Follow
Dries Schellekens
Dries Schellekens
COSIC, KU Leuven, Septentrio
Verified email at esat.kuleuven.be
Title
Cited by
Cited by
Year
Helper data algorithms for PUF-based key generation: Overview and analysis
J Delvaux, D Gu, D Schellekens, I Verbauwhede
IEEE Transactions on Computer-Aided Design of Integrated Circuits and …, 2014
3202014
Reconfigurable Physical Unclonable Functions-Enabling Technology for Tamper-Resistant Storage
K Kursawe, AR Sadeghi, D Schellekens, B Skoric, P Tuyls
Hardware-Oriented Security and Trust, 2009. HOST'09. IEEE International …, 2009
2212009
FPGA vendor agnostic true random number generator
D Schellekens, B Preneel, I Verbauwhede
Field Programmable Logic and Applications, 2006. FPL'06. International …, 2006
2072006
Remote attestation on legacy operating systems with trusted platform modules
D Schellekens, B Wyseur, B Preneel
Science of Computer Programming 74 (1-2), 13-22, 2008
1732008
Reconfigurable trusted computing in hardware
T Eisenbarth, T Güneysu, C Paar, AR Sadeghi, D Schellekens, M Wolf
Proceedings of the 2007 ACM workshop on Scalable trusted computing, 15-20, 2007
1002007
Secure lightweight entity authentication with strong PUFs: Mission impossible?
J Delvaux, D Gu, D Schellekens, I Verbauwhede
Cryptographic Hardware and Embedded Systems–CHES 2014: 16th International …, 2014
822014
A Pay-per-Use Licensing Scheme for Hardware IP Cores in Recent SRAM based FPGAs
R Maes, D Schellekens, I Verbauwhede
Information Forensics and Security, IEEE Transactions on 7 (1), 98-108, 2012
822012
Analyzing trusted platform communication
K Kursawe, D Schellekens, B Preneel
ECRYPT Workshop, CRASH-CRyptographic Advances in Secure Hardware, 2005
812005
Embedded Trusted Computing with Authenticated Non-Volatile Memory
D Schellekens, P Tuyls, B Preneel
Trusted Computing-Challenges and Applications, 60-74, 2008
622008
Analysis and Design of Active IC Metering Schemes
R Maes, D Schellekens, P Tuyls, I Verbauwhede
Hardware-Oriented Security and Trust, 2009. HOST'09. IEEE International …, 2009
482009
Self-encrypting code to protect against analysis and tampering
J Cappaert, N Kisserli, D Schellekens, B Preneel
1st Benelux Workshop Inf. Syst. Security, 14, 2006
462006
Threat Modelling for Security Tokens in Web Applications
B Preneel, D Schellekens, D De Cock, D Singelee, K Wouters
IFIP International Federation for Information Processing 175 (1), 183-193, 2005
43*2005
Secure interrupts on low-end microcontrollers
R De Clercq, F Piessens, D Schellekens, I Verbauwhede
2014 IEEE 25th International Conference on Application-Specific Systems …, 2014
322014
Flexible μTPMs through Disembedding
K Kursawe, D Schellekens
Proceedings of the 4th International Symposium on Information, Computer, and …, 2009
192009
Design and Analysis of Trusted Computing Platforms
D Schellekens
PhD thesis, KU Leuven, 2013
132013
Practical feasibility evaluation and improvement of a pay-per-use licensing scheme for hardware IP cores in Xilinx FPGAs
J Vliegen, N Mentens, D Koch, D Schellekens, I Verbauwhede
Journal of Cryptographic Engineering 5 (2), 113-122, 2015
102015
Random number generators for integrated circuits and FPGAs
B Sunar, D Schellekens
Secure Integrated Circuits and Systems, 107-124, 2010
72010
Vision towards an open electronic wallet on NFC smartphones
G Ergeerts, D Schellekens, F Schrooyen, R Beyers, K De Kock, ...
International Journal on Advances in Internet Technology 5 (3), 84-94, 2012
42012
Self-encrypting code to protect against analysis and tampering
N Kisserli, D Schellekens, B Preneel
Proceedings of the First Benelux Workshop on Information and System Security, 2006
42006
Integrating the Belgian e-ID into Android
G Van Damme, K Wouters, D De Cock, D Schellekens
1*2011
The system can't perform the operation now. Try again later.
Articles 1–20