D-Index & Metrics Best Publications

D-Index & Metrics

Discipline name D-index D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines. Citations Publications World Ranking National Ranking
Computer Science D-index 31 Citations 8,328 100 World Ranking 7701 National Ranking 66

Overview

What is he best known for?

The fields of study he is best known for:

  • Quantum mechanics
  • Cryptography
  • Algorithm

His primary areas of investigation include Physical unclonable function, Cryptography, Biometrics, Key and Embedded system. The study incorporates disciplines such as Authentication protocol, Cryptographic protocol, Security token and Entropy in addition to Physical unclonable function. Biometrics is the topic of his studies on Computer security and Artificial intelligence.

His work on Authentication and Information privacy as part of general Computer security study is frequently linked to Block, bridging the gap between disciplines. His Key research includes elements of Adversary, Side channel attack, Measure and Theoretical computer science. His Embedded system study combines topics in areas such as Computer hardware, Tamper resistance, Key encapsulation, Key Wrap and Encryption.

His most cited work include:

  • Mutual Information Analysis (411 citations)
  • New shielding functions to enhance privacy and prevent misuse of biometric templates (393 citations)
  • Practical biometric authentication with template protection (324 citations)

What are the main themes of his work throughout his whole career to date?

His main research concerns Computer security, Encryption, Cryptography, Physical unclonable function and Key. His study on Authentication and Biometrics is often connected to Function as part of broader study in Computer security. His research in Biometrics intersects with topics in Data mining and Pattern recognition.

His studies in Encryption integrate themes in fields like Identifier, Computer hardware, Theoretical computer science and Computation. His Physical unclonable function research is multidisciplinary, relying on both Wireless, Wireless sensor network, Embedded system, Static random-access memory and Key distribution. Key and Algorithm are frequently intertwined in his study.

He most often published in these fields:

  • Computer security (22.29%)
  • Encryption (16.56%)
  • Cryptography (14.01%)

What were the highlights of his more recent work (between 2007-2014)?

  • Cryptography (14.01%)
  • Physical unclonable function (12.74%)
  • Computer security (22.29%)

In recent papers he was focusing on the following fields of study:

Cryptography, Physical unclonable function, Computer security, Key and Embedded system are his primary areas of study. The various areas that Pim Tuyls examines in his Cryptography study include Entropy, Error detection and correction and Static random-access memory. His work deals with themes such as Wireless, Wireless sensor network and Fuzzy logic, which intersect with Physical unclonable function.

His work in the fields of Computer security, such as Secure communication channel, overlaps with other areas such as Copying. Pim Tuyls interconnects Property, Hash function, Leftover hash lemma and Concatenation in the investigation of issues within Key. His study in Embedded system is interdisciplinary in nature, drawing from both Computer hardware, Tamper resistance, Encryption, Integrated circuit and Pill.

Between 2007 and 2014, his most popular works were:

  • Mutual Information Analysis (411 citations)
  • The Butterfly PUF: Protecting IP on every FPGA. (214 citations)
  • Efficient Helper Data Key Extractor on FPGAs (207 citations)

In his most recent research, the most cited papers focused on:

  • Quantum mechanics
  • Cryptography
  • Algorithm

Pim Tuyls mostly deals with Cryptography, Physical unclonable function, Key, Embedded system and Field-programmable gate array. His Cryptography study frequently links to other fields, such as Encryption. Encryption is a subfield of Computer security that he studies.

Pim Tuyls has included themes like Entropy and Cryptographic protocol in his Physical unclonable function study. His research investigates the connection between Entropy and topics such as Algorithm that intersect with problems in Mutual information. His Key research incorporates themes from Tamper resistance, Non-volatile memory, Phase-change memory and Side channel attack.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Best Publications

FPGA Intrinsic PUFs and Their Use for IP Protection

Jorge Guajardo;Sandeep S. Kumar;Geert-Jan Schrijen;Pim Tuyls.
cryptographic hardware and embedded systems (2007)

1349 Citations

The Butterfly PUF: Protecting IP on every FPGA.

