Pim Tuyls
According to our database1,
Pim Tuyls
authored at least 69 papers
between 2002 and 2014.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
On csauthors.net:
Bibliography
2014
Proceedings of the ISSE 2014, 2014
2013
Proceedings of the Design, Automation and Test in Europe, 2013
2012
Proceedings of the Cryptography and Security: From Theory to Applications, 2012
2011
Evaluation of 90nm 6T-SRAM as Physical Unclonable Function for secure key generation in wireless sensor nodes.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2011), 2011
2010
Proceedings of the Towards Hardware-Intrinsic Security - Foundations and Practice, 2010
Proceedings of the Towards Hardware-Intrinsic Security - Foundations and Practice, 2010
IEEE Trans. Inf. Forensics Secur., 2010
Proceedings of the Radio Frequency Identification: Security and Privacy Issues, 2010
Proceedings of the fifth ACM workshop on Scalable trusted computing, 2010
Proceedings of the Secure Integrated Circuits and Systems, 2010
2009
Anti-counterfeiting, key distribution, and key storage in an ambient world via physical unclonable functions.
Inf. Syst. Frontiers, 2009
Proceedings of the 69th IEEE Vehicular Technology Conference, 2009
Proceedings of the 30th IEEE Symposium on Security and Privacy (SP 2009), 2009
Proceedings of the IEEE International Symposium on Information Theory, 2009
Proceedings of the IEEE International Workshop on Hardware-Oriented Security and Trust, 2009
Reconfigurable Physical Unclonable Functions -- Enabling Technology for Tamper-Resistant Storage.
Proceedings of the IEEE International Workshop on Hardware-Oriented Security and Trust, 2009
09282 Abstracts Collection - Foundations for Forgery-Resilient Cryptographic Hardware.
Proceedings of the Foundations for Forgery-Resilient Cryptographic Hardware, 05.07., 2009
Proceedings of the Foundations for Forgery-Resilient Cryptographic Hardware, 05.07., 2009
Proceedings of the Cryptographic Hardware and Embedded Systems, 2009
Proceedings of the Advances in Cryptology, 2009
2008
ACM Trans. Inf. Syst. Secur., 2008
Proceedings of the Trusted Computing, 2008
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2008), 2008
Proceedings of the IEEE International Workshop on Hardware-Oriented Security and Trust, 2008
Proceedings of the Cryptographic Hardware and Embedded Systems, 2008
Proceedings of the Cryptographic Hardware and Embedded Systems, 2008
2007
IACR Cryptol. ePrint Arch., 2007
Proceedings of the Fifth Annual IEEE International Conference on Pervasive Computing and Communications, 2007
Proceedings of the ISSE/SECURE 2007, 2007
Proceedings of the IEEE International Symposium on Information Theory, 2007
Proceedings of the FPL 2007, 2007
ALGSICS - Combining Physics and Cryptography to Enhance Security and Privacy in RFID Systems.
Proceedings of the Security and Privacy in Ad-hoc and Sensor Networks, 2007
Proceedings of the Cryptographic Hardware and Embedded Systems, 2007
Proceedings of the Security, Privacy, and Trust in Modern Data Management, 2007
Proceedings of the Security, Privacy, and Trust in Modern Data Management, 2007
Proceedings of the Security, Privacy, and Trust in Modern Data Management, 2007
2006
Improved constructions of secret sharing schemes by applying (lambda, omega)-decompositions.
Inf. Process. Lett., 2006
Proceedings of the ISSE 2006, 2006
Proceedings of the ISSE 2006, 2006
Estimating the Secrecy-Rate of Physical Unclonable Functions with the Context-Tree Weighting Method.
Proceedings of the Proceedings 2006 IEEE International Symposium on Information Theory, 2006
Proceedings of the Financial Cryptography and Data Security, 2006
Proceedings of the Advances in Cryptology - EUROCRYPT 2006, 25th Annual International Conference on the Theory and Applications of Cryptographic Techniques, St. Petersburg, Russia, May 28, 2006
Proceedings of the Security and Privacy in Ad-Hoc and Sensor Networks, 2006
Proceedings of the Cryptographic Hardware and Embedded Systems, 2006
2005
Quantum Inf. Comput., 2005
Quantum information theoretical analysis of various constructions for quantum secret sharing.
Proceedings of the 2005 IEEE International Symposium on Information Theory, 2005
Proceedings of the 2005 IEEE International Symposium on Information Theory, 2005
Proceedings of the Financial Cryptography and Data Security, 2005
Proceedings of the 13th European Signal Processing Conference, 2005
Proceedings of the Audio- and Video-Based Biometric Person Authentication, 2005
Proceedings of the Applied Cryptography and Network Security, 2005
2004
IACR Cryptol. ePrint Arch., 2004
Proceedings of the 2004 IEEE International Symposium on Information Theory, 2004
Proceedings of the 2004 IEEE International Symposium on Information Theory, 2004
Proceedings of the 2004 12th European Signal Processing Conference, 2004
Proceedings of the Ambient Intelligence: Second European Symposium, 2004
Proceedings of the Advances in Cryptology, 2004
2003
IACR Cryptol. ePrint Arch., 2003
New Shielding Functions to Enhance Privacy and Prevent Misuse of Biometric Templates.
Proceedings of the Audio-and Video-Based Biometrie Person Authentication, 2003
2002
IACR Cryptol. ePrint Arch., 2002
An addition to the paper: A polarisation based visual crypto system and its secret sharing schemes.
IACR Cryptol. ePrint Arch., 2002