default search action
Roel Maes
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c26]Shayesteh Masoumian, Roel Maes, Rui Wang, Karthik Keni Yerriswamy, Geert Jan Schrijen, Said Hamdioui, Mottaqiallah Taouil:
Modeling and Analysis of SRAM PUF Bias Patterns in 14nm and 7nm FinFET Technology Nodes. VLSI-SoC 2023: 1-6 - 2020
- [c25]Georgios N. Selimis, Rui Wang, Roel Maes, Geert Jan Schrijen, Mario Münzer, Stefan Ilic, Frans M. J. Willems, Lieneke Kusters:
RESCURE: a security solution for IoT life cycle. ARES 2020: 95:1-95:10 - [c24]Rui Wang, Georgios N. Selimis, Roel Maes, Sven Goossens:
Long-term Continuous Assessment of SRAM PUF and Source of Random Numbers. DATE 2020: 7-12 - [c23]Shayesteh Masoumian, Georgios N. Selimis, Roel Maes, Geert Jan Schrijen, Said Hamdioui, Mottaqiallah Taouil:
Modeling Static Noise Margin for FinFET based SRAM PUFs. ETS 2020: 1-6 - [c22]Xinhui Lai, Maksim Jenihhin, Georgios N. Selimis, Sven Goossens, Roel Maes, Kolin Paul:
Early RTL Analysis for SCA Vulnerability in Fuzzy Extractors of Memory-Based PUF Enabled Devices. VLSI-SOC 2020: 16-21 - [i5]Rui Wang, Georgios N. Selimis, Roel Maes, Sven Goossens:
Long-term continuous assessment of SRAM PUF and source of random numbers. CoRR abs/2007.15909 (2020) - [i4]Xinhui Lai, Maksim Jenihhin, Georgios N. Selimis, Sven Goossens, Roel Maes, Kolin Paul:
Early RTL Analysis for SCA Vulnerability in Fuzzy Extractors of Memory-Based PUF Enabled Devices. CoRR abs/2008.08409 (2020)
2010 – 2019
- 2017
- [c21]Bin Chen, Tanya Ignatenko, Frans M. J. Willems, Roel Maes, Erik van der Sluis, Georgios N. Selimis:
A Robust SRAM-PUF Key Generation Scheme Based on Polar Codes. GLOBECOM 2017: 1-6 - [c20]Lieneke Kusters, Tanya Ignatenko, Frans M. J. Willems, Roel Maes, Erik van der Sluis, Georgios N. Selimis:
Security of helper data schemes for SRAM-PUF in multiple enrollment scenarios. ISIT 2017: 1803-1807 - [i3]Bin Chen, Tanya Ignatenko, Frans M. J. Willems, Roel Maes, Erik van der Sluis, Georgios N. Selimis:
High-Rate Error Correction Schemes for SRAM-PUFs based on Polar Codes. CoRR abs/1701.07320 (2017) - 2016
- [j4]Roel Maes, Vincent van der Leest, Erik van der Sluis, Frans M. J. Willems:
Secure key generation from biased PUFs: extended version. J. Cryptogr. Eng. 6(2): 121-137 (2016) - 2015
- [j3]Mafalda Cortez, Said Hamdioui, Ali Kaichouhi, Vincent van der Leest, Roel Maes, Geert Jan Schrijen:
Intelligent Voltage Ramp-Up Time Adaptation for Temperature Noise Reduction on Memory-Based PUF Systems. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 34(7): 1162-1175 (2015) - [c19]Roel Maes, Vincent van der Leest, Erik van der Sluis, Frans M. J. Willems:
Secure Key Generation from Biased PUFs. CHES 2015: 517-534 - [i2]Roel Maes, Vincent van der Leest, Erik van der Sluis, Frans M. J. Willems:
Secure Key Generation from Biased PUFs. IACR Cryptol. ePrint Arch. 2015: 583 (2015) - 2014
- [c18]Roel Maes, Vincent van der Leest:
Countering the effects of silicon aging on SRAM PUFs. HOST 2014: 148-153 - [c17]Vincent van der Leest, Roel Maes, Geert Jan Schrijen, Pim Tuyls:
Hardware Intrinsic Security to Protect Value in the Mobile Market. ISSE 2014: 188-198 - 2013
- [b2]Roel Maes:
Physically Unclonable Functions - Constructions, Properties and Applications. Springer 2013, ISBN 978-3-642-41394-0, pp. 1-172 - [c16]Roel Maes:
An Accurate Probabilistic Reliability Model for Silicon PUFs. CHES 2013: 73-89 - [c15]Mafalda Cortez, Said Hamdioui, Vincent van der Leest, Roel Maes, Geert Jan Schrijen:
Adapting voltage ramp-up time for temperature noise reduction on memory-based PUFs. HOST 2013: 35-40 - [p5]Miroslav Knezevic, Lejla Batina, Elke De Mulder, Junfeng Fan, Benedikt Gierlichs, Yong Ki Lee, Roel Maes, Ingrid Verbauwhede:
Signal Processing for Cryptography and Security Applications. Handbook of Signal Processing Systems 2013: 223-241 - [i1]Roel Maes:
An Accurate Probabilistic Reliability Model for Silicon PUFs. IACR Cryptol. ePrint Arch. 2013: 376 (2013) - 2012
- [b1]Roel Maes:
Physically Unclonable Functions: Constructions, Properties and Applications (Fysisch onkloonbare functies: constructies, eigenschappen en toepassingen). Katholieke Universiteit Leuven, Belgium, 2012 - [j2]Patrick Koeberl, Jiangtao Li, Roel Maes, Anand Rajan, Claire Vishik, Marcin Wójcik, Wei Wu:
A practical device authentication scheme using SRAM PUFs. J. Cryptogr. Eng. 2(4): 255-269 (2012) - [j1]Roel Maes, Dries Schellekens, Ingrid Verbauwhede:
A Pay-per-Use Licensing Scheme for Hardware IP Cores in Recent SRAM-Based FPGAs. IEEE Trans. Inf. Forensics Secur. 7(1): 98-108 (2012) - [c14]Roel Maes, Anthony Van Herrewege, Ingrid Verbauwhede:
PUFKY: A Fully Functional PUF-Based Cryptographic Key Generator. CHES 2012: 302-319 - [c13]Roel Maes, Vladimir Rozic, Ingrid Verbauwhede, Patrick Koeberl, Erik van der Sluis, Vincent van der Leest:
Experimental evaluation of Physically Unclonable Functions in 65 nm CMOS. ESSCIRC 2012: 486-489 - [c12]Anthony Van Herrewege, Stefan Katzenbeisser, Roel Maes, Roel Peeters, Ahmad-Reza Sadeghi, Ingrid Verbauwhede, Christian Wachsmann:
Reverse Fuzzy Extractors: Enabling Lightweight Mutual Authentication for PUF-Enabled RFIDs. Financial Cryptography 2012: 374-389 - [c11]Dai Yamamoto, Gabriel Hospodar, Roel Maes, Ingrid Verbauwhede:
Performance and Security Evaluation of AES S-Box-Based Glitch PUFs on FPGAs. SPACE 2012: 45-62 - [c10]Gabriel Hospodar, Roel Maes, Ingrid Verbauwhede:
Machine learning attacks on 65nm Arbiter PUFs: Accurate modeling poses strict bounds on usability. WIFS 2012: 37-42 - 2011
- [c9]Ingrid Verbauwhede, Roel Maes:
Physically unclonable functions: manufacturing variability as an unclonable device identifier. ACM Great Lakes Symposium on VLSI 2011: 455-460 - [c8]Patrick Koeberl, Jiangtao Li, Roel Maes, Anand Rajan, Claire Vishik, Marcin Wójcik:
Evaluation of a PUF Device Authentication Scheme on a Discrete 0.13um SRAM. INTRUST 2011: 271-288 - [c7]Frederik Armknecht, Roel Maes, Ahmad-Reza Sadeghi, François-Xavier Standaert, Christian Wachsmann:
A Formalization of the Security Features of Physical Functions. IEEE Symposium on Security and Privacy 2011: 397-412 - 2010
- [p4]Miroslav Knezevic, Lejla Batina, Elke De Mulder, Junfeng Fan, Benedikt Gierlichs, Yong Ki Lee, Roel Maes, Ingrid Verbauwhede:
Signal Processing for Cryptography and Security Applications. Handbook of Signal Processing Systems 2010: 161-177 - [p3]Roel Maes, Pim Tuyls:
Process Variations for Security: PUFs. Secure Integrated Circuits and Systems 2010: 125-141 - [p2]Roel Maes, Ingrid Verbauwhede:
Physically Unclonable Functions: A Study on the State of the Art and Future Research Directions. Towards Hardware-Intrinsic Security 2010: 3-37 - [p1]Frederik Armknecht, Roel Maes, Ahmad-Reza Sadeghi, Berk Sunar, Pim Tuyls:
Memory Leakage-Resilient Encryption Based on Physically Unclonable Functions. Towards Hardware-Intrinsic Security 2010: 135-164
2000 – 2009
- 2009
- [c6]Frederik Armknecht, Roel Maes, Ahmad-Reza Sadeghi, Berk Sunar, Pim Tuyls:
Memory Leakage-Resilient Encryption Based on Physically Unclonable Functions. ASIACRYPT 2009: 685-702 - [c5]Roel Maes, Pim Tuyls, Ingrid Verbauwhede:
Low-Overhead Implementation of a Soft Decision Helper Data Algorithm for SRAM PUFs. CHES 2009: 332-347 - [c4]Roel Maes, Dries Schellekens, Pim Tuyls, Ingrid Verbauwhede:
Analysis and Design of Active IC Metering Schemes. HOST 2009: 74-81 - [c3]Junfeng Fan, Miroslav Knezevic, Dusko Karaklajic, Roel Maes, Vladimir Rozic, Lejla Batina, Ingrid Verbauwhede:
FPGA-based testing strategy for cryptographic chips: A case study on Elliptic Curve Processor for RFID tags. IOLTS 2009: 189-191 - [c2]Roel Maes, Pim Tuyls, Ingrid Verbauwhede:
A soft decision helper data algorithm for SRAM PUFs. ISIT 2009: 2101-2105 - 2008
- [c1]Sandeep S. Kumar, Jorge Guajardo, Roel Maes, Geert Jan Schrijen, Pim Tuyls:
The Butterfly PUF: Protecting IP on every FPGA. HOST 2008: 67-70
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-09 21:27 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint