Paul Duplys
Cited by
Cited by
Composite motion exercise machine
RT Webber
US Patent 7,052,444, 2006
Correlation power analysis in frequency domain
O Schimmel, P Duplys, E Boehl, J Hayek, R Bosch, W Rosenstiel
COSADE 2010 First International Workshop on Constructive SideChannel …, 2010
Securing systems on the Internet of Things via physical properties of devices and communications
C Huth, J Zibuschka, P Duplys, T Güneysu
2015 Annual IEEE Systems Conference (SysCon) Proceedings, 8-13, 2015
Information reconciliation schemes in physical-layer security: A survey
C Huth, R Guillaume, T Strohm, P Duplys, IA Samuel, T Güneysu
Computer Networks 109, 84-104, 2016
Reciprocity enhancement and decorrelation schemes for PHY-based key generation
S Gopinath, R Guillaume, P Duplys, A Czylwik
2014 IEEE Globecom Workshops (GC Wkshps), 1367-1372, 2014
Secure software update and IP protection for untrusted devices in the Internet of Things via physically unclonable functions
C Huth, P Duplys, T Güneysu
2016 IEEE International Conference on Pervasive Computing and Communication …, 2016
Securing systems with indispensable entropy: LWE-based lossless computational fuzzy extractor for the Internet of Things
C Huth, D Becker, JG Merchan, P Duplys, T Güneysu
IEEE Access 5, 11909-11926, 2017
Method and device for manipulation-proof transmission of data
E Boehl, M Boehl, P Duplys
US Patent 8,316,235, 2012
Device for adjustably limiting the engine speed of a hand tool
G Dahlberg, B Sandström, M Axelsson, M Kragner
US Patent 6,666,187, 2003
Method for safeguarding a network
J Zibuschka, P Duplys
US Patent 10,033,538, 2018
Device for carrying out a cryptographic method, and operating method for same
M Lewis, P Duplys
US Patent 9,430,656, 2016
System and method for shared key agreement over untrusted communication channels
JG Merchan, P Duplys, AA Yavuz
US Patent 9,438,417, 2016
Device and method for encoding input data based on hamming distance and/or weight
M Lewis, R Szerwinski, J Shokrollahi, P Duplys
US Patent 9,369,486, 2016
Method for protecting a network against a cyberattack
M Kneib, C Huth, C Schroff, H Loehr, H Seudie, P Duplys, R Guillaume, ...
US Patent App. 15/967,157, 2018
Secure and Private, yet Lightweight, Authentication for the IoT via PUF and CBKA
C Huth, A Aysu, J Guajardo, P Duplys, T Güneysu
International Conference on Information Security and Cryptology, 28-48, 2016
LWE-based lossless computational fuzzy extractor for the Internet of Things
C Huth, D Becker, J Guajardo, P Duplys, T Güneysu
2017 IEEE International Symposium on Hardware Oriented Security and Trust …, 2017
Fault attack resistant deterministic random bit generator usable for key randomization
E Böhl, P Duplys
2011 IEEE 17th International On-Line Testing Symposium, 194-195, 2011
Key randomization using a power analysis resistant deterministic random bit generator
P Duplys, E Böhl, W Rosenstiel
2010 IEEE 16th International On-Line Testing Symposium, 229-234, 2010
Nonlinear compression functions using the misr approach for security purposes in automotive applications
E Bohl, P Duplys
2009 15th IEEE International On-Line Testing Symposium, 55-60, 2009
On the energy cost of channel based key agreement
C Huth, R Guillaume, P Duplys, K Velmurugan, T Güneysu
Proceedings of the 6th International Workshop on Trustworthy Embedded …, 2016
The system can't perform the operation now. Try again later.
Articles 1–20