default search action
Marten van Dijk
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2024
- [j42]Zheng Yang, Chenglu Jin, Xuelian Cao, Marten van Dijk, Jianying Zhou:
Optimizing Proof of Aliveness in Cyber-Physical Systems. IEEE Trans. Dependable Secur. Comput. 21(4): 3610-3628 (2024) - 2023
- [j41]Marten van Dijk, Chenglu Jin:
A Theoretical Framework for the Analysis of Physical Unclonable Function Interfaces and Its Relation to the Random Oracle Model. J. Cryptol. 36(4): 35 (2023) - 2022
- [j40]Kaleel Mahmood, Rigel Mahmood, Ethan Rathbun, Marten van Dijk:
Back in Black: A Comparative Evaluation of Recent State-Of-The-Art Black-Box Attacks. IEEE Access 10: 998-1019 (2022) - [j39]Kaleel Mahmood, Phuong Ha Nguyen, Lam M. Nguyen, Thanh Nguyen, Marten van Dijk:
Besting the Black-Box: Barrier Zones for Adversarial Example Defense. IEEE Access 10: 1451-1474 (2022) - [j38]Lam M. Nguyen, Marten van Dijk, Dzung T. Phan, Phuong Ha Nguyen, Tsui-Wei Weng, Jayant R. Kalagnanam:
Finite-sum smooth optimization with SARAH. Comput. Optim. Appl. 82(3): 561-593 (2022) - [j37]Chenglu Jin, Wayne P. Burleson, Marten van Dijk, Ulrich Rührmair:
Programmable access-controlled and generic erasable PUF design and its applications. J. Cryptogr. Eng. 12(4): 413-432 (2022) - [j36]Yansong Gao, Marten van Dijk, Lei Xu, Wei Yang, Surya Nepal, Damith C. Ranasinghe:
TREVERSE: TRial-and-Error Lightweight Secure ReVERSE Authentication With Simulatable PUFs. IEEE Trans. Dependable Secur. Comput. 19(1): 419-437 (2022) - 2021
- [j35]Kaleel Mahmood, Deniz Gurevin, Marten van Dijk, Phuoung Ha Nguyen:
Beware the Black-Box: On the Robustness of Recent Defenses to Adversarial Examples. Entropy 23(10): 1359 (2021) - [j34]Lam M. Nguyen, Quoc Tran-Dinh, Dzung T. Phan, Phuong Ha Nguyen, Marten van Dijk:
A Unified Convergence Analysis for Shuffling-Type Gradient Methods. J. Mach. Learn. Res. 22: 207:1-207:44 (2021) - 2020
- [j33]Emil Stefanov, Marten van Dijk, Elaine Shi, Christopher W. Fletcher, Ling Ren, Xiangyao Yu, Srinivas Devadas:
A Retrospective on Path ORAM. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 39(8): 1572-1576 (2020) - [j32]Nils Wisiol, Christopher Mühl, Niklas Pirnay, Phuong Ha Nguyen, Marian Margraf, Jean-Pierre Seifert, Marten van Dijk, Ulrich Rührmair:
Splitting the Interpose PUF: A Novel Modeling Attack Strategy. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2020(3): 97-120 (2020) - [j31]Tara Merin John, Syed Kamran Haider, Hamza Omar, Marten van Dijk:
Connecting the Dots: Privacy Leakage via Write-Access Patterns to the Main Memory. IEEE Trans. Dependable Secur. Comput. 17(2): 436-442 (2020) - 2019
- [j30]Syed Kamran Haider, Marten van Dijk:
Flat ORAM: A Simplified Write-Only Oblivious RAM Construction for Secure Processors. Cryptogr. 3(1): 10 (2019) - [j29]Lam M. Nguyen, Phuong Ha Nguyen, Peter Richtárik, Katya Scheinberg, Martin Takác, Marten van Dijk:
New Convergence Aspects of Stochastic Gradient Algorithms. J. Mach. Learn. Res. 20: 176:1-176:49 (2019) - [j28]Phuong Ha Nguyen, Durga Prasad Sahoo, Chenglu Jin, Kaleel Mahmood, Ulrich Rührmair, Marten van Dijk:
The Interpose PUF: Secure PUF Design against State-of-the-art Machine Learning Attacks. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2019(4): 243-290 (2019) - [j27]Syed Kamran Haider, Chenglu Jin, Masab Ahmad, Devu Manikantan Shila, Omer Khan, Marten van Dijk:
Advancing the State-of-the-Art in Hardware Trojans Detection. IEEE Trans. Dependable Secur. Comput. 16(1): 18-32 (2019) - [j26]Chenglu Jin, Marten van Dijk:
Secure and Efficient Initialization and Authentication Protocols for SHIELD. IEEE Trans. Dependable Secur. Comput. 16(1): 156-173 (2019) - [j25]Ling Ren, Christopher W. Fletcher, Albert Kwon, Marten van Dijk, Srinivas Devadas:
Design and Implementation of the Ascend Secure Processor. IEEE Trans. Dependable Secur. Comput. 16(2): 204-216 (2019) - [j24]Chip-Hong Chang, Marten van Dijk, Ulrich Rührmair, Mark M. Tehranipoor:
Emerging Attacks and Solutions for Secure Hardware in the Internet of Things. IEEE Trans. Dependable Secur. Comput. 16(3): 373-375 (2019) - 2018
- [j23]Emil Stefanov, Marten van Dijk, Elaine Shi, T.-H. Hubert Chan, Christopher W. Fletcher, Ling Ren, Xiangyao Yu, Srinivas Devadas:
Path ORAM: An Extremely Simple Oblivious RAM Protocol. J. ACM 65(4): 18:1-18:26 (2018) - 2017
- [j22]Chenglu Jin, Charles Herder, Ling Ren, Phuong Ha Nguyen, Benjamin Fuller, Srinivas Devadas, Marten van Dijk:
FPGA Implementation of a Cryptographically-Secure PUF Based on Learning Parity with Noise. Cryptogr. 1(3): 23 (2017) - [j21]Charles Herder, Ling Ren, Marten van Dijk, Meng-Day (Mandel) Yu, Srinivas Devadas:
Trapdoor Computational Fuzzy Extractors and Stateless Cryptographically-Secure Physical Unclonable Functions. IEEE Trans. Dependable Secur. Comput. 14(1): 65-82 (2017) - 2013
- [j20]Ulrich Rührmair, Marten van Dijk:
On the practical use of physical unclonable functions in oblivious transfer and bit commitment protocols. J. Cryptogr. Eng. 3(1): 17-28 (2013) - [j19]Marten van Dijk, Ari Juels, Alina Oprea, Ronald L. Rivest:
FlipIt: The Game of "Stealthy Takeover". J. Cryptol. 26(4): 655-713 (2013) - 2008
- [j18]Blaise Gassend, Marten van Dijk, Dwaine E. Clarke, Emina Torlak, Srinivas Devadas, Pim Tuyls:
Controlled physical random functions and applications. ACM Trans. Inf. Syst. Secur. 10(4): 3:1-3:22 (2008) - 2007
- [j17]Blaise Gassend, Charles W. O'Donnell, William Thies, Andrew Lee, Marten van Dijk, Srinivas Devadas:
Learning biophysically-motivated parameters for alpha helix prediction. BMC Bioinform. 8(S-5) (2007) - 2006
- [j16]Marten van Dijk, Dwaine E. Clarke, Blaise Gassend, G. Edward Suh, Srinivas Devadas:
Speeding up Exponentiation using an Untrusted Computational Resource. Des. Codes Cryptogr. 39(2): 253-273 (2006) - [j15]Marten van Dijk, Tom A. M. Kevenaar, Geert Jan Schrijen, Pim Tuyls:
Improved constructions of secret sharing schemes by applying (lambda, omega)-decompositions. Inf. Process. Lett. 99(4): 154-157 (2006) - 2005
- [j14]Marten van Dijk, Sebastian Egner, Marcus Greferath, Alfred Wassermann:
On two doubly even self-dual binary codes of length 160 and minimum weight 24. IEEE Trans. Inf. Theory 51(1): 408-411 (2005) - [j13]Frans M. J. Willems, Marten van Dijk:
Capacity and codes for embedding information in gray-scale signals. IEEE Trans. Inf. Theory 51(3): 1209-1214 (2005) - [j12]Daihyun Lim, Jae W. Lee, Blaise Gassend, G. Edward Suh, Marten van Dijk, Srinivas Devadas:
Extracting secret keys from integrated circuits. IEEE Trans. Very Large Scale Integr. Syst. 13(10): 1200-1205 (2005) - 2004
- [j11]Blaise Gassend, Daihyun Lim, Dwaine E. Clarke, Marten van Dijk, Srinivas Devadas:
Identification and authentication of integrated circuits. Concurr. Pract. Exp. 16(11): 1077-1098 (2004) - 2003
- [j10]Shengli Liu, Henk C. A. van Tilborg, Marten van Dijk:
A Practical Protocol for Advantage Distillation and Information Reconciliation. Des. Codes Cryptogr. 30(1): 39-62 (2003) - [j9]Marten van Dijk, Augustus J. E. M. Janssen, Arie G. C. Koppelaar:
Correcting systematic mismatches in computed log-likelihood ratios. Eur. Trans. Telecommun. 14(3): 227-244 (2003) - [j8]Marten van Dijk, Sebastian Egner, Ravi Motwani, Arie G. C. Koppelaar:
Simultaneous zero-tailing of parallel concatenated codes. IEEE Trans. Inf. Theory 49(9): 2236-2241 (2003) - 1999
- [j7]Marten van Dijk, Ludo M. G. M. Tolhuizen:
Efficient encoding for a class of subspace subcodes. IEEE Trans. Inf. Theory 45(6): 2142-2146 (1999) - 1998
- [j6]Marten van Dijk, Christian Gehrmann, Ben J. M. Smeets:
Unconditionally Secure Group Authentication. Des. Codes Cryptogr. 14(3): 281-296 (1998) - [j5]Marten van Dijk, Wen-Ai Jackson, Keith M. Martin:
A General Decomposition Construction for Incomplete Secret Sharing Schemes. Des. Codes Cryptogr. 15(3): 301-321 (1998) - 1997
- [j4]Marten van Dijk:
A Linear Construction of Secret Sharing Schemes. Des. Codes Cryptogr. 12(2): 161-201 (1997) - [j3]Marten van Dijk:
More Information Theoretical Inequalities to be Used in Secret Sharing? Inf. Process. Lett. 63(1): 41-44 (1997) - [j2]Marten van Dijk:
On a special class of broadcast channels with confidential messages. IEEE Trans. Inf. Theory 43(2): 712-714 (1997) - 1995
- [j1]Marten van Dijk:
On the Information Rate of Perfect Secret Sharing Schemes. Des. Codes Cryptogr. 6(2): 143-169 (1995)
Conference and Workshop Papers
- 2024
- [c78]Zachary DiMeglio, Jenna Bustami, Deniz Gurevin, Chenglu Jin, Marten van Dijk, Omer Khan:
Masked Memory Primitive for Key Insulated Schemes. HOST 2024: 293-303 - [c77]Marten van Dijk, Nhuong V. Nguyen, Toan N. Nguyen, Lam M. Nguyen, Phuong Ha Nguyen:
Proactive DP: A Multiple Target Optimization Framework for DP-SGD. ICML 2024 - 2022
- [c76]Marten van Dijk:
Towards Remote Verifiable Computation without Digital Secrets. ASHES@CCS 2022: 1 - [c75]Marten van Dijk, Francesco Regazzoni:
CCSW '22: The 2022 Cloud Computing Security Workshop. CCS 2022: 3541-3542 - 2021
- [c74]Nhuong V. Nguyen, Toan N. Nguyen, Phuong Ha Nguyen, Quoc Tran-Dinh, Lam M. Nguyen, Marten van Dijk:
Hogwild! over Distributed Local Data Sets with Linearly Increasing Mini-Batch Sizes. AISTATS 2021: 1207-1215 - [c73]Kaleel Mahmood, Rigel Mahmood, Marten van Dijk:
On the Robustness of Vision Transformers to Adversarial Examples. ICCV 2021: 7818-7827 - 2020
- [c72]Nhan H. Pham, Lam M. Nguyen, Dzung T. Phan, Phuong Ha Nguyen, Marten van Dijk, Quoc Tran-Dinh:
A Hybrid Stochastic Policy Gradient Algorithm for Reinforcement Learning. AISTATS 2020: 374-385 - [c71]Chenglu Jin, Wayne P. Burleson, Marten van Dijk, Ulrich Rührmair:
Erasable PUFs: Formal Treatment and Generic Design. ASHES@CCS 2020: 21-33 - [c70]Ran Canetti, Marten van Dijk, Hoda Maleki, Ulrich Rührmair, Patrick Schaumont:
Using Universal Composition to Design and Analyze Secure Complex Hardware Systems. DATE 2020: 520-525 - 2019
- [c69]Chenglu Jin, Zheng Yang, Marten van Dijk, Jianying Zhou:
Proof of aliveness. ACSAC 2019: 1-16 - [c68]Saeed Valizadeh, Marten van Dijk:
MalPro: A Learning-based Malware Propagation and Containment Modeling. CCSW 2019: 45-56 - [c67]Marten van Dijk, Lam M. Nguyen, Phuong Ha Nguyen, Dzung T. Phan:
Characterization of Convex Objective Functions and Optimal Expected Convergence Rates for SGD. ICML 2019: 6392-6400 - [c66]Ali Shuja Siddiqui, Geraldine Shirley, Sam Reji Joseph, Yutian Gui, Jim Plusquellic, Marten van Dijk, Fareena Saqib:
Multilayer Camouflaged Secure Boot for SoCs. MTV 2019: 56-61 - [c65]Phuong Ha Nguyen, Lam M. Nguyen, Marten van Dijk:
Tight Dimension Independent Lower Bound on the Expected Convergence Rate for Diminishing Step Sizes in SGD. NeurIPS 2019: 3660-3669 - [c64]Kyle Hogan, Hoda Maleki, Reza Rahaeimehr, Ran Canetti, Marten van Dijk, Jason Hennessey, Mayank Varia, Haibin Zhang:
On the Universally Composable Security of OpenStack. SecDev 2019: 20-33 - 2018
- [c63]Marten van Dijk, Chenglu Jin, Hoda Maleki, Phuong Ha Nguyen, Reza Rahaeimehr:
Weak-Unforgeable Tags for Secure Supply Chain Management. Financial Cryptography 2018: 80-98 - [c62]Hamza Omar, Syed Kamran Haider, Ling Ren, Marten van Dijk, Omer Khan:
Breaking the Oblivious-RAM Bandwidth Wall. ICCD 2018: 115-122 - [c61]Lam M. Nguyen, Phuong Ha Nguyen, Marten van Dijk, Peter Richtárik, Katya Scheinberg, Martin Takác:
SGD and Hogwild! Convergence Without the Bounded Gradients Assumption. ICML 2018: 3747-3755 - [c60]Chenglu Jin, Saeed Valizadeh, Marten van Dijk:
Snapshotter: Lightweight intrusion detection and prevention system for industrial control systems. ICPS 2018: 824-829 - 2017
- [c59]Hoda Maleki, Reza Rahaeimehr, Marten van Dijk:
SoK: RFID-based Clone Detection Mechanisms for Supply Chains. ASHES@CCS 2017: 33-41 - [c58]Chip-Hong Chang, Marten van Dijk, Farinaz Koushanfar, Ulrich Rührmair, Mark M. Tehranipoor:
ASHES 2017: Workshop on Attacks and Solutions in Hardware Security. CCS 2017: 2623-2625 - [c57]Chenglu Jin, Lingyu Ren, Xubin Liu, Peng Zhang, Marten van Dijk:
Mitigating Synchronized Hardware Trojan Attacks in Smart Grids. SPSR-SG@CPSWeek 2017: 35-40 - [c56]Hoda Maleki, Reza Rahaeimehr, Chenglu Jin, Marten van Dijk:
New clone-detection approach for RFID-based supply chains. HOST 2017: 122-127 - [c55]Tara Merin John, Syed Kamran Haider, Hamza Omar, Marten van Dijk:
Connecting the dots: Privacy leakage via write-access patterns to the main memory. HOST 2017: 170 - [c54]Syed Kamran Haider, Chenglu Jin, Marten van Dijk:
Advancing the state-of-the-art in hardware Trojans design. MWSCAS 2017: 823-826 - [c53]Syed Kamran Haider, Hamza Omar, Ilia A. Lebedev, Srinivas Devadas, Marten van Dijk:
Leveraging Hardware Isolation for Process Level Access Control & Authentication. SACMAT 2017: 133-141 - 2016
- [c52]Hoda Maleki, Saeed Valizadeh, William Koch, Azer Bestavros, Marten van Dijk:
Markov Modeling of Moving Target Defense Games. MTD@CCS 2016: 81-92 - [c51]Srinivas Devadas, Marten van Dijk, Christopher W. Fletcher, Ling Ren, Elaine Shi, Daniel Wichs:
Onion ORAM: A Constant Bandwidth Blowup Oblivious RAM. TCC (A2) 2016: 145-174 - 2015
- [c50]Christopher W. Fletcher, Ling Ren, Albert Kwon, Marten van Dijk, Srinivas Devadas:
Freecursive ORAM: [Nearly] Free Recursion and Integrity Verification for Position-based Oblivious RAM. ASPLOS 2015: 103-116 - [c49]Marten van Dijk:
