|
Publications |
-
Fingerprinting, Chapter 7 in Information Hiding, S. Katzenbeisser and F. Petitcolas (Eds.), 2nd edition. Artech House, 2016. ISBN 13:978-1-60807-928-5
-
Security with Noisy Data:
Private Biometrics, Secure Key Storage and Anti-Counterfeiting
P. Tuyls, BŠ, T. Kevenaar (Eds.)
ISBN 978-1-84628-983-5, Springer, 2007.
-
J.Guajardo, P.Tuyls, N.Bird, C.Conrado, S.Maubach, G.J.Schrijen, BŠ, A.M.H. Tombeur, P.Thueringer
RFID Security: Cryptography and Physics Perspectives
chapter in
"RFID Security: Techniques, Protocols and System-On-Chip Design",
Springer USA.
-
P. Tuyls, BŠ
Strong Authentication with Physical Unclonable Functions
chapter in "Security, Privacy and Trust in Modern Data Management", M. Petković, W. Jonker (Eds.), book series "Data-Centric Systems and Applications", Springer, 2007.
-
P. Tuyls, BŠ
Secret Key Generation from Classical Physics
chapter in "AmIware: Hardware Technology Drivers of
Ambient Intelligence", Philips Research Book Series,
Springer, 2005
[bibtex]
-
R. Allerstorfer, L. Escolà-Farràs, A.A. Ray, BŠ, F. Speelman
Continuous-variable Quantum Position Verification secure against entangled attackers
[archive]
-
B. Joudeh, BŠ
Average entropy of Gaussian mixtures
[archive]
-
A.A. Ray, BŠ
Continuous-Variable QKD with key rates far above Devetak-Winter
[archive]
-
J. dos Reis Frazao, V. van Vliet, S. van der Heide, M. Hout, K. Gümüs, A. Albores-Mejía, BŠ, C. Okonkwo
Co-propagation of classical and continuous-variable QKD signals over a turbulent optical channel
with a real-time QKD receiver
OFC 2024
-
R. Allerstorfer, L. Escola-Farras, A.A. Ray, BŠ, F. Speelman, P. Verduyn Lunel
Security of a Continuous-Variable based Quantum Position Verification Protocol
[archive]
-
K. Akyuz, BŠ
A simpler security proof for 6-state quantum key distribution
[archive]
-
E. Marakis, U. Rührmair, M. Lachner, R. Uppu, BŠ, P.W.H. Pinkse
Clones of the unclonable: nanoduplicating optical PUFs and applications
[archive]
-
J. dos Reis Frazao, A. Albores-Mejia, BŠ, C. Okonkwo
Parameter optimization for CV-QKD with arbitrary modulation
-
M. Lopuhaä-Zwakenberg, BŠ, N. Li
Fisher information as a utility metric for frequency estimation under Local Differential Privacy
WPES 2022
[bibtex]
-
M.H. Temel, BŠ
Entropically secure encryption with faster key expansion
[archive]
-
B. Joudeh, BŠ
Collusion-resistant fingerprinting of parallel content channels
IH&MMsec 2022
[archive]
[bibtex]
-
R.J.P.T. de Keijzer, V.E. Colussi, BŠ, S.J.J.M.F. Kokkelmans
Optimization of the Variational Quantum Eigensolver for quantum chemistry applications
[archive]
[bibtex]
-
BŠ, Z. Wolffs
Diagrammatic security proof for 8-state encoding
[archive]
-
Quantum digital signatures with smaller public keys
[archive]
[bibtex]
-
D. Leermakers, BŠ
Two-way Unclonable Encryption with a vulnerable sender
[archive]
[bibtex]
-
M.A. Lopuhaä-Zwakenberg, H. Tong, BŠ
Data sanitisation protocols for the privacy funnel with differential privacy guarantees
[archive]
[bibtex]
-
B. van der Vecht, X. Coiteux-Roy, BŠ
Can't Touch This: unconditional tamper evidence from short keys
[archive]
[bibtex]
-
BŠ, W. Michiels
The Blob: provable incompressibility and traceability in the whitebox model
[archive]
-
D. Leermakers, BŠ
Qubit-based Unclonable Encryption with Key Recycling
[archive]
[bibtex]
-
Z. Li, T. Wang, M. Lopuhaä-Zwakenberg, BŠ, N. Li
Estimating numerical distributions under Local Differential Privacy
ACM SIGMOD 2020
[archive]
[bibtex]
-
M. Lopuhaä-Zwakenberg, Z. Li, BŠ, N. Li
Improving frequency estimation under Local Differential Privacy
[archive]
[bibtex]
-
M. Lopuhaä-Zwakenberg, Z. Li, BŠ, N. Li
Information-theoretic metrics for Local Differential Privacy protocols
[archive]
-
D. Leermakers, BŠ
Quantum Alice and Silent Bob:
Qubit-based Quantum Key Recycling with almost no classical communication
[archive]
[bibtex]
-
B. Razeghi, T. Stanko, BŠ, S. Voloshynovskiy
Single-component privacy guarantees in Helper Data Systems and Sparse Coding
WIFS 2019
[archive]
-
T. Wang, M. Lopuhaä-Zwakenberg, Z. Li, BŠ, N. Li
Locally Differentially Private frequency estimation with consistency
[archive]
[bibtex]
-
T. Stanko, B.C. Chen, BŠ
Fingerprint template protection using minutia-pair spectral representations
Eurasip Journal on Information Security
[archive]
[bibtex]
-
A. Schaller, W. Xiong, N.A. Anagnostopoulos, M.U. Saleem, S. Gabmeyer, BŠ, S. Katzenbeisser, J. Szefer
Decay-Based DRAM PUFs in Commodity Devices
Transactions on Dependable and Secure Computing
[pdf]
[bibtex]
-
D. Leermakers, BŠ
Security proof for Quantum Key Recycling with noise
Quantum Information and Computation
[archive]
[bibtex]
-
R. Uppu, T.A.W. Wolterink, S.A. Goorden, B. Chen, BŠ, A.P. Mosk, P.W.H. Pinkse
Asymmetric cryptography with physical unclonable keys
Quantum Science and Technology
[archive]
[bibtex]
-
D. Leermakers, BŠ
Security proof for Round Robin Differential Phase Shift QKD
Quantum Information Processing
[archive]
[bibtex]
-
D. Leermakers, BŠ
Optimal attacks on qubit-based Quantum Key Recycling
Quantum Information Processing
[archive]
[bibtex]
-
T. Stanko, BŠ
Minutia-pair spectral representations for fingerprint template protection
WIFS 2017
[archive]
[bibtex]
-
A short note on the security of Round-Robin Differential Phase-Shift QKD
[archive]
-
BŠ, M. de Vries
Quantum Key Recycling with eight-state encoding.
(The Quantum One Time Pad is more interesting than we thought.)
International Journal of Quantum Information
[archive]
[bibtex]
-
BŠ, P.W.H. Pinkse, A.P. Mosk
Authenticated communication from Quantum Readout of PUFs
Quantum Information Processing
[archive]
[bibtex]
-
T. Stanko, F. Nur Andini, BŠ
Optimized quantization in Zero Leakage Helper Data Systems
[archive]
[bibtex]
-
A trivial debiasing scheme for Helper Data Systems
Journal of Cryptographic Engineering
[archive]
[bibtex]
-
BŠ, W. de Groot
Generalized tally-based decoders for traitor tracing and group testing
IEEE Workshop on Information Forensics and Security (WIFS) 2015
[archive]
-
Tally-based simple decoders for traitor tracing and group testing
IEEE Transactions on Information Forensics and Security
[archive]
[bibtex]
-
A. Schaller, T. Stanko, BŠ, S. Katzenbeisser
On the systematic drift of Physically Unclonable Functions due to aging
TrustED 2015
Original preprint: Eliminating leakage in reverse fuzzy extractors
IEEE Transactions on Information Forensics and Security
[archive]
[bibtex]
-
BŠ, S.J.A. de Hoogh, N. Zannone
Flow-based reputation with uncertainty: Evidence-Based Subjective Logic
International Journal of Information Security
[archive]
[bibtex]
-
S. Ibrahimi, BŠ, J.-J. Oosterwijk
Riding the Saddle Point: asymptotics of the capacity-achieving simple decoder for bias-based traitor tracing
EURASIP Journal on Information Security
[archive]
[bibtex]
-
BŠ, N. de Vreede
The Spammed Code Offset Method
IEEE Transactions on Information Forensics and Security
[archive]
[bibtex]
-
R. van den Berg, BŠ, V. van der Leest
Bias-based modeling and entropy analysis of PUFs
TrustED 2013
[archive]
[bibtex]
-
Security analysis of Quantum-Readout PUFs in the case of challenge-estimation attacks
Quantum Information and Computation
[archive]
[bibtex]
-
BŠ, J.-J. Oosterwijk, J. Doumen
The Holey Grail: A special score function for non-binary traitor tracing
IEEE Workshop on Information Forensics and Security (WIFS) 2013
[archive]
[bibtex]
-
P.W.H. Pinkse, S.A. Goorden, M. Horstmann, BŠ, A.P. Mosk
Quantum pattern recognition
Conference on Lasers and Electro-Optics Europe / International Quantum Electronics Conference 2013
[bibtex]
-
BŠ, A.P. Mosk, P.W.H. Pinkse
Security of Quantum-Readout PUFs against quadrature based challenge estimation attacks
Int. Journal of Quantum Information
[archive]
[bibtex]
-
S.A. Goorden, M. Horstmann, A.P. Mosk, BŠ, P.W.H. Pinkse
Quantum-secure authentication of a physical unclonable key
Published in Optica
[archive]
[bibtex]
-
J.-J. Oosterwijk, BŠ, J. Doumen
Optimal suspicion functions for Tardos traitor tracing schemes
Information Hiding and Multimedia Security 2013
[archive]
[bibtex]
Extended version in IEEE Transactions on Information Theory:
A capacity-achieving simple decoder for bias-based traitor tracing schemes
[archive]
[bibtex]
-
A. Simone, BŠ
False Negative probabilities in Tardos codes
Designs, Codes, and Cryptography
[archive]
[bibtex]
-
J. de Groot, BŠ, N. de Vreede, J.-P. Linnartz
Diagnostic category leakage in helper data schemes for biometric authentication
Secrypt 2013
[bibtex]
-
J. de Groot, BŠ, N. de Vreede, J.-P. Linnartz
Quantization in Zero Leakage Helper Data Schemes
Eurasip Journal on Advances in Signal Processing
[archive]
[bibtex]
-
A. Simone, BŠ
False Positive probabilities in q-ary Tardos codes: comparison of attacks
Designs, Codes, and Cryptography
[archive]
[bibtex]
-
A. Ranganathan, N.O. Tippenhauer, BŠ, D. Singelee, S. Capkun
Design and Implementation of a Terrorist-Fraud Resilient Distance Bounding System
ESORICS 2012
[bibtex]
[pdf]
-
BŠ, J.-J. Oosterwijk
Binary and q-ary Tardos codes, revisited
Designs, Codes, and Cryptography
[archive]
[bibtex]
-
D. Boesten, BŠ
Asymptotic fingerprinting capacity in the Combined Digit Model
Information Hiding 2012
[archive]
[bibtex]
-
A. Simone, BŠ, N. Zannone
Flow-based reputation: more than just ranking
Int. J. of Information Technology & Decision Making
[archive]
[bibtex]
-
T. Laarhoven, J. Doumen, P. Roelse, BŠ, B. de Weger
Dynamic Tardos traitor tracing schemes
IEEE Transactions on Information Theory
[archive]
[bibtex]
-
D. Boesten, BŠ
Asymptotic fingerprinting capacity for non-binary alphabets
Information Hiding 2011
[archive]
[bibtex]
-
A. Simone, BŠ
Asymptotically false-positive-maximizing attack on non-binary Tardos codes
Information Hiding 2011
[archive]
[bibtex]
-
A. Simone, BŠ
Accusation probabilities in Tardos codes: beyond the Gaussian approximation
Designs, Codes and Cryptography
[archive]
[bibtex]
-
Quantum readout of Physical Unclonable Functions
Africacrypt 2010. Full version in Int. J. of Quantum Information.
[archive]
[bibtex Africacrypt 2010]
[bibtex IJQI]
-
BŠ, M.X. Makkes
Flowchart description of security primitives for Controlled Physical Unclonable Functions
International Journal of Information Security
[archive]
[bibtex]
-
K. Kursawe, A.-R. Sadeghi, D. Schellekens, BŠ, P. Tuyls
Reconfigurable Physical Unclonable Functions
HOST 2009
[pdf]
[bibtex]
-
BŠ, S. Katzenbeisser, H.G. Schaathun, M.U. Celik
Tardos Fingerprinting Codes in the Combined Digit Model
WIFS 2009; IEEE Transactions of Information Forensics and Security (TIFS)
[archive]
[bibtex WIFS]
[bibtex TIFS]
-
BŠ, P. Tuyls
An efficient fuzzy extractor for limited noise
[archive]
[bibtex]
-
S. de Hoogh, B. Schoenmakers, BŠ, J. Villegas
Verifiable Rotation of Homomorphic Encryptions
PKC 2009
[pdf]
[bibtex]
-
E. Verbitskiy, P. Tuyls, C. Obi, B. Schoenmakers, BŠ
Key extraction from general non-discrete signals
IEEE Transactions on Information Forensics and Security
[archive]
[bibtex]
-
BŠ, C. Obi, E. Verbitskiy, B. Schoenmakers
Sharp lower bounds on the extractable randomness from non-uniform sources
Information and Computation
[archive]
[bibtex]
-
J. Guajardo, BŠ, P. Tuyls, S.S. Kumar, T. Bel, A.H.M. Blom, G.J. Schrijen
Anti-counterfeiting, Key Distribution and Key Storage in an Ambient World via Physical Unclonable Functions
Information Systems Frontiers, special issue on ambient intelligence, 2009
[bibtex]
-
BŠ, T. Bel, A.H.M. Blom, B.R. de Jong, H. Kretschman,
A.J.M. Nellissen
Randomized resonators as uniquely identifiable anti-counterfeiting tags
Secure Component and System Identification (SECSI) Workshop, 2008.
[pdf]
-
On the entropy of keys derived from laser speckle; statistical properties of Gabor-transformed speckle
Journal of Optics A: Pure and Applied Optics.
[archive]
[bibtex].
-
Steganography from weak cryptography
[archive].
-
S.Katzenbeisser, BŠ, M.U.Celik, A.-R.Sadeghi
Combining Tardos Fingerprinting Codes and Fingercasting
Information Hiding 2007
[pdf]
[bibtex]
-
BŠ, S. Katzenbeisser, M.U. Celik
Symmetric Tardos fingerprinting codes for arbitrary alphabet sizes
Designs, Codes and Cryptography 46(2) (Feb 2008), pp 137-166
[archive]
[pdf]
[bibtex]
-
N. Bird, C. Conrado, J. Guajardo, S. Maubach, G.J. Schrijen, BŠ,
P. Thueringer, A.M.H. Tombeur, P. Tuyls
ALGSICS - Combining Physics and Cryptography to
Enhance Security and Privacy in RFID Systems
ESAS 2007
[pdf]
[bibtex]
-
BŠ, T.U. Vladimirova, M. Celik, J.C. Talstra
Tardos fingerprinting is better than we thought
IEEE Transactions on Information Theory
[archive]
[bibtex]
-
P. Tuyls and BŠ
Physical Unclonable Functions for Enhanced Security of Tokens and Tags
Information Security Solutions Europe (ISSE) 2006
[pdf]
[bibtex]
-
G. Gu, P. Fogla, D. Dagon, W. Lee and BŠ
Towards an Information-Theoretic Framework for Analyzing Intrusion
Detection Systems
11th European Symposium on Research in Computer Security (ESORICS), 2006
[pdf]
[bibtex]
-
P. Tuyls, G.J. Schrijen, BŠ, R. Wolters, J. van Geloven, N. Verhaegh
Read-proof hardware from protective coatings
CHES 2006
[pdf]
[bibtex]
-
T. Ignatenko, G.J. Schrijen, BŠ, P. Tuyls, F. Willems
Estimating the Secrecy Rate of Physical Uncloneable Functions with the
Context-Tree Weighting Method
IEEE International Symposium on Information Theory (ISIT) 2006
[pdf]
[bibtex]
-
BŠ, S. Maubach, T. Kevenaar, P. Tuyls
Information-theoretic analysis of capacitive Physical Unclonable Functions
Journal of Applied Physics, Vol. 100 (2006), page 024902
[archive]
[bibtex]
-
G. Gu, P. Fogla, D. Dagon, W. Lee and BŠ
Measuring Intrusion Detection Capability: An Information-Theoretic
Approach
ACM Symposium on Information, Computer and
Communications Security (ASIACCS) 2006
[pdf]
[bibtex]
-
T. Staring and BŠ
Revocation in The Video Content Protection System
International Conference on Consumer Electronics (ICCE) 2006, Digest of Technical Papers,
pp 105-106
[pdf]
[full-length]
[bibtex]
-
BŠ, P. Tuyls, W. Ophey
Robust key extraction from Physical Uncloneable Functions
Applied Cryptography and Network Security (ACNS) 2005, LNCS 3531, pp 407-422
[pdf]
[bibtex]
-
P. Tuyls, BŠ, S. Stallinga, A.H.M. Akkermans, W. Ophey,
Information-Theoretic Security Analysis of Physical Uncloneable Functions
9th Conf. on Financial Cryptography and Data Security , March 2005,
LNCS 3570, pp. 141-155
[pdf]
[bibtex]
-
P. Tuyls, BŠ, S. Stallinga, A.H.M. Akkermans, W. Ophey
Information-Theoretic Model for Physical Uncloneable Functions
IEEE International Symposium on Information Theory (ISIT) 2004, p.141
-
P. Tuyls, BŠ, S. Stallinga, A.H.M. Akkermans, W. Ophey
Security Analysis of Physical Uncloneable Functions
25th Benelux Symposium, 2004
[pdf]
-
R. van Wesenbeeck, BŠ, W. IJzerman, M. Krijn, P. Engelaar
Tracking and deflection coil design for vertical colour selection
3rd International Meeting on Information Display (IMID 2003 Digest), Daegu, pp. 130-133.
[pdf]
-
P. Tuyls, BŠ, K. Schep, H. Boots, J. Penninga,
3D Simulation Tool for RAC Magnetic Deflection Units
SID 2001 Digest, pp 1017-1019
-
M.P.C.M. Krijn, M. de Jong, R.J. Lange, BŠ, P. Tuyls, R.J. van Wesenbeeck, M.H. Wassink
Transposed Scanning: The Way to Realize Super-Slim CRTs
SID 2001 Digest, pp 1008-1011
-
Arc perturbation theory of magnetic deflection
Journal of the SID, Vol 9, nr 4 (2001), pp 257-260
[pdf]
-
New perturbative approach to magnetic deflection
IDW 2000 proceedings, pp 533-536
-
M.A. Baranov, A.M.M. Pruisken and BŠ
The problem of Coulomb interactions in the theory of the quantum Hall effect
Usp.Fiz.Nauk. (Suppl) Vol 171, nr 10 (Chernogolovka 2000), pp 44-49
[archive]
-
BŠ and A.M.M. Pruisken
The fractional quantum Hall effect: Chern-Simons mapping, duality, Luttinger liquids and the instanton vacuum
Nucl.Phys.B 559 (1999), pp 637-672
[archive]
-
A.M.M. Pruisken, BŠ and M.A. Baranov
(Mis-)handling gauge invariance
in the theory of the quantum Hall effect III: The instanton vacuum and
chiral edge physics
Phys.Rev.B, Vol 60, nr 24 (1999), pp 16838-16864
[archive]
-
M.A. Baranov, A.M.M. Pruisken and BŠ
(Mis-)handling gauge invariance
in the theory of the quantum Hall effect II: Perturbative results
Phys.Rev.B, Vol 60, nr 24 (1999), pp 16821-16837
[archive]
-
A.M.M. Pruisken, M.A. Baranov and BŠ
(Mis-)handling gauge invariance in the theory of the quantum Hall effect I: Unifying action and the nu=1/2 state
Phys.Rev.B, Vol 60, nr 24 (1999), pp 16807-16820
[archive]
-
F-invariance and its application to the Quantum Hall Effect
PhD thesis
[ps.gz]
-
Infinite Symmetries in the Quantum Hall Effect
Master's thesis
[ps.gz]
Back to the home page.
Last modified
.