Sandeep S. Kumar;Jorge Guajardo;Roel Maes;Geert Jan Schrijen.
hardware-oriented security and trust (2008)

665 Citations

Extended abstract: The butterfly PUF protecting IP on every FPGA

S.S. Kumar;J. Guajardo;R. Maes;G.-J. Schrijen.
hardware oriented security and trust (2008)

635 Citations

Mutual Information Analysis

Benedikt Gierlichs;Lejla Batina;Pim Tuyls;Bart Preneel.
cryptographic hardware and embedded systems (2008)

586 Citations

Read-proof hardware from protective coatings

Pim Tuyls;Geert-Jan Schrijen;Boris Skoric;Jan Van Geloven.
cryptographic hardware and embedded systems (2006)

504 Citations

Practical biometric authentication with template protection

Pim Tuyls;Anton H. M. Akkermans;Tom A. M. Kevenaar;Geert-Jan Schrijen.
Lecture Notes in Computer Science (2005)

419 Citations

Physical Unclonable Functions and Public-Key Crypto for FPGA IP Protection

J. Guajardo;S.S. Kumar;G.-J. Schrijen;P. Tuyls.
field-programmable logic and applications (2007)

301 Citations

Efficient Helper Data Key Extractor on FPGAs

Christoph Bösch;Jorge Guajardo;Ahmad-Reza Sadeghi;Jamshid Shokrollahi.
cryptographic hardware and embedded systems (2008)

288 Citations

Mutual Information Analysis A Generic Side-Channel Distinguisher

Benedikt Gierlichs;Lejla Batina;Pim Tuyls;Bart Preneel.
Lecture Notes in Computer Science (2008)

267 Citations

A soft decision helper data algorithm for SRAM PUFs

Roel Maes;Pim Tuyls;Ingrid Verbauwhede.
international symposium on information theory (2009)

205 Citations

Best Scientists Citing Pim Theo Tuyls

François-Xavier Standaert

François-Xavier Standaert

Université Catholique de Louvain

Publications: 55

Sylvain Guilley

Sylvain Guilley

Télécom ParisTech

Publications: 45

Ingrid Verbauwhede

Ingrid Verbauwhede

KU Leuven

Publications: 45

Raymond N.J. Veldhuis

Raymond N.J. Veldhuis

University of Twente

Publications: 35

Stefan Katzenbeisser

Stefan Katzenbeisser

University of Passau

Publications: 29

Ahmad-Reza Sadeghi

Ahmad-Reza Sadeghi

TU Darmstadt

Publications: 28

Miodrag Potkonjak

Miodrag Potkonjak

University of California, Los Angeles

Publications: 28

Srinivas Devadas

Srinivas Devadas

MIT

Publications: 26

Chip-Hong Chang

Chip-Hong Chang

Nanyang Technological University

Publications: 23

Tim Güneysu

Tim Güneysu

Ruhr University Bochum

Publications: 23

Farinaz Koushanfar

Farinaz Koushanfar

University of California, San Diego

Publications: 23

Christof Paar

Christof Paar

Max Planck Society

Publications: 23

Hervé Chabanne

Hervé Chabanne

Télécom ParisTech

Publications: 22

Christoph Busch

Christoph Busch

Norwegian University of Science and Technology

Publications: 21

Wayne Burleson

Wayne Burleson

University of Massachusetts Amherst

Publications: 21

Patrick Schaumont

Patrick Schaumont

Worcester Polytechnic Institute

Publications: 20

Profile was last updated on December 6th, 2021.
Research.com Ranking is based on data retrieved from the Microsoft Academic Graph (MAG).
The ranking d-index is inferred from publications deemed to belong to the considered discipline.

If you think any of the details on this page are incorrect, let us know.

Contact us
Something went wrong. Please try again later.