Hardware Security and its Adversaries. TrustED@CCS 2015: 1-2 - [c48]Christopher W. Fletcher, Ling Ren, Albert Kwon, Marten van Dijk, Emil Stefanov, Dimitrios N. Serpanos, Srinivas Devadas:
A Low-Latency, Low-Area Hardware Oblivious RAM Controller. FCCM 2015: 215-222 - [c47]Viktoria Grindle, Syed Kamran Haider, John Magee, Marten van Dijk:
Virtual Fingerprint - Image-Based Authentication Increases Privacy for Users of Mouse-Replacement Interfaces. HCI (10) 2015: 182-191 - [c46]Syed Kamran Haider, Masab Ahmad, Farrukh Hijaz, Astha Patni, Ethan Johnson, Matthew Seita, Omer Khan, Marten van Dijk:
M-MAP: Multi-factor memory authentication for secure embedded processors. ICCD 2015: 471-474 - [c45]Masab Ahmad, Syed Kamran Haider, Farrukh Hijaz, Marten van Dijk, Omer Khan:
Exploring the performance implications of memory safety primitives in many-core processors executing multi-threaded workloads. HASP@ISCA 2015: 6:1-6:8 - [c44]Xiangyao Yu, Syed Kamran Haider, Ling Ren, Christopher W. Fletcher, Albert Kwon, Marten van Dijk, Srinivas Devadas:
PrORAM: dynamic prefetcher for oblivious RAM. ISCA 2015: 616-628 - [c43]Ling Ren, Christopher W. Fletcher, Albert Kwon, Emil Stefanov, Elaine Shi, Marten van Dijk, Srinivas Devadas:
Constants Count: Practical Improvements to Oblivious RAM. USENIX Security Symposium 2015: 415-430 - 2014
- [c42]Marten van Dijk, Ulrich Rührmair:
Protocol attacks on advanced PUF protocols and countermeasures. DATE 2014: 1-6 - [c41]Christopher W. Fletcher, Ling Ren, Xiangyao Yu, Marten van Dijk, Omer Khan, Srinivas Devadas:
Suppressing the Oblivious RAM timing channel while making information leakage and program efficiency trade-offs. HPCA 2014: 213-224 - [c40]G. Edward Suh, Christopher W. Fletcher, Dwaine E. Clarke, Blaise Gassend, Marten van Dijk, Srinivas Devadas:
Author retrospective AEGIS: architecture for tamper-evident and tamper-resistant processing. ICS 25th Anniversary 2014: 68-70 - [c39]Marten van Dijk, Uli Rührmair:
PUF Interfaces and their Security. ISVLSI 2014: 25-28 - 2013
- [c38]Xiangyao Yu, Christopher W. Fletcher, Ling Ren, Marten van Dijk, Srinivas Devadas:
Generalized external interaction with tamper-resistant hardware with bounded information leakage. CCSW 2013: 23-34 - [c37]Emil Stefanov, Marten van Dijk, Elaine Shi, Christopher W. Fletcher, Ling Ren, Xiangyao Yu, Srinivas Devadas:
Path ORAM: an extremely simple oblivious RAM protocol. CCS 2013: 299-310 - [c36]Ling Ren, Christopher W. Fletcher, Xiangyao Yu, Marten van Dijk, Srinivas Devadas:
Integrity verification for path Oblivious-RAM. HPEC 2013: 1-6 - [c35]Ling Ren, Xiangyao Yu, Christopher W. Fletcher, Marten van Dijk, Srinivas Devadas:
Design space exploration and optimization of path oblivious RAM in secure processors. ISCA 2013: 571-582 - [c34]Ulrich Rührmair, Marten van Dijk:
PUFs in Security Protocols: Attack Models and Security Evaluations. IEEE Symposium on Security and Privacy 2013: 286-300 - 2012
- [c33]Emil Stefanov, Marten van Dijk, Ari Juels, Alina Oprea:
Iris: a scalable cloud file system with efficient integrity checks. ACSAC 2012: 229-238 - [c32]Christopher W. Fletcher, Marten van Dijk, Srinivas Devadas:
Towards an interpreter for efficient encrypted computation. CCSW 2012: 83-94 - [c31]Marten van Dijk, Ari Juels, Alina Oprea, Ronald L. Rivest, Emil Stefanov, Nikos Triandopoulos:
Hourglass schemes: how to prove that cloud files are encrypted. CCS 2012: 265-280 - [c30]Ulrich Rührmair, Marten van Dijk:
Practical Security Analysis of PUF-Based Two-Player Protocols. CHES 2012: 251-267 - [c29]Kevin D. Bowers, Marten van Dijk, Robert Griffin, Ari Juels, Alina Oprea, Ronald L. Rivest, Nikos Triandopoulos:
Defending against the Unknown Enemy: Applying FlipIt to System Security. GameSec 2012: 248-263 - 2011
- [c28]Kevin D. Bowers, Marten van Dijk, Ari Juels, Alina Oprea, Ronald L. Rivest:
How to tell if your cloud files are vulnerable to drive crashes. CCS 2011: 501-514 - [c27]Tamara Denning, Kevin D. Bowers, Marten van Dijk, Ari Juels:
Exploring implicit memory for painless password recovery. CHI 2011: 2615-2618 - 2010
- [c26]Marten van Dijk, Craig Gentry, Shai Halevi, Vinod Vaikuntanathan:
Fully Homomorphic Encryption over the Integers. EUROCRYPT 2010: 24-43 - [c25]Marten van Dijk, Ari Juels:
On the Impossibility of Cryptography Alone for Privacy-Preserving Cloud Computing. HotSec 2010 - 2009
- [c24]Michel A. Kinsy, Myong Hyon Cho, Tina Wen, G. Edward Suh, Marten van Dijk, Srinivas Devadas:
