Geert Jan Schrijen
Orcid: 0000-0003-3492-2655
According to our database1,
Geert Jan Schrijen
authored at least 34 papers
between 2003 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
2023
Modeling and Analysis of SRAM PUF Bias Patterns in 14nm and 7nm FinFET Technology Nodes.
Proceedings of the 31st IFIP/IEEE International Conference on Very Large Scale Integration, 2023
2022
Reliability Analysis of FinFET-Based SRAM PUFs for 16nm, 14nm, and 7nm Technology Nodes.
Proceedings of the 2022 Design, Automation & Test in Europe Conference & Exhibition, 2022
2020
Proceedings of the IEEE European Test Symposium, 2020
RESCUE: Interdependent Challenges of Reliability, Security and Quality in Nanoelectronic Systems.
Proceedings of the 2020 Design, Automation & Test in Europe Conference & Exhibition, 2020
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020
2015
Intelligent Voltage Ramp-Up Time Adaptation for Temperature Noise Reduction on Memory-Based PUF Systems.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2015
2014
Proceedings of the ISSE 2014, 2014
2013
Proceedings of the 2013 IEEE International Symposium on Hardware-Oriented Security and Trust, 2013
2012
Proceedings of the 2012 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems, 2012
Proceedings of the 2012 Design, Automation & Test in Europe Conference & Exhibition, 2012
Proceedings of the Cryptography and Security: From Theory to Applications, 2012
2011
Evaluation of 90nm 6T-SRAM as Physical Unclonable Function for secure key generation in wireless sensor nodes.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2011), 2011
2010
Proceedings of the Towards Hardware-Intrinsic Security - Foundations and Practice, 2010
Proceedings of the fifth ACM workshop on Scalable trusted computing, 2010
2009
Anti-counterfeiting, key distribution, and key storage in an ambient world via physical unclonable functions.
Inf. Syst. Frontiers, 2009
2008
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2008), 2008
Proceedings of the IEEE International Workshop on Hardware-Oriented Security and Trust, 2008
2007
Proceedings of the ISSE/SECURE 2007, 2007
Proceedings of the FPL 2007, 2007
ALGSICS - Combining Physics and Cryptography to Enhance Security and Privacy in RFID Systems.
Proceedings of the Security and Privacy in Ad-hoc and Sensor Networks, 2007
Proceedings of the Cryptographic Hardware and Embedded Systems, 2007
Proceedings of the Security, Privacy, and Trust in Modern Data Management, 2007
2006
Improved constructions of secret sharing schemes by applying (lambda, omega)-decompositions.
Inf. Process. Lett., 2006
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VIII, 2006
Proceedings of the ISSE 2006, 2006
Estimating the Secrecy-Rate of Physical Unclonable Functions with the Context-Tree Weighting Method.
Proceedings of the Proceedings 2006 IEEE International Symposium on Information Theory, 2006
Proceedings of the Cryptographic Hardware and Embedded Systems, 2006
2005
Proceedings of the Audio- and Video-Based Biometric Person Authentication, 2005
Proceedings of the Fourth IEEE Workshop on Automatic Identification Advanced Technologies (AutoID 2005), 2005
2003
IACR Cryptol. ePrint Arch., 2003
Proceedings of the 14th International Workshop on Database and Expert Systems Applications (DEXA'03), 2003