FPGA vendor agnostic true random number generator D Schellekens, B Preneel, I Verbauwhede Field Programmable Logic and Applications, 2006. FPL'06. International …, 2006 | 171 | 2006 |
Helper data algorithms for PUF-based key generation: Overview and analysis J Delvaux, D Gu, D Schellekens, I Verbauwhede IEEE Transactions on Computer-Aided Design of Integrated Circuits and …, 2014 | 165 | 2014 |
Reconfigurable Physical Unclonable Functions-Enabling Technology for Tamper-Resistant Storage K Kursawe, AR Sadeghi, D Schellekens, B Skoric, P Tuyls Hardware-Oriented Security and Trust, 2009. HOST'09. IEEE International …, 2009 | 161 | 2009 |
Remote attestation on legacy operating systems with trusted platform modules D Schellekens, B Wyseur, B Preneel Science of Computer Programming 74 (1-2), 13-22, 2008 | 147 | 2008 |
Reconfigurable trusted computing in hardware T Eisenbarth, T Güneysu, C Paar, AR Sadeghi, D Schellekens, M Wolf Proceedings of the 2007 ACM workshop on Scalable trusted computing, 15-20, 2007 | 95 | 2007 |
Analyzing trusted platform communication K Kursawe, D Schellekens, B Preneel ECRYPT Workshop, CRASH-CRyptographic Advances in Secure Hardware, 2005 | 76 | 2005 |
A Pay-per-Use Licensing Scheme for Hardware IP Cores in Recent SRAM based FPGAs R Maes, D Schellekens, I Verbauwhede Information Forensics and Security, IEEE Transactions on 7 (1), 98-108, 2012 | 65 | 2012 |
Secure lightweight entity authentication with strong PUFs: Mission impossible? J Delvaux, D Gu, D Schellekens, I Verbauwhede International Workshop on Cryptographic Hardware and Embedded Systems, 451-475, 2014 | 60 | 2014 |
Embedded Trusted Computing with Authenticated Non-Volatile Memory D Schellekens, P Tuyls, B Preneel Trusted Computing-Challenges and Applications, 60-74, 2008 | 54 | 2008 |
Self-encrypting code to protect against analysis and tampering J Cappaert, N Kisserli, D Schellekens, B Preneel 1st Benelux Workshop Inf. Syst. Security, 14, 2006 | 42 | 2006 |
Threat modelling for security tokens in web applications D De Cock, K Wouters, D Schellekens, D Singelee, B Preneel Communications and multimedia security, 183-193, 2005 | 38 | 2005 |
Analysis and Design of Active IC Metering Schemes R Maes, D Schellekens, P Tuyls, I Verbauwhede Hardware-Oriented Security and Trust, 2009. HOST'09. IEEE International …, 2009 | 33 | 2009 |
Secure interrupts on low-end microcontrollers R De Clercq, F Piessens, D Schellekens, I Verbauwhede 2014 IEEE 25th International Conference on Application-Specific Systems …, 2014 | 22 | 2014 |
Flexible μTPMs through Disembedding K Kursawe, D Schellekens Proceedings of the 4th International Symposium on Information, Computer, and …, 2009 | 16 | 2009 |
Design and Analysis of Trusted Computing Platforms D Schellekens PhD thesis, KU Leuven, 2013 | 13 | 2013 |
Practical feasibility evaluation and improvement of a pay-per-use licensing scheme for hardware IP cores in Xilinx FPGAs J Vliegen, N Mentens, D Koch, D Schellekens, I Verbauwhede Journal of Cryptographic Engineering 5 (2), 113-122, 2015 | 8 | 2015 |
Random number generators for integrated circuits and FPGAs B Sunar, D Schellekens Secure Integrated Circuits and Systems, 107-124, 2010 | 5 | 2010 |
Vision towards an Open Electronic Wallet on NFC Smartphones G Ergeerts, D Schellekens, F Schrooyen, R Beyers, K De Kock, ... International Journal on Advances in Internet Technology 5 (3), 2012 | 4 | 2012 |
Self-encrypting code to protect against analysis and tampering N Kisserli, D Schellekens, B Preneel 1st Benelux Workshop on Information and System Security (WISSec, 2006 | 4 | 2006 |
Integrating the Belgian e-ID into Android G Van Damme, K Wouters, D De Cock, D Schellekens | 1* | 2011 |