


default search action
Boris Skoric
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [i64]Nick Aquina, Bruno Cimoli, Soumya Das, Kathrin Hövelmanns, Fiona Johanna Weber, Chigo Okonkwo, Simon Rommel, Boris Skoric, Idelfonso Tafur Monroy, Sebastian R. Verschoor:
A Critical Analysis of Deployed Use Cases for Quantum Key Distribution and Comparison with Post-Quantum Cryptography. CoRR abs/2502.04009 (2025) - [i63]Arpan Akash Ray, Boris Skoric:
Unclonable Encryption with Continuous Variables. CoRR abs/2503.02648 (2025) - [i62]Basheer Joudeh, Boris Skoric:
Numerical evaluation of Gaussian mixture entropy. CoRR abs/2503.14047 (2025) - [i61]Nick Aquina, Bruno Cimoli, Soumya Das, Kathrin Hövelmanns, Fiona Johanna Weber, Chigo Okonkwo, Simon Rommel, Boris Skoric, Idelfonso Tafur Monroy, Sebastian R. Verschoor:
A Critical Analysis of Deployed Use Cases for Quantum Key Distribution and Comparison with Post-Quantum Cryptography. IACR Cryptol. ePrint Arch. 2025: 173 (2025) - 2024
- [j34]Basheer Joudeh
, Boris Skoric
:
Average Entropy of Gaussian Mixtures. Entropy 26(8): 659 (2024) - [j33]Mehmet Hüseyin Temel
, Boris Skoric:
Entropically secure encryption with faster key expansion. Quantum Inf. Process. 23(4): 119 (2024) - [c33]João dos Reis Frazão, Vincent van Vliet, Sjoerd van der Heide, Menno van den Hout, Kadir Gümüs, Aaron Albores-Mejia, Boris Skoric, Chigo Okonkwo:
Co-propagation of Classical and Continuous-variable QKD Signals over a Turbulent Optical Channel with a Real-time QKD Receiver. OFC 2024: 1-3 - [i60]Arpan Akash Ray
, Boris Skoric:
Continuous-Variable QKD with key rates far above Devetak-Winter. CoRR abs/2402.04770 (2024) - [i59]Basheer Joudeh, Boris Skoric:
Average entropy of Gaussian mixtures. CoRR abs/2404.07311 (2024) - [i58]Mehmet Hüseyin Temel
, Boris Skoric, Idelfonso Tafur Monroy
:
Implementation of Entropically Secure Encryption: Securing Personal Health Data. CoRR abs/2404.16857 (2024) - 2023
- [j32]Kaan Akyuz, Boris Skoric:
A simpler security proof for 6-state quantum key distribution. Quantum Inf. Comput. 23(11&12): 949-960 (2023) - 2022
- [c32]Basheer Joudeh, Boris Skoric:
Collusion-resistant Fingerprinting of Parallel Content Channels. IH&MMSec 2022: 81-89 - [c31]Milan Lopuhaä-Zwakenberg
, Boris Skoric, Ninghui Li:
Fisher Information as a Utility Metric for Frequency Estimation under Local Differential Privacy. WPES@CCS 2022: 41-53 - [i57]Basheer Joudeh, Boris Skoric:
Collusion-resistant fingerprinting of parallel content channels. CoRR abs/2204.08575 (2022) - [i56]E. Marakis, U. Rührmair, M. Lachner, R. Uppu, Boris Skoric, Pepijn W. H. Pinkse:
Clones of the Unclonable: Nanoduplicating Optical PUFs and Applications. CoRR abs/2212.12495 (2022) - 2021
- [j31]Daan Leermakers, Boris Skoric:
Quantum Alice and Silent Bob: Qubit-Based Quantum Key Recycling With Almost No Classical Communication. Quantum Inf. Comput. 21(1&2): 1-18 (2021) - [j30]Daan Leermakers, Boris Skoric:
Qubit-based unclonable encryption with key recycling. Quantum Inf. Comput. 21(11&12): 901-930 (2021) - [j29]Boris Skoric:
