Follow
Paul Duplys
Title
Cited by
Cited by
Year
Information reconciliation schemes in physical-layer security: A survey
C Huth, R Guillaume, T Strohm, P Duplys, IA Samuel, T Güneysu
Computer Networks 109, 84-104, 2016
702016
Securing systems on the Internet of Things via physical properties of devices and communications
C Huth, J Zibuschka, P Duplys, T Güneysu
2015 Annual IEEE Systems Conference (SysCon) Proceedings, 8-13, 2015
622015
Correlation power analysis in frequency domain
O Schimmel, P Duplys, E Boehl, J Hayek, R Bosch, W Rosenstiel
COSADE 2010 First International Workshop on Constructive SideChannel …, 2010
502010
Method for protecting a network against a cyberattack
M Kneib, C Huth, C Schroff, H Loehr, H Seudie, P Duplys, R Guillaume, ...
US Patent App. 15/967,157, 2018
492018
Secure software update and IP protection for untrusted devices in the Internet of Things via physically unclonable functions
C Huth, P Duplys, T Güneysu
2016 IEEE International Conference on Pervasive Computing and Communication …, 2016
362016
Reciprocity enhancement and decorrelation schemes for PHY-based key generation
S Gopinath, R Guillaume, P Duplys, A Czylwik
2014 IEEE Globecom Workshops (GC Wkshps), 1367-1372, 2014
312014
Securing systems with indispensable entropy: LWE-based lossless computational fuzzy extractor for the Internet of Things
C Huth, D Becker, JG Merchan, P Duplys, T Güneysu
IEEE Access 5, 11909-11926, 2017
242017
Method and device for manipulation-proof transmission of data
E Boehl, M Boehl, P Duplys
US Patent 8,316,235, 2012
212012
Intrusion detection for some/ip: Challenges and opportunities
T Gehrmann, P Duplys
2020 23rd Euromicro Conference on Digital System Design (DSD), 583-587, 2020
202020
Method for safeguarding a network
J Zibuschka, P Duplys
US Patent 10,033,538, 2018
172018
Device for carrying out a cryptographic method, and operating method for same
M Lewis, P Duplys
US Patent 9,430,656, 2016
162016
Secure and Private, yet Lightweight, Authentication for the IoT via PUF and CBKA
C Huth, A Aysu, J Guajardo, P Duplys, T Güneysu
Information Security and Cryptology–ICISC 2016: 19th International …, 2017
152017
System and method for shared key agreement over untrusted communication channels
JG Merchan, P Duplys, AA Yavuz
US Patent 9,438,417, 2016
132016
Device and method for encoding input data based on hamming distance and/or weight
M Lewis, R Szerwinski, J Shokrollahi, P Duplys
US Patent 9,369,486, 2016
132016
On the energy cost of channel based key agreement
C Huth, R Guillaume, P Duplys, K Velmurugan, T Güneysu
Proceedings of the 6th International Workshop on Trustworthy Embedded …, 2016
82016
Pseudo-random generation of matrices for a computational fuzzy extractor and method for authentication
JG Merchan, P Duplys, C Huth
US Patent 11,146,410, 2021
72021
Nonlinear compression functions using the misr approach for security purposes in automotive applications
E Bohl, P Duplys
2009 15th IEEE International On-Line Testing Symposium, 55-60, 2009
72009
Fault attack resistant deterministic random bit generator usable for key randomization
E Böhl, P Duplys
2011 IEEE 17th International On-Line Testing Symposium, 194-195, 2011
62011
Key randomization using a power analysis resistant deterministic random bit generator
P Duplys, E Böhl, W Rosenstiel
2010 IEEE 16th International On-Line Testing Symposium, 229-234, 2010
62010
Device and method for processing data
M Lewis, R Szerwinski, J Shokrollahi, P Duplys
US Patent 9,767,281, 2017
52017
The system can't perform the operation now. Try again later.
Articles 1–20