If you made any changes in Pure these will be visible here soon.

Personal profile

Research profile

Boris Škorić is an Assistant Professor in the Security group at Eindhoven University of Technology (TU/e). His research interests include security with noisy data. This looks at security applications that use (inherently noisy) physical measurements as a source of randomness.This leads to an interesting mix of physics, information theory, coding theory and cryptography. The techniques developed in this field are useful in secure key storage, anti-counterfeiting, privacy-preserving biometric identification and authentication and true random number generation.  

The most powerful attack against forensic watermarks is the so-called collusion attack: multiple attackers collaborate to remove the watermark. Boris’ research also focuses on collusion-resistant watermarking codes. Another key area of interest is using quantum physics for security. Quantum physics has the interesting property that measurements typically destroy state information. These inherent confidentiality and tamper evidence properties allow one to design security protocols that would be impossible with classical physics.

Academic background

Boris Škorić obtained his MSc Physics from the University of Amsterdam in 1995, with a thesis entitled ‘Infinite Symmetries in the Quantum Hall Effect’.In 1999, he obtained his PhD in Theoretical Physics with a thesis entitledF-invariance and its application to the Quantum Hall Effect.’From 1999 to 2008, he worked as a senior research scientist with Philips Research. In 2008, he joined TU/e.

Fingerprint Fingerprint is based on mining the text of the person's scientific documents to create an index of weighted terms, which defines the key subjects of each individual researcher.

Watermarking Engineering & Materials Science
Entropy Engineering & Materials Science
readout Physics & Astronomy
Traitor Tracing Mathematics
Fingerprinting Mathematics
Hash functions Engineering & Materials Science
Cryptography Engineering & Materials Science
Convolution Engineering & Materials Science

Network Recent external collaboration on country level. Dive into details by clicking on the dots.

Research Output 2004 2018

Asymmetric cryptography with physical unclonable keys

Uppu, R., Wolterink, T. A. W., Goorden, S. A., Chen, B., Škorić, B., Mosk, A. P. & Pinkse, P. W. H., 21 Feb 2018, In : IACR Cryptology ePrint Archive. 20 p.

Research output: Contribution to journalArticleAcademic

Open Access
File
Wavefronts
Cryptography
Photons
Copying
Hardness

A trivial debiasing scheme for helper data systems

Skoric, B., 1 Nov 2018, In : Journal of Cryptographic Engineering. 8, 4, p. 341-349

Research output: Contribution to journalArticleAcademicpeer-review

Open Access
File
Entropy
Spamming

Decay-based DRAM PUFs in commodity devices

Schaller, A., Xiong, W., Anagnostopoulos, N. A., Saleem, M. U., Gabmeyer, S., Skoric, B., Katzenbeisser, S. & Szefer, J., 5 Apr 2018, (Accepted/In press) In : IEEE Transactions on Dependable and Secure Computing.

Research output: Contribution to journalArticleAcademicpeer-review

Dynamic random access storage
Hardware
Authentication
Field programmable gate arrays (FPGA)
Fabrication

Eliminating leakage in reverse fuzzy extractors

Schaller, A., Stanko, T., Skoric, B. & Katzenbeisser, S., 2018, In : IEEE Transactions on Information Forensics and Security. 13, 4, p. 954-964 11 p.

Research output: Contribution to journalArticleAcademicpeer-review

Error correction
Authentication
Hardware security

Fingerprint template protection using minutia-pair spectral representations

Stanko, T., Chen, B. & Skoric, B., 5 Apr 2018, In : arXiv. 9 p., 01744

Research output: Contribution to journalArticleAcademic

Open Access
File

Courses

Advanced network security

1/09/15 → …

Course

Automata and process theory

1/09/1231/08/18

Course

Cryptographic engineering

1/09/14 → …

Course

Digital security engineering

1/09/13 → …

Course

Student theses

(Ab)using Bitcoin for anti-censorship tool

Author: Okupski, K., 31 Dec 2014

Supervisor: Skoric, B. (Supervisor 1), de Weger, B. (Supervisor 2) & Serebrenik, A. (Supervisor 2)

Student thesis: Master

File

Algebraic differential attacks on symmetric cryptography

Author: Lukas, K., 19 Dec 2016

Supervisor: Lange, T. (Supervisor 1), Daemen, J. (External person) (External coach) & Skoric, B. (Supervisor 2)

Student thesis: Master

File

A non-interactive key exchange based on ring-learning with errors

Author: de Kock, B., 25 Jun 2018

Supervisor: Lange, T. (Supervisor 1), Skoric, B. (Supervisor 2), Attema, T. (External person) (External coach) & van Heesch, M. (External coach)

Student thesis: Master

File

Ciphertext-only cryptanalysis on hardened mifare classic cards extended

Author: Meijer, C., 31 Aug 2016

Supervisor: Verdult, R. (External person) (Supervisor 1) & Skoric, B. (Supervisor 2)

Student thesis: Master

File

Collusion resistance of digital fingerprinting schemes

Author: Vladimirova, T., 30 Jun 2006

Supervisor: Skoric, B. (External coach) & van Tilborg, H. (Supervisor 1)

Student thesis: Master

File