Quantum digital signatures with smaller public keys. Quantum Inf. Comput. 21(11&12): 955-973 (2021) - [i55]Boris Skoric, Zef Wolffs:
Diagrammatic security proof for 8-state encoding. CoRR abs/2103.01936 (2021) - 2020
- [c30]Tianhao Wang
, Milan Lopuhaä-Zwakenberg, Zitao Li, Boris Skoric, Ninghui Li:
Locally Differentially Private Frequency Estimation with Consistency. NDSS 2020 - [c29]Zitao Li, Tianhao Wang
, Milan Lopuhaä-Zwakenberg
, Ninghui Li, Boris Skoric:
Estimating Numerical Distributions under Local Differential Privacy. SIGMOD Conference 2020: 621-635 - [c28]Milan Lopuhaä-Zwakenberg
, Zitao Li, Boris Skoric, Ninghui Li:
Improving Frequency Estimation under Local Differential Privacy. WPES@CCS 2020: 123-135 - [i54]Boris Skoric, Wil Michiels:
The Blob: provable incompressibility and traceability in the whitebox model. CoRR abs/2004.04457 (2020) - [i53]Milan Lopuhaä-Zwakenberg, Haochen Tong, Boris Skoric:
Data Sanitisation Protocols for the Privacy Funnel with Differential Privacy Guarantees. CoRR abs/2008.13151 (2020) - [i52]Daan Leermakers, Boris Skoric:
Qubit-based Unclonable Encryption with Key Recycling. IACR Cryptol. ePrint Arch. 2020: 172 (2020)
2010 – 2019
- 2019
- [j28]Taras Stanko, Bin Chen
, Boris Skoric
:
Fingerprint template protection using minutia-pair spectral representations. EURASIP J. Inf. Secur. 2019: 12 (2019) - [j27]Daan Leermakers, Boris Skoric:
Security proof for quantum key recycling with noise. Quantum Inf. Comput. 19(11&12): 913-934 (2019) - [j26]André Schaller, Wenjie Xiong
, Nikolaos Athanasios Anagnostopoulos
, Muhammad Umair Saleem, Sebastian Gabmeyer, Boris Skoric
, Stefan Katzenbeisser, Jakub Szefer
:
Decay-Based DRAM PUFs in Commodity Devices. IEEE Trans. Dependable Secur. Comput. 16(3): 462-475 (2019) - [c27]Behrooz Razeghi
, Taras Stanko, Boris Skoric, Slava Voloshynovskiy
:
Single-Component Privacy Guarantees in Helper Data Systems and Sparse Coding with Ambiguation. WIFS 2019: 1-6 - [i51]Tianhao Wang, Zitao Li, Ninghui Li, Milan Lopuhaä-Zwakenberg, Boris Skoric:
Consistent and Accurate Frequency Oracles under Local Differential Privacy. CoRR abs/1905.08320 (2019) - [i50]Behrooz Razeghi, Taras Stanko, Boris Skoric, Slava Voloshynovskiy:
Single-Component Privacy Guarantees in Helper Data Systems and Sparse Coding. CoRR abs/1907.06388 (2019) - [i49]Milan Lopuhaä-Zwakenberg, Boris Skoric, Ninghui Li:
Information-theoretic metrics for Local Differential Privacy protocols. CoRR abs/1910.07826 (2019) - [i48]Milan Lopuhaä-Zwakenberg, Zitao Li, Boris Skoric, Ninghui Li:
Four accuracy bounds and one estimator for frequency estimation under local differential privacy. CoRR abs/1911.10499 (2019) - [i47]Zitao Li, Tianhao Wang, Milan Lopuhaä-Zwakenberg, Boris Skoric, Ninghui Li:
Estimating Numerical Distributions under Local Differential Privacy. CoRR abs/1912.01051 (2019) - [i46]Daan Leermakers, Boris Skoric:
Quantum Alice and Silent Bob: Qubit-based Quantum Key Recycling with almost no classical communication. IACR Cryptol. ePrint Arch. 2019: 875 (2019) - 2018
- [j25]Boris Skoric
:
A trivial debiasing scheme for Helper Data Systems. J. Cryptogr. Eng. 8(4): 341-349 (2018) - [j24]Daan Leermakers, Boris Skoric
:
Optimal attacks on qubit-based Quantum Key Recycling. Quantum Inf. Process. 17(3): 57 (2018) - [j23]Daan Leermakers, Boris Skoric
:
Security proof for round-robin differential phase shift QKD. Quantum Inf. Process. 17(10): 250 (2018) - [j22]André Schaller
, Taras Stanko, Boris Skoric
, Stefan Katzenbeisser:
Eliminating Leakage in Reverse Fuzzy Extractors. IEEE Trans. Inf. Forensics Secur. 13(4): 954-964 (2018) - [i45]Taras Stanko, Bin Chen
, Boris Skoric:
Fingerprint template protection using minutia-pair spectral representations. CoRR abs/1804.01744 (2018) - [i44]Daan Leermakers, Boris Skoric:
Security proof for Quantum Key Recycling with noise. IACR Cryptol. ePrint Arch. 2018: 264 (2018) - 2017
- [j21]Boris Skoric
, Pepijn W. H. Pinkse, Allard P. Mosk:
Authenticated communication from quantum readout of PUFs. Quantum Inf. Process. 16(8): 200 (2017) - [j20]Taras Stanko, Fitria Nur Andini, Boris Skoric
:
Optimized Quantization in Zero Leakage Helper Data Systems. IEEE Trans. Inf. Forensics Secur. 12(8): 1957-1966 (2017) - [c26]Taras Stanko, Boris Skoric:
Minutia-pair spectral representations for fingerprint template protection. WIFS 2017: 1-6 - [i43]Taras Stanko, Boris Skoric:
Minutia-pair spectral representations for fingerprint template protection. CoRR abs/1703.06811 (2017) - [i42]Boris Skoric:
A short note on the security of Round-Robin Differential Phase-Shift QKD. IACR Cryptol. ePrint Arch. 2017: 52 (2017) - [i41]Daan Leermakers, Boris Skoric:
Optimal attacks on qubit-based Quantum Key Recycling. IACR Cryptol. ePrint Arch. 2017: 331 (2017) - [i40]Daan Leermakers, Boris Skoric:
Security proof for Round Robin Differential Phase Shift QKD. IACR Cryptol. ePrint Arch. 2017: 830 (2017) - 2016
- [j19]Joep A. de Groot, Boris Skoric, Niels de Vreede, Jean-Paul M. G. Linnartz
:
Quantization in zero leakage helper data schemes. EURASIP J. Adv. Signal Process. 2016: 54 (2016) - [j18]Boris Skoric, Sebastiaan J. A. de Hoogh, Nicola Zannone
:
Flow-based reputation with uncertainty: evidence-based subjective logic. Int. J. Inf. Sec. 15(4): 381-402 (2016) - [j17]Boris Skoric:
Security analysis of Quantum-Readout PUFs in the case of challenge-estimation attacks. Quantum Inf. Comput. 16(1&2): 50-60 (2016) - [i39]Boris Skoric:
A trivial debiasing scheme for Helper Data Systems. IACR Cryptol. ePrint Arch. 2016: 241 (2016) - [i38]Taras Stanko, Fitria Nur Andini, Boris Skoric:
Optimized quantization in Zero Leakage Helper Data Systems. IACR Cryptol. ePrint Arch. 2016: 325 (2016) - [i37]Boris Skoric, Pepijn W. H. Pinkse, Allard P. Mosk:
Authenticated communication from Quantum Readout of PUFs. IACR Cryptol. ePrint Arch. 2016: 971 (2016) - [i36]Boris Skoric, Manon de Vries:
Quantum Key Recycling with eight-state encoding (The Quantum One Time Pad is more interesting than we thought). IACR Cryptol. ePrint Arch. 2016: 1122 (2016) - 2015
- [j16]Boris Skoric, Jan-Jaap Oosterwijk:
Binary and q-ary Tardos codes, revisited. Des. Codes Cryptogr. 74(1): 75-111 (2015) - [j15]Antonino Simone, Boris Skoric:
