainty: evidence-based subjective logic.
Int. J. Inf. Sec., 2016

Quantum Key Recycling with eight-state encoding (The Quantum One Time Pad is more interesting than we thought).
IACR Cryptol. ePrint Arch., 2016

Authenticated communication from Quantum Readout of PUFs.
IACR Cryptol. ePrint Arch., 2016

Quantization in zero leakage helper data schemes.
EURASIP J. Adv. Signal Process., 2016

2015
A Capacity-Achieving Simple Decoder for Bias-Based Traitor Tracing Schemes.
IEEE Trans. Inf. Theory, 2015

Tally-Based Simple Decoders for Traitor Tracing and Group Testing.
IEEE Trans. Inf. Forensics Secur., 2015

Generalised tally-based decoders for traitor tracing and group testing.
IACR Cryptol. ePrint Arch., 2015

Binary and q-ary Tardos codes, revisited.
Des. Codes Cryptogr., 2015

False positive probabilities in q-ary Tardos codes: comparison of attacks.
Des. Codes Cryptogr., 2015

False Negative probabilities in Tardos codes.
Des. Codes Cryptogr., 2015

On the Systematic Drift of Physically Unclonable Functions Due to Aging.
Proceedings of the 5th International Workshop on Trustworthy Embedded Devices, 2015

2014
The Spammed Code Offset Method.
IEEE Trans. Inf. Forensics Secur., 2014

Simple-looking joint decoders for traitor tracing and group testing.
IACR Cryptol. ePrint Arch., 2014

Eliminating Leakage in Reverse Fuzzy Extractors.
IACR Cryptol. ePrint Arch., 2014

2013
Dynamic Tardos Traitor Tracing Schemes.
IEEE Trans. Inf. Theory, 2013

The Holey Grail: A special score function for non-binary traitor tracing.
IACR Cryptol. ePrint Arch., 2013

Security of Quantum-Readout PUFs against quadrature based challenge estimation attacks.
IACR Cryptol. ePrint Arch., 2013

Security analysis of Quantum-Readout PUFs in the case of generic challenge-estimation attacks.
IACR Cryptol. ePrint Arch., 2013

Optimal Suspicion Functions for Tardos Traitor Tracing Schemes.
IACR Cryptol. ePrint Arch., 2013

Riding the Saddle Point: asymptotics of the capacity-achieving simple decoder for bias-based traitor tracing.
IACR Cryptol. ePrint Arch., 2013

Bias-based modeling and entropy analysis of PUFs.
IACR Cryptol. ePrint Arch., 2013

Diagnostic Category Leakage in Helper Data Schemes for Biometric Authentication.
Proceedings of the SECRYPT 2013, 2013

2012
Flow-Based Reputation: More than Just Ranking.
Int. J. Inf. Technol. Decis. Mak., 2012

Information Leakage of Continuous-Source Zero Secrecy Leakage Helper Data Schemes.
IACR Cryptol. ePrint Arch., 2012

Asymptotic fingerprinting capacity in the Combined Digit Model.
IACR Cryptol. ePrint Arch., 2012

Accusation probabilities in Tardos codes: beyond the Gaussian approximation.
Des. Codes Cryptogr., 2012

Design and Implementation of a Terrorist Fraud Resilient Distance Bounding System.
Proceedings of the Computer Security - ESORICS 2012, 2012

2011
Tardos Fingerprinting Codes in the Combined Digit Model.
IEEE Trans. Inf. Forensics Secur., 2011

Asymptotically False-Positive-Maximizing Attack on Non-binary Tardos Codes.
Proceedings of the Information Hiding - 13th International Conference, 2011

Asymptotic Fingerprinting Capacity for Non-binary Alphabets.
Proceedings of the Information Hiding - 13th International Conference, 2011

2010
Key extraction from general nondiscrete signals.
IEEE Trans. Inf. Forensics Secur., 2010

Flowchart description of security primitives for controlled physical unclonable functions.
Int. J. Inf. Sec., 2010

Accusation probabilities in Tardos codes: the Gaussian approximation is better than we thought.
IACR Cryptol. ePrint Arch., 2010

Security with Noisy Data - (Extended Abstract of Invited Talk).
Proceedings of the Information Hiding - 12th International Conference, 2010

Quantum Readout of Physical Unclonable Functions.
Proceedings of the Progress in Cryptology, 2010

2009
Anti-counterfeiting, key distribution, and key storage in an ambient world via physical unclonable functions.
Inf. Syst. Frontiers, 2009

Key extraction from general non-discrete signals.
IACR Cryptol. ePrint Arch., 2009

An efficient fuzzy extractor for limited noise.
IACR Cryptol. ePrint Arch., 2009

Quantum readout of Physical Unclonable Functions: Remote authentication without trusted readers and authenticated Quantum Key Exchange without initial shared secrets.
IACR Cryptol. ePrint Arch., 2009

Verifiable Rotation of Homomorphic Encryptions.
Proceedings of the Public Key Cryptography, 2009

Reconfigurable Physical Unclonable Functions -- Enabling Technology for Tamper-Resistant Storage.
Proceedings of the IEEE International Workshop on Hardware-Oriented Security and Trust, 2009

Simplification of Controlled PUF primitives.
Proceedings of the Foundations for Forgery-Resilient Cryptographic Hardware, 05.07., 2009

2008
Tardos Fingerprinting is Better Than We Thought.
IEEE Trans. Inf. Theory, 2008

Sharp lower bounds on the extractable randomness from non-uniform sources.
IACR Cryptol. ePrint Arch., 2008

Symmetric Tardos fingerprinting codes for arbitrary alphabet sizes.
Des. Codes Cryptogr., 2008

Steganography from weak cryptography
CoRR, 2008

2007
The entropy of keys derived from laser speckle
CoRR, 2007

Combining Tardos Fingerprinting Codes and Fingercasting.
Proceedings of the Information Hiding, 9th International Workshop, 2007

ALGSICS - Combining Physics and Cryptography to Enhance Security and Privacy in RFID Systems.
Proceedings of the Security and Privacy in Ad-hoc and Sensor Networks, 2007

Strong Authentication with Physical Unclonable Functions.
Proceedings of the Security, Privacy, and Trust in Modern Data Management, 2007

2006
Information-theoretic analysis of coating PUFs.
IACR Cryptol. ePrint Arch., 2006

Physical Unclonable Functions for enhanced security of tokens and tags.
Proceedings of the ISSE 2006, 2006

Estimating the Secrecy-Rate of Physical Unclonable Functions with the Context-Tree Weighting Method.
Proceedings of the Proceedings 2006 IEEE International Symposium on Information Theory, 2006

Towards an Information-Theoretic Framework for Analyzing Intrusion Detection Systems.
Proceedings of the Computer Security, 2006

Read-Proof Hardware from Protective Coatings.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2006

Measuring intrusion detection capability: an information-theoretic approach.
Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, 2006

2005
Information-Theoretic Security Analysis of Physical Uncloneable Functions.
Proceedings of the Financial Cryptography and Data Security, 2005

Robust Key Extraction from Physical Uncloneable Functions.
Proceedings of the Applied Cryptography and Network Security, 2005

2004
An information theoretic model for physical uncloneable functions.
Proceedings of the 2004 IEEE International Symposium on Information Theory, 2004


  Loading...