Follow
Jeroen Delvaux
Jeroen Delvaux
Unknown affiliation
Verified email at tii.ae
Title
Cited by
Cited by
Year
Helper data algorithms for PUF-based key generation: Overview and analysis
J Delvaux, D Gu, D Schellekens, I Verbauwhede
IEEE Transactions on Computer-Aided Design of Integrated Circuits and …, 2014
2622014
A survey on lightweight entity authentication with strong PUFs
J Delvaux, R Peeters, D Gu, I Verbauwhede
ACM Computing Surveys (CSUR) 48 (2), 1-42, 2015
1962015
Side channel modeling attacks on 65nm arbiter PUFs exploiting CMOS device noise
J Delvaux, I Verbauwhede
2013 IEEE International Symposium on Hardware-Oriented Security and Trust …, 2013
1912013
A lockdown technique to prevent machine learning on PUFs for lightweight authentication
MD Yu, M Hiller, J Delvaux, R Sowell, S Devadas, I Verbauwhede
IEEE Transactions on Multi-Scale Computing Systems 2 (3), 146-159, 2016
1652016
Fault injection modeling attacks on 65 nm arbiter and RO sum PUFs via environmental changes
J Delvaux, I Verbauwhede
IEEE Transactions on Circuits and Systems I: Regular Papers 61 (6), 1701-1713, 2014
1332014
Machine-Learning Attacks on PolyPUFs, OB-PUFs, RPUFs, LHS-PUFs, and PUF–FSMs
J Delvaux
IEEE Transactions on Information Forensics and Security 14 (8), 2043-2058, 2019
1192019
Efficient fuzzy extraction of PUF-induced secrets: Theory and applications
J Delvaux, D Gu, I Verbauwhede, M Hiller, MDM Yu
International Conference on Cryptographic Hardware and Embedded Systems, 412-431, 2016
862016
Key-recovery attacks on various RO PUF constructions via helper data manipulation
J Delvaux, I Verbauwhede
2014 Design, Automation & Test in Europe Conference & Exhibition (DATE), 1-6, 2014
852014
Secure lightweight entity authentication with strong PUFs: Mission impossible?
J Delvaux, D Gu, D Schellekens, I Verbauwhede
International Workshop on Cryptographic Hardware and Embedded Systems, 451-475, 2014
762014
Attacking PUF-based pattern matching key generators via helper data manipulation
J Delvaux, I Verbauwhede
Cryptographers’ Track at the RSA Conference, 106-131, 2014
602014
Security Analysis of PUF-Based Key Generation and Entity Authentication
J Delvaux
KU Leuven and Shanghai Jiao Tong University, 2017
572017
IoT: Source of test challenges
EJ Marinissen, Y Zorian, M Konijnenburg, CT Huang, PH Hsieh, ...
2016 21th IEEE European test symposium (ETS), 1-10, 2016
352016
A speed area optimized embedded co-processor for McEliece cryptosystem
S Ghosh, J Delvaux, L Uhsadel, I Verbauwhede
2012 IEEE 23rd International Conference on Application-Specific Systems …, 2012
322012
Upper bounds on the min-entropy of RO Sum, arbiter, feed-forward arbiter, and S-ArbRO PUFs
J Delvaux, D Gu, I Verbauwhede
2016 IEEE Asian Hardware-Oriented Security and Trust (AsianHOST), 1-6, 2016
122016
Refutation and redesign of a physical model of tero-based trngs and pufs
J Delvaux
Cryptology ePrint Archive, 2019
72019
A privacy-preserving device tracking system using a low-power wide-area network
T Ashur, J Delvaux, S Lee, P Maene, E Marin, S Nikova, O Reparaz, ...
International Conference on Cryptology and Network Security, 347-369, 2017
52017
Threshold implementations are not provably secure against fault sensitivity analysis
J Delvaux
Cryptology ePrint Archive, 2020
32020
Roulette: A Diverse Family of Feasible Fault Attacks on Masked Kyber
J Delvaux
IACR Transactions on Cryptographic Hardware and Embedded Systems, 637-660, 2022
1*2022
Machine Learning Attacks on PolyPUF, OBPUF, RPUF, and PUF–FSM
J Delvaux
1
On The Deployment of Tweak-in-Plaintext Protection Against Differential Fault Analysis
J Delvaux
2020
The system can't perform the operation now. Try again later.
Articles 1–20