Research Output 2007 2019

Filter
Report
2018
7 Downloads (Pure)

Optical PUF statistics

Leermakers, D., Razeghi, B., Rezaeifar, S., Skoric, B., Taran, O. & Voloshynovskiy, S., 1 Oct 2018, Eindhoven: Technische Universiteit Eindhoven. 33 p. (Computer science reports; vol. 1804)

Research output: Book/ReportReportAcademic

statistics
2015
266 Downloads (Pure)

Differential computation analysis : hiding your white-box designs is not enough

Bos, J. W., Hubain, C., Michiels, W. P. A. J. & Teuwen, P., 2015, IACR. 22 p. (Cryptology ePrint Archive; vol. 2015/753)

Research output: Book/ReportReportAcademic

Open Access
File
Reverse engineering
Cryptography
Hardware
Data storage equipment
Industry
2014
324 Downloads (Pure)

Analysis of XACML policies with SMT

Turkmen, F., Hartog, den, J. I., Ranise, S. & Zannone, N., 2014, Eindhoven: Technische Universiteit Eindhoven. 25 p. (Computer science reports; vol. 1408)

Research output: Book/ReportReportAcademic

Open Access
File
Surface mount technology
Access control
XML
Markup languages
Specifications
44 Downloads (Pure)

Eliminating leakage in reverse fuzzy extractors

Schaller, A., Skoric, B. & Katzenbeisser, S., 2014, IACR. 10 p. (Cryptology ePrint Archive; vol. 2014/741)

Research output: Book/ReportReportAcademic

Open Access
File
Authentication
Error correction
Hardware security
28 Downloads (Pure)

Flow-based reputation with uncertainty : evidence-based subjective logic

Skoric, B., Hoogh, de, S. J. A. & Zannone, N., 2014, s.n. 33 p. (arXiv.org; vol. 1402.3319 [cs.DC])

Research output: Book/ReportReportAcademic

Open Access
File
Evidence-based
Uncertainty
Logic
Operator
Discounting

Simple-looking joint decoders for traitor tracing and group testing

Skoric, B., 2014, IACR. 18 p. (Cryptology ePrint Archive; vol. 2014/781)

Research output: Book/ReportReportAcademic

Watermarking
Testing
Probability distributions
Error probability

SPHINCS: practical stateless hash-based signatures

Bernstein, D. J., Hopwood, D., Hülsing, A. T., Lange, T., Niederhagen, R. F., Papachristodoulou, L., Schwabe, P. & Wilcox O'Hearn, Z., 2014, International Association for Cryptologic Research. 26 p. (Cryptology ePrint Archive; vol. 2014/795)

Research output: Book/ReportReportAcademic

Quantum cryptography
Quantum computers
Program processors
2013
74 Downloads (Pure)

A capacity-achieving simple decoder for bias-based traitor tracing schemes

Oosterwijk, J., Skoric, B. & Doumen, J. M., 2013, IACR. 19 p. (Cryptology ePrint Archive; vol. 2013/389)

Research output: Book/ReportReportAcademic

Open Access
File
13 Citations (Scopus)
71 Downloads (Pure)

Bias-based modeling and entropy analysis of PUFs

van den Berg, R., Skoric, B. & Leest, van der, V., 2013, IACR. 8 p. (Cryptology ePrint Archive; vol. 2013/656)

Research output: Book/ReportReportAcademic

Open Access
File
Entropy
Static random access storage
Hardware security
Data storage equipment
16 Citations (Scopus)
1 Downloads (Pure)

Optimal suspicion functions for Tardos traitor tracing schemes

Oosterwijk, J., Skoric, B. & Doumen, J. M., 2013, s.n. 15 p. (Cryptology ePrint Archive; vol. 2013/154)

Research output: Book/ReportReportAcademic

61 Downloads (Pure)

Riding the Saddle Point : asymptotics of the capacity-achieving simple decoder for bias-based traitor tracing

Ibrahimi, S., Skoric, B. & Oosterwijk, J., 2013, IACR. 15 p. (Cryptology ePrint Archive; vol. 2013/809)

Research output: Book/ReportReportAcademic

Open Access
File
Traitor Tracing
Saddlepoint
Score Function
Bernstein Inequality
Dirichlet Distribution
12 Citations (Scopus)
2 Downloads (Pure)

Security of Quantum-Readout PUFs against quadrature based challenge estimation attacks

Skoric, B., Mosk, A. P. & Pinkse, P. W. H., 2013, s.n. 11 p. (Cryptology ePrint Archive; vol. 2013/084)

Research output: Book/ReportReportAcademic

quadratures
attack
readout
photons
1 Citation (Scopus)
55 Downloads (Pure)

The Holey Grail : a special score function for non-binary traitor tracing

Skoric, B., Oosterwijk, J. & Doumen, J. M., 2013, IACR. 19 p. (Cryptology ePrint Archive; vol. 2013/420)

Research output: Book/ReportReportAcademic

Open Access
File
Traitor Tracing
Score Function
Special Functions
Collusion
Coalitions
76 Downloads (Pure)

The spammed code offset method

Skoric, B. & Vreede, de, N., 2013, IACR. 10 p. (Cryptology ePrint Archive; vol. 2013/527)

Research output: Book/ReportReportAcademic

Open Access
File
Entropy
Biometrics
Data storage equipment
2012
26 Downloads (Pure)

A formal privacy analysis of identity management systems

Veeningen, M. G., Weger, de, B. M. M. & Zannone, N., 2012, s.n. 52 p. (arXiv.org; vol. 1206.7111 [cs.CR])

Research output: Book/ReportReportAcademic

Open Access
File
Formal methods
Data privacy
Reusability
Taxonomies
Authentication

Asymptotic fingerprinting capacity in the Combined Digit Model

Boesten, D. & Skoric, B., 2012, s.n. 11 p. (Cryptology ePrint Archive; vol. 2012/184)

Research output: Book/ReportReportAcademic

Channel capacity
Signal processing

Binary and q-ary Tardos codes, revisited

Oosterwijk, J. & Skoric, B., 2012, s.n. 32 p. (Cryptology ePrint Archive; vol. 2012/249)

Research output: Book/ReportReportAcademic

Watermarking
Error probability
31 Downloads (Pure)

Dynamic traitor tracing for arbitrary alphabets: divide and conquer

Laarhoven, T. M. M., Oosterwijk, J-J. & Doumen, J., 2012, 6 p. (arXiv.org; vol. 1206.6702 [cs.CR])

Research output: Book/ReportReportAcademic

Open Access
File
Bandwidth
4 Citations (Scopus)
1 Downloads (Pure)

Enforcing access control in virtual organizations using hierarchical attribute-based encryption

Asim, M., Ignatenko, T., Petkovic, M., Trivellato, D. & Zannone, N., 2012, s.n. 17 p. (arXiv.org; vol. 1205.5757)

Research output: Book/ReportReportAcademic

Access control
Cryptography

False negative probabilities in Tardos codes

Simone, A. & Skoric, B., 2012, s.n. (Cryptology ePrint Archive; vol. 2012/667)

Research output: Book/ReportReportAcademic

Convolution
Watermarking
39 Downloads (Pure)

False positive probabilities in q-ary Tardos codes : comparison of attacks

Simone, A. & Skoric, B., 2012, s.n. 20 p. (Cryptology ePrint Archive; vol. 2012/522)

Research output: Book/ReportReportAcademic

Open Access
File
Convolution
Watermarking
5 Citations (Scopus)

Flow-based reputation : more than just ranking

Simone, A., Skoric, B. & Zannone, N., 2012, s.n. 21 p. (arXiv.org; vol. 1203.1820)

Research output: Book/ReportReportAcademic

Information leakage of continuous-source zero secrecy leakage helper data schemes

Groot, de, J. A., Skoric, B., Vreede, de, N. & Linnartz, J. P. M. G., 2012, s.n. 12 p. (Cryptology ePrint Archive; vol. 2012/566)

Research output: Book/ReportReportAcademic

Entropy
Hardware security
2011
5 Citations (Scopus)
2 Downloads (Pure)

Asymptotically false-positive-maximizing attack on non-binary Tardos codes

Simone, A. & Skoric, B., 2011, s.n. 14 p. (arXiv.org [cs.CR]; vol. 1102.0451)

Research output: Book/ReportReportAcademic

15 Citations (Scopus)

Asymptotic fingerprinting capacity for non-binary alphabets

Boesten, D. & Skoric, B., 2011, s.n. 11 p. (arXiv.org [cs.CR]; vol. 1102.0445)

Research output: Book/ReportReportAcademic

Fingerprinting
Attack
Channel Capacity
Interleaving
Increasing Functions

Dynamic Tardos traitor tracing schemes

Laarhoven, T., Doumen, J., Roelse, P., Skoric, B. & Weger, de, B., 2011, s.n. 17 p. (arXiv.org [cs.CR]; vol. 1111.3597)

Research output: Book/ReportReportAcademic

Feedback
Error probability
2010

A2THOS : availability analysis and optimisation in SLAs

Zambon, E., Etalle, S. & Wieringa, R. J., 2010, Enschede: Universiteit Twente. (CTIT Technical Report; vol. TR-CTIT-10-20)

