Cryptographers' World
 

Pim Tuyls


Author's Web Page Link

12 papers in database with 544 citations Star

H-number: 9

Journal Papers

[Sort papers chronologically] [Sort papers by citations count]

 
1. Pim Tuyls,  Henk D. L. Hollmann,  Jack H. van Lint,  Ludo M. G. M. Tolhuizen,  XOR-based Visual Cryptography Schemes, Designs, Codes and Cryptography, Volume 37(1), pp. 169 - 186, Springer, 2005.

[Electronic Edition][Cited 4 times ]

Conference Papers

[Sort papers chronologically] [Sort papers by citations count]

1. Frederik Armknecht,  Roel Maes,  Ahmad-Reza Sadeghi,  Berk Sunar,  Pim Tuyls,  Memory Leakage-Resilient Encryption Based on Physically Unclonable Functions, pp. 685 - 702, ASIACRYPT 2009.

[Electronic Edition][Cited 8 times ]

2. Benedikt Gierlichs,  Lejla Batina,  Pim Tuyls,  Bart Preneel,  Mutual Information Analysis, pp. 426 - 442, CHES 2008.

[Electronic Edition][Cited 48 times ]

3. Christoph Bösch,  Jorge Guajardo,  Ahmad-Reza Sadeghi,  Jamshid Shokrollahi,  Pim Tuyls,  Efficient Helper Data Key Extractor on FPGAs, pp. 181 - 197, CHES 2008.

[Electronic Edition][Cited 21 times ]

4. Jorge Guajardo,  Sandeep S. Kumar,  Geert Jan Schrijen,  Pim Tuyls,  FPGA Intrinsic PUFs and Their Use for IP Protection, pp. 63 - 80, CHES 2007.

[Electronic Edition][Cited 92 times Red Star]

5. Berry Schoenmakers,  Pim Tuyls,  Efficient Binary Conversion for Paillier Encrypted Values, pp. 522 - 537, EUROCRYPT 2006.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 59 times Red Star]

6. Pim Tuyls,  Lejla Batina,  RFID-Tags for Anti-counterfeiting, pp. 115 - 131, CT-RSA 2006.

[Electronic Edition][Cited 118 times Red StarRed Star]

7. Klaus Kursawe,  Gregory Neven,  Pim Tuyls,  Private Policy Negotiation, pp. 81 - 95, FC 2006.

[Electronic Edition][Cited 4 times ]

8. Pim Tuyls,  Geert Jan Schrijen,  Boris Skoric,  Jan van Geloven,  Nynke Verhaegh,  Rob Wolters,  Read-Proof Hardware from Protective Coatings, pp. 369 - 383, CHES 2006.

[Electronic Edition][Cited 78 times Red Star]

9. Boris Skoric,  Pim Tuyls,  W. Ophey,  Robust Key Extraction from Physical Uncloneable Functions, pp. 407 - 422, ACNS 2005.

[Electronic Edition][Cited 30 times ]

10. Pim Tuyls,  Boris Skoric,  S. Stallinga,  Anton H. M. Akkermans,  W. Ophey,  Information-Theoretic Security Analysis of Physical Uncloneable Functions, pp. 141 - 155, FC 2005.

[Electronic Edition][Cited 25 times ]

11. Berry Schoenmakers,  Pim Tuyls,  Practical Two-Party Computation Based on the Conditional Gate, pp. 119 - 136, ASIACRYPT 2004.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 57 times Red Star]



Database status:
3755 authors,
5428 conference papers from 177 conference proceedings,
559 journal papers from 8 journals
Highly Cited...