Application-aware deadlock-free oblivious routing. ISCA 2009: 208-219 - 2008
- [c23]Victor Costan, Luis F. G. Sarmenta, Marten van Dijk, Srinivas Devadas:
The Trusted Execution Module: Commodity General-Purpose Trusted Computing. CARDIS 2008: 133-148 - [c22]Luis F. G. Sarmenta, Marten van Dijk, Jonathan Rhodes, Srinivas Devadas:
Offline count-limited certificates. SAC 2008: 2145-2152 - 2007
- [c21]Marten van Dijk, Jonathan Rhodes, Luis F. G. Sarmenta, Srinivas Devadas:
Offline untrusted storage with immediate detection of forking and replay attacks. STC 2007: 41-48 - 2006
- [c20]Luis F. G. Sarmenta, Marten van Dijk, Charles W. O'Donnell, Jonathan Rhodes, Srinivas Devadas:
Virtual monotonic counters and count-limited objects using a TPM without a trusted OS. STC 2006: 27-42 - [c19]Blaise Gassend, Charles W. O'Donnell, William Thies, Andrew Lee, Marten van Dijk, Srinivas Devadas:
Predicting Secondary Structure of All-Helical Proteins Using Hidden Markov Support Vector Machines. PRIB 2006: 93-104 - 2005
- [c18]Marten van Dijk, Robert Granger, Dan Page, Karl Rubin, Alice Silverberg, Martijn Stam, David P. Woodruff:
Practical Cryptography in High Dimensional Tori. EUROCRYPT 2005: 234-250 - [c17]Marten van Dijk, Pim Tuyls:
Secure biometrics. EUSIPCO 2005: 1-4 - [c16]Dwaine E. Clarke, G. Edward Suh, Blaise Gassend, Ajay Sudan, Marten van Dijk, Srinivas Devadas:
Towards Constant Bandwidth Overhead Integrity Checking of Untrusted Data. S&P 2005: 139-153 - 2004
- [c15]Marten van Dijk, David P. Woodruff:
Asymptotically Optimal Communication for Torus-Based Cryptography. CRYPTO 2004: 157-178 - 2003
- [c14]Dwaine E. Clarke, Srinivas Devadas, Marten van Dijk, Blaise Gassend, G. Edward Suh:
Incremental Multiset Hash Functions and Their Application to Memory Integrity Checking. ASIACRYPT 2003: 188-207 - [c13]Blaise Gassend, G. Edward Suh, Dwaine E. Clarke, Marten van Dijk, Srinivas Devadas:
Caches and Hash Trees for Efficient Memory Integrity Verification. HPCA 2003: 295-306 - [c12]G. Edward Suh, Dwaine E. Clarke, Blaise Gassend, Marten van Dijk, Srinivas Devadas:
AEGIS: architecture for tamper-evident and tamper-resistant processing. ICS 2003: 160-171 - [c11]G. Edward Suh, Dwaine E. Clarke, Blaise Gassend, Marten van Dijk, Srinivas Devadas:
Efficient Memory Integrity Verification and Encryption for Secure Processors. MICRO 2003: 339-350 - [c10]Blaise Gassend, Dwaine E. Clarke, Marten van Dijk, Srinivas Devadas:
Delay-Based Circuit Authentication and Applications. SAC 2003: 294-301 - [c9]Pim Tuyls, Tom A. M. Kevenaar, Geert Jan Schrijen, Toine Staring, Marten van Dijk:
Visual Crypto Displays Enabling Secure Communications. SPC 2003: 271-284 - 2002
- [c8]Blaise Gassend, Dwaine E. Clarke, Marten van Dijk, Srinivas Devadas:
Controlled Physical Random Functions. ACSAC 2002: 149-160 - [c7]Blaise Gassend, Dwaine E. Clarke, Marten van Dijk, Srinivas Devadas:
Silicon physical random functions. CCS 2002: 148-160 - [c6]David P. Woodruff, Marten van Dijk:
Cryptography in an Unbounded Computational Model. EUROCRYPT 2002: 149-164 - [c5]Dwaine E. Clarke, Blaise Gassend, Thomas Kotwal, Matt Burnside, Marten van Dijk, Srinivas Devadas, Ronald L. Rivest:
The Untrusted Computer Problem and Camera-Based Authentication. Pervasive 2002: 114-124 - 2001
- [c4]Margreta Kuijper, Marten van Dijk, Henk D. L. Hollmann, Job Oostveen:
A Unifying System-Theoretic Framework for Errors-and-Erasures Reed-Solomon Decoding. AAECC 2001: 343-352 - 1998
- [c3]Ton Kalker, Jean-Paul M. G. Linnartz, Marten van Dijk:
Watermark Estimation through Detector Analysis. ICIP (1) 1998: 425-429 - [c2]Jean-Paul M. G. Linnartz, Marten van Dijk:
Analysis of the Sensitivity Attack against Electronic Watermarks in Images. Information Hiding 1998: 258-272 - 1994
- [c1]Marten van Dijk:
A Linear Construction of Perfect Secret Sharing Schemes. EUROCRYPT 1994: 23-34
Editorship
- 2022
- [e2]Francesco Regazzoni, Marten van Dijk:
Proceedings of the 2022 on Cloud Computing Security Workshop, CCSW 2022, Los Angeles, CA, USA, 7 November 2022. ACM 2022, ISBN 978-1-4503-9875-6 [contents] - 2021
- [e1]Yinqian Zhang, Marten van Dijk:
CCSW@CCS '21: Proceedings of the 2021 on Cloud Computing Security Workshop, Virtual Event, Republic of Korea, 15 November 2021. ACM 2021, ISBN 978-1-4503-8653-1 [contents]
Informal and Other Publications
- 2024
- [i69]Chaoyi Zhu, Jiayi Tang, Hans Brouwer, Juan F. Pérez, Marten van Dijk, Lydia Y. Chen:
Quantifying and Mitigating Privacy Risks for Tabular Generative Models. CoRR abs/2403.07842 (2024) - 2023
