Roel Peeters

Learn More
RFID-based tokens are increasingly used in electronic payment and ticketing systems for mutual authentication of tickets and terminals. These systems typically use cost-effective tokens without expensive hardware protection mechanisms and are exposed to hardware attacks that copy and maliciously modify tokens. Physically Unclonable Functions (PUFs) are a(More)
We propose a new distance bounding protocol, which builds upon the private RFID authentication protocol by Peeters and Hermans [25]. In contrast to most distance-bounding protocols in literature, our construction is based on public-key cryptography. Public-key cryptography (specifically Elliptic Curve Cryptography) can, contrary to popular belief, be(More)
We present the first wide-forward-insider and wide-strong RFID identification protocols that are based on zero-knowledge. Until now these notions have only been achieved by schemes based on IND-CCA2 encryption. We discuss why wideforward-insider privacy is sufficient for most practical applications. Rigorous proofs in the standard model are provided for the(More)
Physically unclonable functions (PUFs) exploit the unavoidable manufacturing variations of an integrated circuit (IC). Their input-output behavior serves as a unique IC ‘fingerprint’. Therefore, they have been envisioned as an IC authentication mechanism, in particular for the subclass of so-called strong PUFs. The protocol proposals are typically(More)
<i>Physically unclonable functions</i> (PUFs) exploit the unavoidable manufacturing variations of an Integrated Circuit (IC). Their input-output behavior serves as a unique IC &#8220;fingerprint.&#8221; Therefore, they have been envisioned as an IC authentication mechanism, in particular the subclass of so-called strong PUFs. The protocol proposals are(More)
Gastric intramural pH (pHi), which has been shown to reflect the adequacy of oxygenation in peripheral tissue beds, was measured in acutely ill surgical patients in order to evaluate its value as a prognostic factor and its relation to the sepsis score. Fifty-nine surgical patients were studied on ICU admission. The stomach wall pH was calculated from the(More)
PURPOSE We conducted a study to determine the treatment of perineal and genital burns, the results of therapy and the complications of such burns. MATERIALS AND METHODS A review of the records of 4,216 patients treated between 1981 and 1995 at the Burn Center of the Academic Surgical Center Stuivenberg, revealed 87 male and 30 female patients, 6 months to(More)
We approach RFID privacy both from modelling and protocol point of view. Our privacy model avoids the drawbacks of several proposed RFID privacy models that either suffer from insufficient generality or put forward unrealistic assumptions regarding the adversary's ability to corrupt tags. Furthermore, our model can handle multiple readers and introduces two(More)