| Year | Rank | Type | Title / Venue / Authors |
|---|---|---|---|
| 2014 | — | conf |
ISSE
|
| 2013 | A | conf |
DATE
|
| 2012 | — | conf |
Cryptography and Security
|
| 2011 | C | conf |
ISCAS
|
| 2010 | — | ch. |
Towards Hardware-Intrinsic Security
|
| 2010 | — | conf |
RFIDSec
|
| 2010 | — | conf |
STC@CCS
|
| 2010 | J | jnl |
IEEE Trans. Inf. Forensics Secur.
|
| 2010 | — | ch. |
Towards Hardware-Intrinsic Security
|
| 2010 | — | ch. |
Secure Integrated Circuits and Systems
|
| 2009 | — | conf |
Foundations for Forgery-Resilient Cryptographic Hardware
|
| 2009 | — | conf |
Foundations for Forgery-Resilient Cryptographic Hardware
|
| 2009 | B | conf |
ISIT
|
| 2009 | — | conf |
Foundations for Forgery-Resilient Cryptographic Hardware
|
| 2009 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2009 | — | conf |
HOST
|
| 2009 | J | jnl |
Inf. Syst. Frontiers
|
| 2009 | — | ed. |
Foundations for Forgery-Resilient Cryptographic Hardware
|
| 2009 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2009 | A | conf |
CHES
|
| 2009 | A | conf |
ASIACRYPT
|
| 2009 | — | conf |
VTC Spring
|
| 2009 | A* | conf |
SP
|
| 2009 | — | conf |
HOST
|
| 2008 | C | conf |
ISCAS
|
| 2008 | J | jnl |
ACM Trans. Inf. Syst. Secur.
|
| 2008 | A | conf |
CHES
|
| 2008 | — | conf |
TRUST
|
| 2008 | A | conf |
CHES
|
| 2008 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2008 | — | conf |
HOST
|
| 2007 | — | conf |
ESAS
|
| 2007 | — | ch. |
Security, Privacy, and Trust in Modern Data Management
|
| 2007 | A | conf |
CHES
|
| 2007 | — | conf |
ISSE
|
| 2007 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2007 | B | conf |
FPL
|
| 2007 | — | ch. |
Security, Privacy, and Trust in Modern Data Management
|
| 2007 | — | conf |
PerCom Workshops
|
| 2007 | B | conf |
ISIT
|
| 2007 | J | jnl |
CoRR
|
| 2007 | — | ch. |
Security, Privacy, and Trust in Modern Data Management
|
| 2006 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2006 | A* | conf |
EUROCRYPT
|
| 2006 | B | conf |
Estimating the Secrecy-Rate of Physical Unclonable Functions with the Context-Tree Weighting Method.
ISIT
|
| 2006 | — | conf |
ESAS
|
| 2006 | J | jnl |
Inf. Process. Lett.
|
| 2006 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2006 | — | conf |
ISSE
|
| 2006 | — | conf |
Financial Cryptography
|
| 2006 | B | conf |
CT-RSA
|
| 2006 | A | conf |
CHES
|
| 2006 | — | conf |
ISSE
|
| 2005 | J | jnl |
Quantum Inf. Comput.
|
| 2005 | B | conf |
ISIT
|
| 2005 | — | conf |
Financial Cryptography
|
| 2005 | — | conf |
AVBPA
|
| 2005 | B | conf |
ISIT
|
| 2005 | B | conf |
ACNS
|
| 2005 | — | conf |
EUSIPCO
|
| 2005 | J | jnl |
Des. Codes Cryptogr.
|
| 2004 | B | conf |
ISIT
|
| 2004 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2004 | — | conf |
ECCV Workshop BioAW
|
| 2004 | B | conf |
ISIT
|
| 2004 | A | conf |
ASIACRYPT
|
| 2004 | — | conf |
EUSAI
|
| 2004 | — | conf |
EUSIPCO
|
| 2003 | — | conf |
AVBPA
|
| 2003 | — | conf |
SPC
|
| 2003 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2002 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2002 | J | jnl |
IACR Cryptol. ePrint Arch.
|