Information reconciliation schemes in physical-layer security: A survey C Huth, R Guillaume, T Strohm, P Duplys, IA Samuel, T Güneysu Computer Networks 109, 84-104, 2016 | 75 | 2016 |
Securing systems on the Internet of Things via physical properties of devices and communications C Huth, J Zibuschka, P Duplys, T Güneysu 2015 Annual IEEE Systems Conference (SysCon) Proceedings, 8-13, 2015 | 62 | 2015 |
Correlation power analysis in frequency domain O Schimmel, P Duplys, E Boehl, J Hayek, R Bosch, W Rosenstiel COSADE 2010 First International Workshop on Constructive SideChannel …, 2010 | 50 | 2010 |
Method for protecting a network against a cyberattack M Kneib, C Huth, C Schroff, H Loehr, H Seudie, P Duplys, R Guillaume, ... US Patent App. 15/967,157, 2018 | 49 | 2018 |
Secure software update and IP protection for untrusted devices in the Internet of Things via physically unclonable functions C Huth, P Duplys, T Güneysu 2016 IEEE International Conference on Pervasive Computing and Communication …, 2016 | 36 | 2016 |
Reciprocity enhancement and decorrelation schemes for PHY-based key generation S Gopinath, R Guillaume, P Duplys, A Czylwik 2014 IEEE Globecom Workshops (GC Wkshps), 1367-1372, 2014 | 31 | 2014 |
Securing systems with indispensable entropy: LWE-based lossless computational fuzzy extractor for the Internet of Things C Huth, D Becker, JG Merchan, P Duplys, T Güneysu IEEE Access 5, 11909-11926, 2017 | 25 | 2017 |
Intrusion detection for some/ip: Challenges and opportunities T Gehrmann, P Duplys 2020 23rd Euromicro Conference on Digital System Design (DSD), 583-587, 2020 | 23 | 2020 |
Method and device for manipulation-proof transmission of data E Boehl, M Boehl, P Duplys US Patent 8,316,235, 2012 | 20 | 2012 |
Method for safeguarding a network J Zibuschka, P Duplys US Patent 10,033,538, 2018 | 17 | 2018 |
Device for carrying out a cryptographic method, and operating method for same M Lewis, P Duplys US Patent 9,430,656, 2016 | 16 | 2016 |
Secure and Private, yet Lightweight, Authentication for the IoT via PUF and CBKA C Huth, A Aysu, J Guajardo, P Duplys, T Güneysu Information Security and Cryptology–ICISC 2016: 19th International …, 2017 | 15 | 2017 |
Device and method for encoding input data based on hamming distance and/or weight M Lewis, R Szerwinski, J Shokrollahi, P Duplys US Patent 9,369,486, 2016 | 14 | 2016 |
System and method for shared key agreement over untrusted communication channels JG Merchan, P Duplys, AA Yavuz US Patent 9,438,417, 2016 | 13 | 2016 |
On the energy cost of channel based key agreement C Huth, R Guillaume, P Duplys, K Velmurugan, T Güneysu Proceedings of the 6th International Workshop on Trustworthy Embedded …, 2016 | 8 | 2016 |
Pseudo-random generation of matrices for a computational fuzzy extractor and method for authentication JG Merchan, P Duplys, C Huth US Patent 11,146,410, 2021 | 7 | 2021 |
Device and method for processing data P Duplys, R Szerwinski, M Lewis US Patent 9,798,874, 2017 | 7 | 2017 |
Nonlinear compression functions using the misr approach for security purposes in automotive applications E Bohl, P Duplys 2009 15th IEEE International On-Line Testing Symposium, 55-60, 2009 | 7 | 2009 |
Device and method for forming a signature E Boehl, M Boehl, P Duplys US Patent 9,166,795, 2015 | 6 | 2015 |
Fault attack resistant deterministic random bit generator usable for key randomization E Böhl, P Duplys 2011 IEEE 17th International On-Line Testing Symposium, 194-195, 2011 | 6 | 2011 |