Research output: Book/ReportReportAcademic

IT services
Costs
Customer satisfaction
Optimal solution
Organization size

Accusation probabilities in Tardos codes : the Gaussian approximation is better than we thought

Simone, A. & Skoric, B., 2010, IACR. (Cryptology ePrint Archive; vol. 2010/472)

Research output: Book/ReportReportAcademic

Watermarking
Normal distribution
Probability distributions
62 Downloads (Pure)

GEM : a distributed goal evaluation algorithm for trust management

Trivellato, D., Zannone, N. & Etalle, S., 2010, Eindhoven: Technische Universiteit Eindhoven. 12 p. (Computer science reports; vol. 1015)

Research output: Book/ReportReportAcademic

Open Access
File
Air cushion vehicles
Access control
Semantics
Acoustic waves
2009

An efficient fuzzy extractor for limited noise

Skoric, B. & Tuyls, P. T., 2009, IACR. 11 p. (Cryptology ePrint Archive; vol. 2009/030)

Research output: Book/ReportReportAcademic

Hash functions
Positive ions

Architecture-based qualitative risk analysis for availability of IT infrastructures

Zambon, E., Etalle, S., Wieringa, R. J. & Hartel, P. H., 2009, Enschede: Universiteit Twente. 26 p. (CTIT Technical Report; vol. TR-CTIT-09-35)

Research output: Book/ReportReportAcademic

Risk analysis
Risk assessment
Availability
Authentication
Industry

CRAC : Confidentiality risk analysis and IT-architecture comparison of business networks

Morali, A., Zambon, E., Etalle, S. & Wieringa, R. J., 2009, Enschede: Universiteit Twente. 8 p. (CTIT Technical Report; vol. TR-CTIT-09-30)

Research output: Book/ReportReportAcademic

Risk analysis
Industry
Outsourcing

Flowchart description of security primitives for Controlled Physical Unclonable Functions

Skoric, B. & Makkes, M. X., 2009, IACR. 7 p. (Cryptology ePrint Archive; vol. 2009/328)

Research output: Book/ReportReportAcademic

Authentication
Cryptography
Hardware security

Key extraction from general non-discrete signals

Verbitskiy, E. A., Tuyls, P. T., Obi, C., Schoenmakers, B. & Skoric, B., 2009, IACR. 16 p. (Cryptology ePrint Archive; vol. 2009/303)

Research output: Book/ReportReportAcademic

Probability distributions
Entropy
Error probability

Panacea : Automating attack classification for anomaly-based network intrusion detection systems

Bolzoni, D., Etalle, S. & Hartel, P. H., 2009, Enschede: Universiteit Twente. 21 p. (CTIT Technical Report; vol. TR-CTIT-09-10)

Research output: Book/ReportReportAcademic

Intrusion detection
38 Downloads (Pure)

POLIPO : policies & ontologies for interoperability, portability, and autonomy

Trivellato, D., Spiessens, A. O. D., Zannone, N. & Etalle, S., 2009, Eindhoven: Technische Universiteit Eindhoven. 8 p. (Computer science reports; vol. 0906)

Research output: Book/ReportReportAcademic

Open Access
File
Access control
Interoperability
Ontology
Semantics
Specifications
1 Downloads (Pure)
readers
readout
hardware
disturbances
computer programs
9 Citations (Scopus)

Tardos fingerprinting codes in the combined digit model

Skoric, B., Katzenbeisser, S., Schaathun, H. G. & Celik, M. U., 2009, IACR. 22 p. (Cryptology ePrint Archive; vol. 2009/244)

Research output: Book/ReportReportAcademic

Error detection
Signal processing
2008
1 Downloads (Pure)

Crossing borders: Security and privacy issues of the European e-passport

Hoepman, J. H., Hubbers, E., Jacobs, B. P. F., Oostdijk, M. D. & Wichers Schreur, R., 2008, s.n. (CoRR; vol. abs/0801.3930)

Research output: Book/ReportReportAcademic

Access control
Erosion
Entropy
39 Downloads (Pure)
Open Access
File
voting
election
Internet
voter
documentation

Increased security through open source

Hoepman, J. H. & Jacobs, B. P. F., 2008, s.n. (CoRR; vol. abs/0801.3924)

Research output: Book/ReportReportAcademic

Sharp lower bounds on the extractable randomness from non-uniform sources

Skoric, B., Obi, C., Verbitskiy, E. A. & Schoenmakers, B., 2008, IACR. 17 p. (Cryptology ePrint Archive; vol. 2008/484)

Research output: Book/ReportReportAcademic