Jeroen Delvaux

Orcid: 0000-0003-0684-8427

According to our database1, Jeroen Delvaux authored at least 24 papers between 2012 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
Roulette: A Diverse Family of Feasible Fault Attacks on Masked Kyber.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2022

2021
Roulette: Breaking Kyber with Diverse Fault Injection Setups.
IACR Cryptol. ePrint Arch., 2021

2020
On The Deployment of Tweak-in-Plaintext Protection Against Differential Fault Analysis.
IACR Cryptol. ePrint Arch., 2020

Threshold Implementations Are Not Provably Secure Against Fault Sensitivity Analysis.
IACR Cryptol. ePrint Arch., 2020

2019
Machine-Learning Attacks on PolyPUFs, OB-PUFs, RPUFs, LHS-PUFs, and PUF-FSMs.
IEEE Trans. Inf. Forensics Secur., 2019

Refutation and Redesign of a Physical Model of TERO-based TRNGs and PUFs.
IACR Cryptol. ePrint Arch., 2019

2017
Security Analysis of PUF-based Key Generation and Entity Authentication ; Veiligheidsanalyse van PUF-gebaseerde sleutelgeneratie en entiteitsauthenticatie.
PhD thesis, 2017

Machine Learning Attacks on PolyPUF, OB-PUF, RPUF, and PUF-FSM.
IACR Cryptol. ePrint Arch., 2017

A Privacy-Preserving Device Tracking System Using a Low-Power Wide-Area Network.
Proceedings of the Cryptology and Network Security - 16th International Conference, 2017

2016
A Lockdown Technique to Prevent Machine Learning on PUFs for Lightweight Authentication.
IEEE Trans. Multi Scale Comput. Syst., 2016

Upper bounds on the min-entropy of RO Sum, Arbiter, Feed-Forward Arbiter, and S-ArbRO PUFs.
Proceedings of the 2016 IEEE Asian Hardware-Oriented Security and Trust, 2016


Efficient Fuzzy Extraction of PUF-Induced Secrets: Theory and Applications.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2016, 2016

2015
Helper Data Algorithms for PUF-Based Key Generation: Overview and Analysis.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2015

Secure Sketch Metamorphosis: Tight Unified Bounds.
IACR Cryptol. ePrint Arch., 2015

A Survey on Lightweight Entity Authentication with Strong PUFs.
ACM Comput. Surv., 2015

2014
Fault Injection Modeling Attacks on 65 nm Arbiter and RO Sum PUFs via Environmental Changes.
IEEE Trans. Circuits Syst. I Regul. Pap., 2014

Secure Lightweight Entity Authentication with Strong PUFs: Mission Impossible II.
IACR Cryptol. ePrint Arch., 2014

Secure Lightweight Entity Authentication with Strong PUFs: Mission Impossible?
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2014, 2014

2013
Fault Injection Modeling Attacks on 65nm Arbiter and RO Sum PUFs via Environmental Changes.
IACR Cryptol. ePrint Arch., 2013

Key-recovery Attacks on Various RO PUF Constructions via Helper Data Manipulation.
IACR Cryptol. ePrint Arch., 2013

Attacking PUF-Based Pattern Matching Key Generators via Helper Data Manipulation.
IACR Cryptol. ePrint Arch., 2013

Side channel modeling attacks on 65nm arbiter PUFs exploiting CMOS device noise.
Proceedings of the 2013 IEEE International Symposium on Hardware-Oriented Security and Trust, 2013

2012
A Speed Area Optimized Embedded Co-processor for McEliece Cryptosystem.
Proceedings of the 23rd IEEE International Conference on Application-Specific Systems, 2012


  Loading...