Roel Maes

According to our database1, Roel Maes authored at least 33 papers between 2008 and 2017.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2017
High-Rate Error Correction Schemes for SRAM-PUFs based on Polar Codes.
CoRR, 2017

Security of helper data schemes for SRAM-PUF in multiple enrollment scenarios.
Proceedings of the 2017 IEEE International Symposium on Information Theory, 2017

A Robust SRAM-PUF Key Generation Scheme Based on Polar Codes.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

2016
Secure key generation from biased PUFs: extended version.
J. Cryptographic Engineering, 2016

2015
Intelligent Voltage Ramp-Up Time Adaptation for Temperature Noise Reduction on Memory-Based PUF Systems.
IEEE Trans. on CAD of Integrated Circuits and Systems, 2015

Secure Key Generation from Biased PUFs.
IACR Cryptology ePrint Archive, 2015

Secure Key Generation from Biased PUFs.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2015, 2015

2014
Hardware Intrinsic Security to Protect Value in the Mobile Market.
Proceedings of the ISSE 2014, 2014

Countering the effects of silicon aging on SRAM PUFs.
Proceedings of the 2014 IEEE International Symposium on Hardware-Oriented Security and Trust, 2014

2013
An Accurate Probabilistic Reliability Model for Silicon PUFs.
IACR Cryptology ePrint Archive, 2013

Adapting voltage ramp-up time for temperature noise reduction on memory-based PUFs.
Proceedings of the 2013 IEEE International Symposium on Hardware-Oriented Security and Trust, 2013

An Accurate Probabilistic Reliability Model for Silicon PUFs.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2013, 2013

Physically Unclonable Functions - Constructions, Properties and Applications.
Springer, ISBN: 978-3-642-41394-0, 2013

2012
Physically Unclonable Functions: Constructions, Properties and Applications (Fysisch onkloonbare functies: constructies, eigenschappen en toepassingen).
PhD thesis, 2012

A Pay-per-Use Licensing Scheme for Hardware IP Cores in Recent SRAM-Based FPGAs.
IEEE Trans. Information Forensics and Security, 2012

A practical device authentication scheme using SRAM PUFs.
J. Cryptographic Engineering, 2012

Machine learning attacks on 65nm Arbiter PUFs: Accurate modeling poses strict bounds on usability.
Proceedings of the 2012 IEEE International Workshop on Information Forensics and Security, 2012

Performance and Security Evaluation of AES S-Box-Based Glitch PUFs on FPGAs.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2012

Reverse Fuzzy Extractors: Enabling Lightweight Mutual Authentication for PUF-Enabled RFIDs.
Proceedings of the Financial Cryptography and Data Security, 2012

Experimental evaluation of Physically Unclonable Functions in 65 nm CMOS.
Proceedings of the 38th European Solid-State Circuit conference, 2012

PUFKY: A Fully Functional PUF-Based Cryptographic Key Generator.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2012, 2012

2011
A Formalization of the Security Features of Physical Functions.
Proceedings of the 32nd IEEE Symposium on Security and Privacy, 2011

Evaluation of a PUF Device Authentication Scheme on a Discrete 0.13um SRAM.
Proceedings of the Trusted Systems - Third International Conference, 2011

Physically unclonable functions: manufacturing variability as an unclonable device identifier.
Proceedings of the 21st ACM Great Lakes Symposium on VLSI 2010, 2011

2010
Physically Unclonable Functions: A Study on the State of the Art and Future Research Directions.
Proceedings of the Towards Hardware-Intrinsic Security - Foundations and Practice, 2010

Process Variations for Security: PUFs.
Proceedings of the Secure Integrated Circuits and Systems, 2010

Signal Processing for Cryptography and Security Applications.
Proceedings of the Handbook of Signal Processing Systems, 2010

2009
A soft decision helper data algorithm for SRAM PUFs.
Proceedings of the IEEE International Symposium on Information Theory, 2009

FPGA-based testing strategy for cryptographic chips: A case study on Elliptic Curve Processor for RFID tags.
Proceedings of the 15th IEEE International On-Line Testing Symposium (IOLTS 2009), 2009

Analysis and Design of Active IC Metering Schemes.
Proceedings of the IEEE International Workshop on Hardware-Oriented Security and Trust, 2009

Low-Overhead Implementation of a Soft Decision Helper Data Algorithm for SRAM PUFs.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2009

Memory Leakage-Resilient Encryption Based on Physically Unclonable Functions.
Proceedings of the Advances in Cryptology, 2009

2008
The Butterfly PUF: Protecting IP on every FPGA.
Proceedings of the IEEE International Workshop on Hardware-Oriented Security and Trust, 2008


  Loading...