False Negative probabilities in Tardos codes. Des. Codes Cryptogr. 74(1): 159-182 (2015) - [j14]Antonino Simone, Boris Skoric:
False positive probabilities in q-ary Tardos codes: comparison of attacks. Des. Codes Cryptogr. 75(3): 519-542 (2015) - [j13]Boris Skoric:
Tally-Based Simple Decoders for Traitor Tracing and Group Testing. IEEE Trans. Inf. Forensics Secur. 10(6): 1221-1233 (2015) - [j12]Jan-Jaap Oosterwijk, Boris Skoric, Jeroen Doumen:
A Capacity-Achieving Simple Decoder for Bias-Based Traitor Tracing Schemes. IEEE Trans. Inf. Theory 61(7): 3882-3900 (2015) - [c25]André Schaller, Boris Skoric, Stefan Katzenbeisser:
On the Systematic Drift of Physically Unclonable Functions Due to Aging. TrustED@CCS 2015: 15-20 - [c24]Boris Skoric, Wouter de Groot:
Generalised tally-based decoders for traitor tracing and group testing. WIFS 2015: 1-6 - [i35]Boris Skoric, Wouter de Groot:
Generalised tally-based decoders for traitor tracing and group testing. IACR Cryptol. ePrint Arch. 2015: 617 (2015) - 2014
- [j11]Boris Skoric, Niels de Vreede:
The Spammed Code Offset Method. IEEE Trans. Inf. Forensics Secur. 9(5): 875-884 (2014) - [i34]Boris Skoric, Sebastiaan de Hoogh, Nicola Zannone:
Flow-based reputation with uncertainty: Evidence-Based Subjective Logic. CoRR abs/1402.3319 (2014) - [i33]André Schaller, Boris Skoric, Stefan Katzenbeisser:
Eliminating Leakage in Reverse Fuzzy Extractors. IACR Cryptol. ePrint Arch. 2014: 741 (2014) - [i32]Boris Skoric:
Simple-looking joint decoders for traitor tracing and group testing. IACR Cryptol. ePrint Arch. 2014: 781 (2014) - 2013
- [j10]Thijs Laarhoven
, Jeroen Doumen, Peter Roelse, Boris Skoric, Benne de Weger:
Dynamic Tardos Traitor Tracing Schemes. IEEE Trans. Inf. Theory 59(7): 4230-4242 (2013) - [c23]Robbert van den Berg, Boris Skoric, Vincent van der Leest:
Bias-based modeling and entropy analysis of PUFs. TrustED@CCS 2013: 13-20 - [c22]Jan-Jaap Oosterwijk, Boris Skoric, Jeroen Doumen:
Optimal suspicion functions for tardos traitor tracing schemes. IH&MMSec 2013: 19-28 - [c21]Joep A. de Groot, Boris Skoric, Niels de Vreede, Jean-Paul M. G. Linnartz:
Diagnostic Category Leakage in Helper Data Schemes for Biometric Authentication. SECRYPT 2013: 506-511 - [c20]Boris Skoric, Jan-Jaap Oosterwijk, Jeroen Doumen:
The holey grail A special score function for non-binary traitor tracing. WIFS 2013: 180-185 - [i31]Boris Skoric, Allard P. Mosk, Pepijn W. H. Pinkse:
Security of Quantum-Readout PUFs against quadrature based challenge estimation attacks. IACR Cryptol. ePrint Arch. 2013: 84 (2013) - [i30]Jan-Jaap Oosterwijk, Boris Skoric, Jeroen Doumen:
Optimal Suspicion Functions for Tardos Traitor Tracing Schemes. IACR Cryptol. ePrint Arch. 2013: 154 (2013) - [i29]Jan-Jaap Oosterwijk, Boris Skoric, Jeroen Doumen:
A Capacity-Achieving Simple Decoder for Bias-Based Traitor Tracing Schemes. IACR Cryptol. ePrint Arch. 2013: 389 (2013) - [i28]Boris Skoric, Jan-Jaap Oosterwijk, Jeroen Doumen:
The Holey Grail: A special score function for non-binary traitor tracing. IACR Cryptol. ePrint Arch. 2013: 420 (2013) - [i27]Boris Skoric:
Security analysis of Quantum-Readout PUFs in the case of generic challenge-estimation attacks. IACR Cryptol. ePrint Arch. 2013: 479 (2013) - [i26]Boris Skoric, Niels de Vreede:
The Spammed Code Offset Method. IACR Cryptol. ePrint Arch. 2013: 527 (2013) - [i25]Robbert van den Berg, Boris Skoric, Vincent van der Leest:
Bias-based modeling and entropy analysis of PUFs. IACR Cryptol. ePrint Arch. 2013: 656 (2013) - [i24]Sarah Ibrahimi, Boris Skoric, Jan-Jaap Oosterwijk:
Riding the Saddle Point: asymptotics of the capacity-achieving simple decoder for bias-based traitor tracing. IACR Cryptol. ePrint Arch. 2013: 809 (2013) - 2012
- [j9]Antonino Simone, Boris Skoric:
Accusation probabilities in Tardos codes: beyond the Gaussian approximation. Des. Codes Cryptogr. 63(3): 379-412 (2012) - [j8]Antonino Simone, Boris Skoric, Nicola Zannone
:
Flow-Based Reputation: More than Just Ranking. Int. J. Inf. Technol. Decis. Mak. 11(3): 551-578 (2012) - [c19]Aanjhan Ranganathan
, Nils Ole Tippenhauer
, Boris Skoric, Dave Singelée
, Srdjan Capkun:
Design and Implementation of a Terrorist Fraud Resilient Distance Bounding System. ESORICS 2012: 415-432 - [c18]Dion Boesten, Boris Skoric:
Asymptotic Fingerprinting Capacity in the Combined Digit Model. Information Hiding 2012: 255-268 - [i23]Antonino Simone, Boris Skoric, Nicola Zannone:
Flow-based reputation: more than just ranking. CoRR abs/1203.1820 (2012) - [i22]Dion Boesten, Boris Skoric:
Asymptotic fingerprinting capacity in the Combined Digit Model. IACR Cryptol. ePrint Arch. 2012: 184 (2012) - [i21]Boris Skoric, Jan-Jaap Oosterwijk:
Binary and q-ary Tardos codes, revisited. IACR Cryptol. ePrint Arch. 2012: 249 (2012) - [i20]Antonino Simone, Boris Skoric:
False Positive probabilities in q-ary Tardos codes: comparison of attacks. IACR Cryptol. ePrint Arch. 2012: 522 (2012) - [i19]Joep A. de Groot, Boris Skoric, Niels de Vreede, Jean-Paul M. G. Linnartz:
Information Leakage of Continuous-Source Zero Secrecy Leakage Helper Data Schemes. IACR Cryptol. ePrint Arch. 2012: 566 (2012) - [i18]Antonino Simone, Boris Skoric:
False Negative probabilities in Tardos codes. IACR Cryptol. ePrint Arch. 2012: 667 (2012) - 2011
- [j7]Boris Skoric, Chibuzo Obi, Evgeny A. Verbitskiy
, Berry Schoenmakers:
Sharp lower bounds on the extractable randomness from non-uniform sources. Inf. Comput. 209(8): 1184-1196 (2011) - [j6]Boris Skoric, Stefan Katzenbeisser, Hans Georg Schaathun, Mehmet Utku Celik
:
Tardos Fingerprinting Codes in the Combined Digit Model. IEEE Trans. Inf. Forensics Secur. 6(3-2): 906-919 (2011) - [c17]Dion Boesten, Boris Skoric:
Asymptotic Fingerprinting Capacity for Non-binary Alphabets. Information Hiding 2011: 1-13 - [c16]Antonino Simone, Boris Skoric:
Asymptotically False-Positive-Maximizing Attack on Non-binary Tardos Codes. Information Hiding 2011: 14-27 - [i17]Dion Boesten, Boris Skoric:
Asymptotic fingerprinting capacity for non-binary alphabets. CoRR abs/1102.0445 (2011) - [i16]Antonino Simone, Boris Skoric:
Asymptotically false-positive-maximizing attack on non-binary Tardos codes. CoRR abs/1102.0451 (2011) - [i15]Thijs Laarhoven
, Jeroen Doumen, Peter Roelse, Boris Skoric, Benne de Weger:
Dynamic Tardos Traitor Tracing Schemes. CoRR abs/1111.3597 (2011) - 2010
- [j5]Boris Skoric, Marc X. Makkes
:
Flowchart description of security primitives for controlled physical unclonable functions. Int. J. Inf. Sec. 9(5): 327-335 (2010) - [j4]Evgeny A. Verbitskiy
, Pim Tuyls, Chibuzo Obi, Berry Schoenmakers, Boris Skoric:
Key extraction from general nondiscrete signals. IEEE Trans. Inf. Forensics Secur. 5(2): 269-279 (2010) - [c15]Boris Skoric:
Quantum Readout of Physical Unclonable Functions. AFRICACRYPT 2010: 369-386 - [c14]Boris Skoric:
Security with Noisy Data - (Extended Abstract of Invited Talk). Information Hiding 2010: 48-50 - [i14]Antonino Simone, Boris Skoric:
Accusation probabilities in Tardos codes: the Gaussian approximation is better than we thought. IACR Cryptol. ePrint Arch. 2010: 472 (2010)
2000 – 2009
- 2009
- [j3]Jorge Guajardo, Boris Skoric, Pim Tuyls, Sandeep S. Kumar, Thijs Bel, Antoon H. M. Blom, Geert Jan Schrijen
:
Anti-counterfeiting, key distribution, and key storage in an ambient world via physical unclonable functions. Inf. Syst. Frontiers 11(1): 19-41 (2009) - [c13]Klaus Kursawe, Ahmad-Reza Sadeghi, Dries Schellekens, Boris Skoric, Pim Tuyls:
Reconfigurable Physical Unclonable Functions -- Enabling Technology for Tamper-Resistant Storage. HOST 2009: 22-29 - [c12]Sebastiaan de Hoogh, Berry Schoenmakers, Boris Skoric, José Villegas:
Verifiable Rotation of Homomorphic Encryptions. Public Key Cryptography 2009: 393-410 - [c11]Boris Skoric, Stefan Katzenbeisser, Hans Georg Schaathun, Mehmet Utku Celik
:
Tardos fingerprinting codes in the combined digit model. WIFS 2009: 41-45 - [i13]Boris Skoric, Marc X. Makkes:
Simplification of Controlled PUF primitives. Foundations for Forgery-Resilient Cryptographic Hardware 2009 - [i12]Boris Skoric, Pim Tuyls:
An efficient fuzzy extractor for limited noise. Foundations for Forgery-Resilient Cryptographic Hardware 2009 - [i11]Boris Skoric, Pim Tuyls:
An efficient fuzzy extractor for limited noise. IACR Cryptol. ePrint Arch. 2009: 30 (2009) - [i10]Boris Skoric, Stefan Katzenbeisser, Hans Georg Schaathun, Mehmet Utku Celik:
Tardos Fingerprinting Codes in the Combined Digit Model. IACR Cryptol. ePrint Arch. 2009: 244 (2009) - [i9]Evgeny A. Verbitskiy, Pim Tuyls, Chibuzo Obi, Berry Schoenmakers, Boris Skoric:
Key extraction from general non-discrete signals. IACR Cryptol. ePrint Arch. 2009: 303 (2009) - [i8]Boris Skoric, Marc X. Makkes:
Flowchart description of security primitives for Controlled Physical Unclonable Functions. IACR Cryptol. ePrint Arch. 2009: 328 (2009) - [i7]Boris Skoric:
Quantum readout of Physical Unclonable Functions: Remote authentication without trusted readers and authenticated Quantum Key Exchange without initial shared secrets. IACR Cryptol. ePrint Arch. 2009: 369 (2009) - 2008
- [j2]Boris Skoric, Stefan Katzenbeisser, Mehmet Utku Celik
:
Symmetric Tardos fingerprinting codes for arbitrary alphabet sizes. Des. Codes Cryptogr. 46(2): 137-166 (2008) - [j1]Boris Skoric, T. U. Vladimirova, Mehmet Utku Celik
, Joop Talstra:
Tardos Fingerprinting is Better Than We Thought. IEEE Trans. Inf. Theory 54(8): 3663-3676 (2008) - [i6]Boris Skoric:
Steganography from weak cryptography. CoRR abs/0804.0659 (2008) - [i5]Boris Skoric, Chibuzo Obi, Evgeny A. Verbitskiy, Berry Schoenmakers:
Sharp lower bounds on the extractable randomness from non-uniform sources. IACR Cryptol. ePrint Arch. 2008: 484 (2008) - 2007
- [c10]Neil Bird, Claudine Conrado, Jorge Guajardo, Stefan Maubach, Geert Jan Schrijen
, Boris Skoric, Anton M. H. Tombeur, Peter Thueringer, Pim Tuyls:
ALGSICS - Combining Physics and Cryptography to Enhance Security and Privacy in RFID Systems. ESAS 2007: 187-202 - [c9]Stefan Katzenbeisser, Boris Skoric, Mehmet Utku Celik
, Ahmad-Reza Sadeghi:
Combining Tardos Fingerprinting Codes and Fingercasting. Information Hiding 2007: 294-310 - [p1]Pim Tuyls, Boris Skoric:
Strong Authentication with Physical Unclonable Functions. Security, Privacy, and Trust in Modern Data Management 2007: 133-148 - [i4]Boris Skoric:
The entropy of keys derived from laser speckle. CoRR abs/0710.5002 (2007) - [i3]Boris Skoric, Stefan Katzenbeisser, Mehmet Utku Celik:
Symmetric Tardos fingerprinting codes for arbitrary alphabet sizes. IACR Cryptol. ePrint Arch. 2007: 41 (2007) - 2006
- [c8]Guofei Gu, Prahlad Fogla, David Dagon, Wenke Lee, Boris Skoric:
Measuring intrusion detection capability: an information-theoretic approach. AsiaCCS 2006: 90-101 - [c7]Pim Tuyls, Geert Jan Schrijen
, Boris Skoric, Jan van Geloven, Nynke Verhaegh, Rob Wolters:
Read-Proof Hardware from Protective Coatings. CHES 2006: 369-383 - [c6]Guofei Gu, Prahlad Fogla, David Dagon, Wenke Lee, Boris Skoric:
Towards an Information-Theoretic Framework for Analyzing Intrusion Detection Systems. ESORICS 2006: 527-546 - [c5]Tanya Ignatenko, Geert Jan Schrijen
, Boris Skoric, Pim Tuyls, Frans M. J. Willems:
Estimating the Secrecy-Rate of Physical Unclonable Functions with the Context-Tree Weighting Method. ISIT 2006: 499-503 - [c4]Pim Tuyls, Boris Skoric:
Physical Unclonable Functions for enhanced security of tokens and tags. ISSE 2006: 30-37 - [i2]Boris Skoric, T. U. Vladimirova, Mehmet Utku Celik, Joop Talstra:
Tardos fingerprinting is better than we thought. CoRR abs/cs/0607131 (2006) - [i1]Boris Skoric, Stefan Maubach, Tom A. M. Kevenaar, Pim Tuyls:
Information-theoretic analysis of coating PUFs. IACR Cryptol. ePrint Arch. 2006: 101 (2006) - 2005
- [c3]Boris Skoric, Pim Tuyls, W. Ophey:
Robust Key Extraction from Physical Uncloneable Functions. ACNS 2005: 407-422 - [c2]Pim Tuyls, Boris Skoric, S. Stallinga, Anton H. M. Akkermans, W. Ophey:
Information-Theoretic Security Analysis of Physical Uncloneable Functions. Financial Cryptography 2005: 141-155 - 2004
- [c1]Pim Tuyls, Boris Skoric, S. Stallinga, Ton H. Akkermans, W. Ophey:
An information theoretic model for physical uncloneable functions. ISIT 2004: 141
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-04-22 22:11 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint