If you made any changes in Pure these will be visible here soon.

Personal profile

Research profile

Boris Škorić is an Assistant Professor in the Security group at Eindhoven University of Technology (TU/e). His research interests include security with noisy data. This looks at security applications that use (inherently noisy) physical measurements as a source of randomness.This leads to an interesting mix of physics, information theory, coding theory and cryptography. The techniques developed in this field are useful in secure key storage, anti-counterfeiting, privacy-preserving biometric identification and authentication and true random number generation.  

The most powerful attack against forensic watermarks is the so-called collusion attack: multiple attackers collaborate to remove the watermark. Boris’ research also focuses on collusion-resistant watermarking codes. Another key area of interest is using quantum physics for security. Quantum physics has the interesting property that measurements typically destroy state information. These inherent confidentiality and tamper evidence properties allow one to design security protocols that would be impossible with classical physics.

Academic background

Boris Škorić obtained his MSc Physics from the University of Amsterdam in 1995, with a thesis entitled ‘Infinite Symmetries in the Quantum Hall Effect’.In 1999, he obtained his PhD in Theoretical Physics with a thesis entitledF-invariance and its application to the Quantum Hall Effect.’From 1999 to 2008, he worked as a senior research scientist with Philips Research. In 2008, he joined TU/e.

Fingerprint Dive into the research topics where Boris Škorić is active. These topic labels come from the works of this person. Together they form a unique fingerprint.

Watermarking Engineering & Materials Science
Entropy Engineering & Materials Science
readout Physics & Astronomy
Traitor Tracing Mathematics
Fingerprinting Mathematics
Hash functions Engineering & Materials Science
Cryptography Engineering & Materials Science
Convolution Engineering & Materials Science

Network Recent external collaboration on country level. Dive into details by clicking on the dots.

Research Output 2004 2019

3 Citations (Scopus)

Decay-based DRAM PUFs in commodity devices

Schaller, A., Xiong, W., Anagnostopoulos, N. A., Saleem, M. U., Gabmeyer, S., Skoric, B., Katzenbeisser, S. & Szefer, J., 1 May 2019, In : IEEE Transactions on Dependable and Secure Computing. 16, 3, p. 462-475

Research output: Contribution to journalArticleAcademicpeer-review

Dynamic random access storage
Hardware
Authentication
Field programmable gate arrays (FPGA)
Fabrication

Fingerprint template protection using minutia-pair spectral representations

Stanko, T., Chen, B. & Škorić, B., 1 Dec 2019, In : EURASIP Journal on Information Security. 2019, 1, 15 p., 12

Research output: Contribution to journalArticleAcademicpeer-review

Open Access
File
Biometrics
Entropy

Security proof for quantum key recycling with noise

Leermakers, D. & Skoric, B., 2019, (Submitted) In : Quantum Information & Computation.

Research output: Contribution to journalArticleAcademic

File
Quantum cryptography
Security Proof
Recycling
recycling
Quantum Key Distribution

Asymmetric cryptography with physical unclonable keys

Uppu, R., Wolterink, T. A. W., Goorden, S. A., Chen, B., Škorić, B., Mosk, A. P. & Pinkse, P. W. H., 21 Feb 2018, In : IACR Cryptology ePrint Archive. 20 p.

Research output: Contribution to journalArticleAcademic

Open Access
File
Wavefronts
Cryptography
Photons
Copying
Hardness
1 Citation (Scopus)

A trivial debiasing scheme for helper data systems

Skoric, B., 1 Nov 2018, In : Journal of Cryptographic Engineering. 8, 4, p. 341-349

Research output: Contribution to journalArticleAcademicpeer-review

Open Access
File
Entropy
Spamming

Courses

CSE-IST master

1/09/15 → …

Course

Digital security engineering

1/09/1331/08/21

Course

Information security basics

1/09/1331/08/21

Course

Student theses

(Ab)using Bitcoin for anti-censorship tool

Author: Okupski, K., 31 Dec 2014

Supervisor: Skoric, B. (Supervisor 1), de Weger, B. (Supervisor 2) & Serebrenik, A. (Supervisor 2)

Student thesis: Master

File

Algebraic differential attacks on symmetric cryptography

Author: Lukas, K., 19 Dec 2016

Supervisor: Lange, T. (Supervisor 1), Daemen, J. (External person) (External coach) & Skoric, B. (Supervisor 2)

Student thesis: Master

File

A non-interactive key exchange based on ring-learning with errors

Author: de Kock, B., 25 Jun 2018

Supervisor: Lange, T. (Supervisor 1), Skoric, B. (Supervisor 2), Attema, T. (External person) (External coach) & van Heesch, M. (External coach)

Student thesis: Master

File

Brabocoin: an educational cryptocurrency based on Bitcoin

Author: van den Berg, D. P., Dekker, D., van den Eerenbeemt, S. & Wessel, S., 18 Apr 2019

Supervisor: de Weger, B. (Supervisor 1) & Skoric, B. (Supervisor 2)

Student thesis: Bachelor

File

Ciphertext-only cryptanalysis on hardened mifare classic cards extended

Author: Meijer, C., 31 Aug 2016

Supervisor: Verdult, R. (External person) (Supervisor 1) & Skoric, B. (Supervisor 2)

Student thesis: Master

File