- [i68]Marten van Dijk, Phuong Ha Nguyen:
Considerations on the Theory of Training Models with Differential Privacy. CoRR abs/2303.04676 (2023) - [i67]Toan N. Nguyen, Phuong Ha Nguyen, Lam M. Nguyen, Marten van Dijk:
Batch Clipping and Adaptive Layerwise Clipping for Differential Private Stochastic Gradient Descent. CoRR abs/2307.11939 (2023) - [i66]Niloufar Sayadi, Phuong Ha Nguyen, Marten van Dijk, Chenglu Jin:
Breaking XOR Arbiter PUFs without Reliability Information. CoRR abs/2312.01256 (2023) - [i65]Reza Rahaeimehr, Marten van Dijk:
Recursive Augmented Fernet (RAF) Token: Alleviating the Pain of Stolen Tokens. CoRR abs/2312.08086 (2023) - 2022
- [i64]Deniz Gurevin, Chenglu Jin, Phuong Ha Nguyen, Omer Khan, Marten van Dijk:
Secure Remote Attestation with Strong Key Insulation Guarantees. CoRR abs/2201.01834 (2022) - [i63]Lam M. Nguyen, Trang H. Tran, Marten van Dijk:
Finite-Sum Optimization: A New Perspective for Convergence to a Global Solution. CoRR abs/2202.03524 (2022) - [i62]Ethan Rathbun, Kaleel Mahmood, Sohaib Ahmad, Caiwen Ding, Marten van Dijk:
Game Theoretic Mixed Experts for Combinational Adversarial Machine Learning. CoRR abs/2211.14669 (2022) - [i61]Marten van Dijk, Phuong Ha Nguyen, Toan N. Nguyen, Lam M. Nguyen:
Generalizing DP-SGD with Shuffling and Batching Clipping. CoRR abs/2212.05796 (2022) - [i60]Marten van Dijk, Chenglu Jin:
A Theoretical Framework for the Analysis of Physical Unclonable Function Interfaces and its Relation to the Random Oracle Model. IACR Cryptol. ePrint Arch. 2022: 1069 (2022) - 2021
- [i59]Marten van Dijk, Nhuong V. Nguyen, Toan N. Nguyen, Lam M. Nguyen, Phuong Ha Nguyen:
Differential Private Hogwild! over Distributed Local Data Sets. CoRR abs/2102.09030 (2021) - [i58]Kaleel Mahmood, Rigel Mahmood, Marten van Dijk:
On the Robustness of Vision Transformers to Adversarial Examples. CoRR abs/2104.02610 (2021) - [i57]Kaleel Mahmood, Rigel Mahmood, Ethan Rathbun, Marten van Dijk:
Back in Black: A Comparative Evaluation of Recent State-Of-The-Art Black-Box Attacks. CoRR abs/2109.15031 (2021) - [i56]Marten van Dijk, Deniz Gurevin, Chenglu Jin, Omer Khan, Phuong Ha Nguyen:
Autonomous Secure Remote Attestation even when all Used and to be Used Digital Keys Leak. IACR Cryptol. ePrint Arch. 2021: 602 (2021) - [i55]Marten van Dijk, Deniz Gurevin, Chenglu Jin, Omer Khan, Phuong Ha Nguyen:
Bilinear Map Based One-Time Signature Scheme with Secret Key Exposure. IACR Cryptol. ePrint Arch. 2021: 925 (2021) - 2020
- [i54]Lam M. Nguyen, Quoc Tran-Dinh, Dzung T. Phan, Phuong Ha Nguyen, Marten van Dijk:
A Unified Convergence Analysis for Shuffling-Type Gradient Methods. CoRR abs/2002.08246 (2020) - [i53]Nhan H. Pham, Lam M. Nguyen, Dzung T. Phan, Phuong Ha Nguyen, Marten van Dijk, Quoc Tran-Dinh:
A Hybrid Stochastic Policy Gradient Algorithm for Reinforcement Learning. CoRR abs/2003.00430 (2020) - [i52]Kaleel Mahmood, Deniz Gurevin, Marten van Dijk, Phuong Ha Nguyen:
Beware the Black-Box: on the Robustness of Recent Defenses to Adversarial Examples. CoRR abs/2006.10876 (2020) - [i51]Marten van Dijk, Nhuong V. Nguyen, Toan N. Nguyen, Lam M. Nguyen, Quoc Tran-Dinh, Phuong Ha Nguyen:
Asynchronous Federated Learning with Reduced Number of Rounds and with Differential Privacy from Less Aggregated Gaussian Noise. CoRR abs/2007.09208 (2020) - [i50]Marten van Dijk, Nhuong V. Nguyen, Toan N. Nguyen, Lam M. Nguyen, Quoc Tran-Dinh, Phuong Ha Nguyen:
Hogwild! over Distributed Local Data Sets with Linearly Increasing Mini-Batch Sizes. CoRR abs/2010.14763 (2020) - 2019
- [i49]Saeed Valizadeh, Marten van Dijk:
Toward a Theory of Cyber Attacks. CoRR abs/1901.01598 (2019) - [i48]Lam M. Nguyen, Marten van Dijk, Dzung T. Phan, Phuong Ha Nguyen, Tsui-Wei Weng, Jayant R. Kalagnanam:
Optimal Finite-Sum Smooth Non-Convex Optimization with SARAH. CoRR abs/1901.07648 (2019) - [i47]Saeed Valizadeh, Marten van Dijk:
On the Convergence Rates of Learning-based Signature Generation Schemes to Contain Self-propagating Malware. CoRR abs/1905.00154 (2019) - [i46]Phuong Ha Nguyen, Kaleel Mahmood, Lam M. Nguyen, Thanh Nguyen, Marten van Dijk:
BUZz: BUffer Zones for defending adversarial examples in image classification. CoRR abs/1910.02785 (2019) - [i45]Nils Wisiol, Christopher Mühl, Niklas Pirnay, Phuong Ha Nguyen, Marian Margraf, Jean-Pierre Seifert, Marten van Dijk, Ulrich Rührmair:
Splitting the Interpose PUF: A Novel Modeling Attack Strategy. IACR Cryptol. ePrint Arch. 2019: 1473 (2019) - 2018
- [i44]Lam M. Nguyen, Phuong Ha Nguyen, Marten van Dijk, Peter Richtárik, Katya Scheinberg, Martin Takác:
SGD and Hogwild! Convergence Without the Bounded Gradients Assumption. CoRR abs/1802.03801 (2018) - [i43]Syed Kamran Haider, Chenglu Jin, Marten van Dijk:
Comments on "Defeating HaTCh: Building Malicious IP Cores". CoRR abs/1804.04783 (2018) - [i42]Yansong Gao, Marten van Dijk, Lei Xu, Surya Nepal, Damith Chinthana Ranasinghe:
TREVERSE: Trial-and-Error Lightweight Secure Reverse Authentication with Simulatable PUFs. CoRR abs/1807.11046 (2018) - [i41]Marten van Dijk, Lam M. Nguyen, Phuong Ha Nguyen, Dzung T. Phan:
Characterization of Convex Objective Functions and Optimal Expected Convergence Rates for SGD. CoRR abs/1810.04100 (2018) - [i40]Phuong Ha Nguyen, Lam M. Nguyen, Marten van Dijk:
Tight Dimension Independent Lower Bound on Optimal Expected Convergence Rate for Diminishing Step Sizes in SGD. CoRR abs/1810.04723 (2018) - [i39]Lam M. Nguyen, Phuong Ha Nguyen, Peter Richtárik, Katya Scheinberg, Martin Takác, Marten van Dijk:
New Convergence Aspects of Stochastic Gradient Algorithms. CoRR abs/1811.12403 (2018) - [i38]Phuong Ha Nguyen, Durga Prasad Sahoo, Chenglu Jin, Kaleel Mahmood, Ulrich Rührmair, Marten van Dijk:
The Interpose PUF: Secure PUF Design against State-of-the-art Machine Learning Attacks. IACR Cryptol. ePrint Arch. 2018: 350 (2018) - [i37]Yansong Gao, Chenglu Jin, Jeeson Kim, Hussein Nili, Xiaolin Xu, Wayne P. Burleson, Omid Kavehei, Marten van Dijk, Damith Chinthana Ranasinghe, Ulrich Rührmair:
Efficient Erasable PUFs from Programmable Logic and Memristors. IACR Cryptol. ePrint Arch. 2018: 358 (2018) - [i36]Kyle Hogan, Hoda Maleki, Reza Rahaeimehr, Ran Canetti, Marten van Dijk, Jason Hennessey, Mayank Varia, Haibin Zhang:
On the Universally Composable Security of OpenStack. IACR Cryptol. ePrint Arch. 2018: 602 (2018) - [i35]Chenglu Jin, Marten van Dijk, Michael K. Reiter, Haibin Zhang:
PwoP: Intrusion-Tolerant and Privacy-Preserving Sensor Fusion. IACR Cryptol. ePrint Arch. 2018: 1171 (2018) - 2017
- [i34]Tara Merin John, Syed Kamran Haider, Hamza Omar, Marten van Dijk:
Connecting the Dots: Privacy Leakage via Write-Access Patterns to the Main Memory. CoRR abs/1702.03965 (2017) - [i33]Raihan Sayeed Khan, Nadim Kanan, Chenglu Jin, Jake Scoggin, Nafisa Noor, Sadid Muneer, Faruk Dirisaglik, Phuong Ha Nguyen, Helena Silva, Marten van Dijk, Ali Gokirmak:
Intrinsically Reliable and Lightweight Physical Obfuscated Keys. CoRR abs/1703.07427 (2017) - [i32]Syed Kamran Haider, Marten van Dijk:
Revisiting Definitional Foundations of Oblivious RAM for Secure Processor Implementations. CoRR abs/1706.03852 (2017) - [i31]Charles Herder, Benjamin Fuller, Marten van Dijk, Srinivas Devadas:
Public Key Cryptosystems with Noisy Secret Keys. IACR Cryptol. ePrint Arch. 2017: 210 (2017) - [i30]Phuong Ha Nguyen, Durga Prasad Sahoo, Chenglu Jin, Kaleel Mahmood, Marten van Dijk:
MXPUF: Secure PUF Design against State-of-the-art Modeling Attacks. IACR Cryptol. ePrint Arch. 2017: 572 (2017) - [i29]Marten van Dijk, Chenglu Jin, Hoda Maleki, Phuong Ha Nguyen, Reza Rahaeimehr:
Weak-Unforgeable Tags for Secure Supply Chain Management. IACR Cryptol. ePrint Arch. 2017: 1221 (2017) - 2016
- [i28]Syed Kamran Haider, Chenglu Jin, Marten van Dijk:
Advancing the State-of-the-Art in Hardware Trojans Design. CoRR abs/1605.08413 (2016) - [i27]Syed Kamran Haider, Marten van Dijk:
Flat ORAM: A Simplified Write-Only Oblivious RAM Construction for Secure Processor Architectures. CoRR abs/1611.01571 (2016) - [i26]Hoda Maleki, Reza Rahaeimehr, Marten van Dijk:
LightSource: Ultra Lightweight Clone Detection of RFID Tags from Software Unclonable Responses. IACR Cryptol. ePrint Arch. 2016: 608 (2016) - [i25]Mohammad Hadi Valizadeh, Hoda Maleki, William Koch, Azer Bestavros, Marten van Dijk:
Markov Modeling of Moving Target Defense Games. IACR Cryptol. ePrint Arch. 2016: 741 (2016) - 2015
- [i24]Srinivas Devadas, Marten van Dijk, Christopher W. Fletcher, Ling Ren:
Onion ORAM: A Constant Bandwidth and Constant Client Storage ORAM (without FHE or SWHE). IACR Cryptol. ePrint Arch. 2015: 5 (2015) - [i23]Chenglu Jin, Marten van Dijk:
Secure and Efficient Initialization and Authentication Protocols for SHIELD. IACR Cryptol. ePrint Arch. 2015: 210 (2015) - [i22]Syed Kamran Haider, Masab Ahmad, Farrukh Hijaz, Astha Patni, Ethan Johnson, Matthew Seita, Omer Khan, Marten van Dijk:
M-MAP: Multi-Factor Memory Authentication for Secure Embedded Processors. IACR Cryptol. ePrint Arch. 2015: 831 (2015) - [i21]Chenglu Jin, Xiaolin Xu, Wayne P. Burleson, Ulrich Rührmair, Marten van Dijk:
PLayPUF: Programmable Logically Erasable PUFs for Forward and Backward Secure Key Management. IACR Cryptol. ePrint Arch. 2015: 1052 (2015) - 2014
- [i20]Ling Ren, Christopher W. Fletcher, Xiangyao Yu, Albert Kwon, Marten van Dijk, Srinivas Devadas:
Unified Oblivious-RAM: Improving Recursive ORAM with Locality and Pseudorandomness. IACR Cryptol. ePrint Arch. 2014: 205 (2014) - [i19]Xiangyao Yu, Ling Ren, Christopher W. Fletcher, Albert Kwon, Marten van Dijk, Srinivas Devadas:
Enhancing Oblivious RAM Performance Using Dynamic Prefetching. IACR Cryptol. ePrint Arch. 2014: 234 (2014) - [i18]Christopher W. Fletcher, Ling Ren, Albert Kwon, Marten van Dijk, Emil Stefanov, Srinivas Devadas:
RAW Path ORAM: A Low-Latency, Low-Area Hardware ORAM Controller with Integrity Verification. IACR Cryptol. ePrint Arch. 2014: 431 (2014) - [i17]Charles Herder, Ling Ren, Marten van Dijk, Meng-Day (Mandel) Yu, Srinivas Devadas:
Trapdoor Computational Fuzzy Extractors. IACR Cryptol. ePrint Arch. 2014: 938 (2014) - [i16]Syed Kamran Haider, Chenglu Jin, Masab Ahmad, Devu Manikantan Shila, Omer Khan, Marten van Dijk:
HaTCh: Hardware Trojan Catcher. IACR Cryptol. ePrint Arch. 2014: 943 (2014) - [i15]Ling Ren, Christopher W. Fletcher, Albert Kwon, Emil Stefanov, Elaine Shi, Marten van Dijk, Srinivas Devadas:
Ring ORAM: Closing the Gap Between Small and Large Client Storage Oblivious RAM. IACR Cryptol. ePrint Arch. 2014: 997 (2014) - 2013
- [i14]Ling Ren, Xiangyao Yu, Christopher W. Fletcher, Marten van Dijk, Srinivas Devadas:
Design Space Exploration and Optimization of Path Oblivious RAM in Secure Processors. IACR Cryptol. ePrint Arch. 2013: 76 (2013) - [i13]Emil Stefanov, Marten van Dijk, Elaine Shi, Christopher W. Fletcher, Ling Ren, Xiangyao Yu, Srinivas Devadas:
Path ORAM: An Extremely Simple Oblivious RAM Protocol. IACR Cryptol. ePrint Arch. 2013: 280 (2013) - 2012
- [i12]Marten van Dijk, Ari Juels, Alina Oprea, Ronald L. Rivest:
FlipIt: The Game of "Stealthy Takeover". IACR Cryptol. ePrint Arch. 2012: 103 (2012) - [i11]Marten van Dijk, Ulrich Rührmair:
Physical Unclonable Functions in Cryptographic Protocols: Security Proofs and Impossibility Results. IACR Cryptol. ePrint Arch. 2012: 228 (2012) - [i10]Christopher W. Fletcher, Marten van Dijk, Srinivas Devadas:
Compilation Techniques for Efficient Encrypted Computation. IACR Cryptol. ePrint Arch. 2012: 266 (2012) - [i9]Kevin D. Bowers, Marten van Dijk, Robert Griffin, Ari Juels, Alina Oprea, Ronald L. Rivest, Nikos Triandopoulos:
Defending Against the Unknown Enemy: Applying FlipIt to System Security. IACR Cryptol. ePrint Arch. 2012: 579 (2012) - 2011
- [i8]Emil Stefanov, Marten van Dijk, Alina Oprea, Ari Juels:
Iris: A Scalable Cloud File System with Efficient Integrity Checks. IACR Cryptol. ePrint Arch. 2011: 585 (2011) - 2010
- [i7]Kevin D. Bowers, Marten van Dijk, Ari Juels, Alina Oprea, Ronald L. Rivest:
How to Tell if Your Cloud Files Are Vulnerable to Drive Crashes. IACR Cryptol. ePrint Arch. 2010: 214 (2010) - [i6]Marten van Dijk, Ari Juels:
On the Impossibility of Cryptography Alone for Privacy-Preserving Cloud Computing. IACR Cryptol. ePrint Arch. 2010: 305 (2010) - 2009
- [i5]Marten van Dijk, Craig Gentry, Shai Halevi, Vinod Vaikuntanathan:
Fully Homomorphic Encryption over the Integers. IACR Cryptol. ePrint Arch. 2009: 616 (2009) - 2006
- [i4]Marten van Dijk, Emina Torlak, Blaise Gassend, Srinivas Devadas:
A Generalized Two-Phase Analysis of Knowledge Flows in Security Protocols. CoRR abs/cs/0605097 (2006) - [i3]Emina Torlak, Marten van Dijk, Blaise Gassend, Daniel Jackson, Srinivas Devadas:
Knowledge Flow Analysis for Security Protocols. CoRR abs/cs/0605109 (2006) - 2004
- [i2]Marten van Dijk, Robert Granger, Dan Page, Karl Rubin, Alice Silverberg, Martijn Stam, David P. Woodruff:
Practical Cryptography in High Dimensional Tori. IACR Cryptol. ePrint Arch. 2004: 352 (2004) - 2003
- [i1]Pim Tuyls, Tom A. M. Kevenaar, Geert Jan Schrijen, Toine Staring, Marten van Dijk:
Visual Crypto Displays Enabling Secure Communications. IACR Cryptol. ePrint Arch. 2003: 118 (2003)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-08 20:32 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint