BibTeX records: Marten van Dijk

download as .bib file

@article{DBLP:journals/corr/abs-2403-07842,
  author       = {Chaoyi Zhu and
                  Jiayi Tang and
                  Hans Brouwer and
                  Juan F. P{\'{e}}rez and
                  Marten van Dijk and
                  Lydia Y. Chen},
  title        = {Quantifying and Mitigating Privacy Risks for Tabular Generative Models},
  journal      = {CoRR},
  volume       = {abs/2403.07842},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2403.07842},
  doi          = {10.48550/ARXIV.2403.07842},
  eprinttype    = {arXiv},
  eprint       = {2403.07842},
  timestamp    = {Thu, 04 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2403-07842.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/DijkJ23,
  author       = {Marten van Dijk and
                  Chenglu Jin},
  title        = {A Theoretical Framework for the Analysis of Physical Unclonable Function
                  Interfaces and Its Relation to the Random Oracle Model},
  journal      = {J. Cryptol.},
  volume       = {36},
  number       = {4},
  pages        = {35},
  year         = {2023},
  url          = {https://doi.org/10.1007/s00145-023-09475-1},
  doi          = {10.1007/S00145-023-09475-1},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/DijkJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2303-04676,
  author       = {Marten van Dijk and
                  Phuong Ha Nguyen},
  title        = {Considerations on the Theory of Training Models with Differential
                  Privacy},
  journal      = {CoRR},
  volume       = {abs/2303.04676},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2303.04676},
  doi          = {10.48550/ARXIV.2303.04676},
  eprinttype    = {arXiv},
  eprint       = {2303.04676},
  timestamp    = {Wed, 15 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2303-04676.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2307-11939,
  author       = {Toan N. Nguyen and
                  Phuong Ha Nguyen and
                  Lam M. Nguyen and
                  Marten van Dijk},
  title        = {Batch Clipping and Adaptive Layerwise Clipping for Differential Private
                  Stochastic Gradient Descent},
  journal      = {CoRR},
  volume       = {abs/2307.11939},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2307.11939},
  doi          = {10.48550/ARXIV.2307.11939},
  eprinttype    = {arXiv},
  eprint       = {2307.11939},
  timestamp    = {Tue, 01 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2307-11939.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2312-01256,
  author       = {Niloufar Sayadi and
                  Phuong Ha Nguyen and
                  Marten van Dijk and
                  Chenglu Jin},
  title        = {Breaking {XOR} Arbiter PUFs without Reliability Information},
  journal      = {CoRR},
  volume       = {abs/2312.01256},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2312.01256},
  doi          = {10.48550/ARXIV.2312.01256},
  eprinttype    = {arXiv},
  eprint       = {2312.01256},
  timestamp    = {Fri, 08 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2312-01256.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2312-08086,
  author       = {Reza Rahaeimehr and
                  Marten van Dijk},
  title        = {Recursive Augmented Fernet {(RAF)} Token: Alleviating the Pain of
                  Stolen Tokens},
  journal      = {CoRR},
  volume       = {abs/2312.08086},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2312.08086},
  doi          = {10.48550/ARXIV.2312.08086},
  eprinttype    = {arXiv},
  eprint       = {2312.08086},
  timestamp    = {Mon, 08 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2312-08086.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/MahmoodMRD22,
  author       = {Kaleel Mahmood and
                  Rigel Mahmood and
                  Ethan Rathbun and
                  Marten van Dijk},
  title        = {Back in Black: {A} Comparative Evaluation of Recent State-Of-The-Art
                  Black-Box Attacks},
  journal      = {{IEEE} Access},
  volume       = {10},
  pages        = {998--1019},
  year         = {2022},
  url          = {https://doi.org/10.1109/ACCESS.2021.3138338},
  doi          = {10.1109/ACCESS.2021.3138338},
  timestamp    = {Fri, 21 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/MahmoodMRD22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/MahmoodNNND22,
  author       = {Kaleel Mahmood and
                  Phuong Ha Nguyen and
                  Lam M. Nguyen and
                  Thanh Nguyen and
                  Marten van Dijk},
  title        = {Besting the Black-Box: Barrier Zones for Adversarial Example Defense},
  journal      = {{IEEE} Access},
  volume       = {10},
  pages        = {1451--1474},
  year         = {2022},
  url          = {https://doi.org/10.1109/ACCESS.2021.3138966},
  doi          = {10.1109/ACCESS.2021.3138966},
  timestamp    = {Fri, 21 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/MahmoodNNND22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/coap/NguyenDPNWK22,
  author       = {Lam M. Nguyen and
                  Marten van Dijk and
                  Dzung T. Phan and
                  Phuong Ha Nguyen and
                  Tsui{-}Wei Weng and
                  Jayant R. Kalagnanam},
  title        = {Finite-sum smooth optimization with {SARAH}},
  journal      = {Comput. Optim. Appl.},
  volume       = {82},
  number       = {3},
  pages        = {561--593},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10589-022-00375-x},
  doi          = {10.1007/S10589-022-00375-X},
  timestamp    = {Mon, 25 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/coap/NguyenDPNWK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/JinBDR22,
  author       = {Chenglu Jin and
                  Wayne P. Burleson and
                  Marten van Dijk and
                  Ulrich R{\"{u}}hrmair},
  title        = {Programmable access-controlled and generic erasable {PUF} design and
                  its applications},
  journal      = {J. Cryptogr. Eng.},
  volume       = {12},
  number       = {4},
  pages        = {413--432},
  year         = {2022},
  url          = {https://doi.org/10.1007/s13389-022-00284-z},
  doi          = {10.1007/S13389-022-00284-Z},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/JinBDR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/GaoDXYNR22,
  author       = {Yansong Gao and
                  Marten van Dijk and
                  Lei Xu and
                  Wei Yang and
                  Surya Nepal and
                  Damith C. Ranasinghe},
  title        = {{TREVERSE:} TRial-and-Error Lightweight Secure ReVERSE Authentication
                  With Simulatable PUFs},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {19},
  number       = {1},
  pages        = {419--437},
  year         = {2022},
  url          = {https://doi.org/10.1109/TDSC.2020.2993802},
  doi          = {10.1109/TDSC.2020.2993802},
  timestamp    = {Fri, 21 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/GaoDXYNR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Dijk22,
  author       = {Marten van Dijk},
  editor       = {Chip{-}Hong Chang and
                  Ulrich R{\"{u}}hrmair and
                  Debdeep Mukhopadhyay and
                  Domenic Forte},
  title        = {Towards Remote Verifiable Computation without Digital Secrets},
  booktitle    = {Proceedings of the 2022 Workshop on Attacks and Solutions in Hardware
                  Security, {ASHES} 2022, Los Angeles, CA, USA, 11 November 2022},
  pages        = {1},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3560834.3563762},
  doi          = {10.1145/3560834.3563762},
  timestamp    = {Tue, 08 Nov 2022 14:20:01 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Dijk22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Dijk022,
  author       = {Marten van Dijk and
                  Francesco Regazzoni},
  editor       = {Heng Yin and
                  Angelos Stavrou and
                  Cas Cremers and
                  Elaine Shi},
  title        = {{CCSW} '22: The 2022 Cloud Computing Security Workshop},
  booktitle    = {Proceedings of the 2022 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2022, Los Angeles, CA, USA, November
                  7-11, 2022},
  pages        = {3541--3542},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3548606.3563821},
  doi          = {10.1145/3548606.3563821},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/Dijk022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccsw-ws/2022,
  editor       = {Francesco Regazzoni and
                  Marten van Dijk},
  title        = {Proceedings of the 2022 on Cloud Computing Security Workshop, {CCSW}
                  2022, Los Angeles, CA, USA, 7 November 2022},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3560810},
  doi          = {10.1145/3560810},
  isbn         = {978-1-4503-9875-6},
  timestamp    = {Thu, 12 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccsw-ws/2022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2201-01834,
  author       = {Deniz Gurevin and
                  Chenglu Jin and
                  Phuong Ha Nguyen and
                  Omer Khan and
                  Marten van Dijk},
  title        = {Secure Remote Attestation with Strong Key Insulation Guarantees},
  journal      = {CoRR},
  volume       = {abs/2201.01834},
  year         = {2022},
  url          = {https://arxiv.org/abs/2201.01834},
  eprinttype    = {arXiv},
  eprint       = {2201.01834},
  timestamp    = {Mon, 10 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2201-01834.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2202-03524,
  author       = {Lam M. Nguyen and
                  Trang H. Tran and
                  Marten van Dijk},
  title        = {Finite-Sum Optimization: {A} New Perspective for Convergence to a
                  Global Solution},
  journal      = {CoRR},
  volume       = {abs/2202.03524},
  year         = {2022},
  url          = {https://arxiv.org/abs/2202.03524},
  eprinttype    = {arXiv},
  eprint       = {2202.03524},
  timestamp    = {Wed, 09 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2202-03524.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2211-14669,
  author       = {Ethan Rathbun and
                  Kaleel Mahmood and
                  Sohaib Ahmad and
                  Caiwen Ding and
                  Marten van Dijk},
  title        = {Game Theoretic Mixed Experts for Combinational Adversarial Machine
                  Learning},
  journal      = {CoRR},
  volume       = {abs/2211.14669},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2211.14669},
  doi          = {10.48550/ARXIV.2211.14669},
  eprinttype    = {arXiv},
  eprint       = {2211.14669},
  timestamp    = {Tue, 29 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2211-14669.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2212-05796,
  author       = {Marten van Dijk and
                  Phuong Ha Nguyen and
                  Toan N. Nguyen and
                  Lam M. Nguyen},
  title        = {Generalizing {DP-SGD} with Shuffling and Batching Clipping},
  journal      = {CoRR},
  volume       = {abs/2212.05796},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2212.05796},
  doi          = {10.48550/ARXIV.2212.05796},
  eprinttype    = {arXiv},
  eprint       = {2212.05796},
  timestamp    = {Mon, 02 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2212-05796.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DijkJ22,
  author       = {Marten van Dijk and
                  Chenglu Jin},
  title        = {A Theoretical Framework for the Analysis of Physical Unclonable Function
                  Interfaces and its Relation to the Random Oracle Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1069},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/1069},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DijkJ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/entropy/MahmoodGDN21,
  author       = {Kaleel Mahmood and
                  Deniz Gurevin and
                  Marten van Dijk and
                  Phuoung Ha Nguyen},
  title        = {Beware the Black-Box: On the Robustness of Recent Defenses to Adversarial
                  Examples},
  journal      = {Entropy},
  volume       = {23},
  number       = {10},
  pages        = {1359},
  year         = {2021},
  url          = {https://doi.org/10.3390/e23101359},
  doi          = {10.3390/E23101359},
  timestamp    = {Wed, 03 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/entropy/MahmoodGDN21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmlr/NguyenTPND21,
  author       = {Lam M. Nguyen and
                  Quoc Tran{-}Dinh and
                  Dzung T. Phan and
                  Phuong Ha Nguyen and
                  Marten van Dijk},
  title        = {A Unified Convergence Analysis for Shuffling-Type Gradient Methods},
  journal      = {J. Mach. Learn. Res.},
  volume       = {22},
  pages        = {207:1--207:44},
  year         = {2021},
  url          = {http://jmlr.org/papers/v22/20-1238.html},
  timestamp    = {Mon, 31 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmlr/NguyenTPND21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aistats/NguyenNNTND21,
  author       = {Nhuong V. Nguyen and
                  Toan N. Nguyen and
                  Phuong Ha Nguyen and
                  Quoc Tran{-}Dinh and
                  Lam M. Nguyen and
                  Marten van Dijk},
  editor       = {Arindam Banerjee and
                  Kenji Fukumizu},
  title        = {Hogwild! over Distributed Local Data Sets with Linearly Increasing
                  Mini-Batch Sizes},
  booktitle    = {The 24th International Conference on Artificial Intelligence and Statistics,
                  {AISTATS} 2021, April 13-15, 2021, Virtual Event},
  series       = {Proceedings of Machine Learning Research},
  volume       = {130},
  pages        = {1207--1215},
  publisher    = {{PMLR}},
  year         = {2021},
  url          = {http://proceedings.mlr.press/v130/nguyen21a.html},
  timestamp    = {Wed, 14 Apr 2021 16:51:37 +0200},
  biburl       = {https://dblp.org/rec/conf/aistats/NguyenNNTND21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccv/MahmoodMD21,
  author       = {Kaleel Mahmood and
                  Rigel Mahmood and
                  Marten van Dijk},
  title        = {On the Robustness of Vision Transformers to Adversarial Examples},
  booktitle    = {2021 {IEEE/CVF} International Conference on Computer Vision, {ICCV}
                  2021, Montreal, QC, Canada, October 10-17, 2021},
  pages        = {7818--7827},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/ICCV48922.2021.00774},
  doi          = {10.1109/ICCV48922.2021.00774},
  timestamp    = {Fri, 11 Mar 2022 10:01:27 +0100},
  biburl       = {https://dblp.org/rec/conf/iccv/MahmoodMD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccsw-ws/2021,
  editor       = {Yinqian Zhang and
                  Marten van Dijk},
  title        = {CCSW@CCS '21: Proceedings of the 2021 on Cloud Computing Security
                  Workshop, Virtual Event, Republic of Korea, 15 November 2021},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3474123},
  doi          = {10.1145/3474123},
  isbn         = {978-1-4503-8653-1},
  timestamp    = {Thu, 12 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccsw-ws/2021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2102-09030,
  author       = {Marten van Dijk and
                  Nhuong V. Nguyen and
                  Toan N. Nguyen and
                  Lam M. Nguyen and
                  Phuong Ha Nguyen},
  title        = {Differential Private Hogwild! over Distributed Local Data Sets},
  journal      = {CoRR},
  volume       = {abs/2102.09030},
  year         = {2021},
  url          = {https://arxiv.org/abs/2102.09030},
  eprinttype    = {arXiv},
  eprint       = {2102.09030},
  timestamp    = {Wed, 24 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2102-09030.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2104-02610,
  author       = {Kaleel Mahmood and
                  Rigel Mahmood and
                  Marten van Dijk},
  title        = {On the Robustness of Vision Transformers to Adversarial Examples},
  journal      = {CoRR},
  volume       = {abs/2104.02610},
  year         = {2021},
  url          = {https://arxiv.org/abs/2104.02610},
  eprinttype    = {arXiv},
  eprint       = {2104.02610},
  timestamp    = {Tue, 13 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2104-02610.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2109-15031,
  author       = {Kaleel Mahmood and
                  Rigel Mahmood and
                  Ethan Rathbun and
                  Marten van Dijk},
  title        = {Back in Black: {A} Comparative Evaluation of Recent State-Of-The-Art
                  Black-Box Attacks},
  journal      = {CoRR},
  volume       = {abs/2109.15031},
  year         = {2021},
  url          = {https://arxiv.org/abs/2109.15031},
  eprinttype    = {arXiv},
  eprint       = {2109.15031},
  timestamp    = {Mon, 04 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2109-15031.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DijkGJKN21,
  author       = {Marten van Dijk and
                  Deniz Gurevin and
                  Chenglu Jin and
                  Omer Khan and
                  Phuong Ha Nguyen},
  title        = {Autonomous Secure Remote Attestation even when all Used and to be
                  Used Digital Keys Leak},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {602},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/602},
  timestamp    = {Mon, 07 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DijkGJKN21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DijkGJKN21a,
  author       = {Marten van Dijk and
                  Deniz Gurevin and
                  Chenglu Jin and
                  Omer Khan and
                  Phuong Ha Nguyen},
  title        = {Bilinear Map Based One-Time Signature Scheme with Secret Key Exposure},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {925},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/925},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DijkGJKN21a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcad/StefanovDSF0YD20,
  author       = {Emil Stefanov and
                  Marten van Dijk and
                  Elaine Shi and
                  Christopher W. Fletcher and
                  Ling Ren and
                  Xiangyao Yu and
                  Srinivas Devadas},
  title        = {A Retrospective on Path {ORAM}},
  journal      = {{IEEE} Trans. Comput. Aided Des. Integr. Circuits Syst.},
  volume       = {39},
  number       = {8},
  pages        = {1572--1576},
  year         = {2020},
  url          = {https://doi.org/10.1109/TCAD.2019.2925398},
  doi          = {10.1109/TCAD.2019.2925398},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcad/StefanovDSF0YD20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/WisiolMPNMSDR20,
  author       = {Nils Wisiol and
                  Christopher M{\"{u}}hl and
                  Niklas Pirnay and
                  Phuong Ha Nguyen and
                  Marian Margraf and
                  Jean{-}Pierre Seifert and
                  Marten van Dijk and
                  Ulrich R{\"{u}}hrmair},
  title        = {Splitting the Interpose {PUF:} {A} Novel Modeling Attack Strategy},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2020},
  number       = {3},
  pages        = {97--120},
  year         = {2020},
  url          = {https://doi.org/10.13154/tches.v2020.i3.97-120},
  doi          = {10.13154/TCHES.V2020.I3.97-120},
  timestamp    = {Thu, 02 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/WisiolMPNMSDR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/JohnHOD20,
  author       = {Tara Merin John and
                  Syed Kamran Haider and
                  Hamza Omar and
                  Marten van Dijk},
  title        = {Connecting the Dots: Privacy Leakage via Write-Access Patterns to
                  the Main Memory},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {17},
  number       = {2},
  pages        = {436--442},
  year         = {2020},
  url          = {https://doi.org/10.1109/TDSC.2017.2779780},
  doi          = {10.1109/TDSC.2017.2779780},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/JohnHOD20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aistats/PhamNPNDT20,
  author       = {Nhan H. Pham and
                  Lam M. Nguyen and
                  Dzung T. Phan and
                  Phuong Ha Nguyen and
                  Marten van Dijk and
                  Quoc Tran{-}Dinh},
  editor       = {Silvia Chiappa and
                  Roberto Calandra},
  title        = {A Hybrid Stochastic Policy Gradient Algorithm for Reinforcement Learning},
  booktitle    = {The 23rd International Conference on Artificial Intelligence and Statistics,
                  {AISTATS} 2020, 26-28 August 2020, Online [Palermo, Sicily, Italy]},
  series       = {Proceedings of Machine Learning Research},
  volume       = {108},
  pages        = {374--385},
  publisher    = {{PMLR}},
  year         = {2020},
  url          = {http://proceedings.mlr.press/v108/pham20a.html},
  timestamp    = {Mon, 29 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/aistats/PhamNPNDT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/JinBDR20,
  author       = {Chenglu Jin and
                  Wayne P. Burleson and
                  Marten van Dijk and
                  Ulrich R{\"{u}}hrmair},
  editor       = {Chip{-}Hong Chang and
                  Ulrich R{\"{u}}hrmair and
                  Stefan Katzenbeisser and
                  Patrick Schaumont},
  title        = {Erasable PUFs: Formal Treatment and Generic Design},
  booktitle    = {Proceedings of the 4th {ACM} Workshop on Attacks and Solutions in
                  Hardware Security Workshop, ASHES@CCS 2020, Virtual Event, USA, November
                  13, 2020},
  pages        = {21--33},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3411504.3421215},
  doi          = {10.1145/3411504.3421215},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/JinBDR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/date/CanettiDMRS20,
  author       = {Ran Canetti and
                  Marten van Dijk and
                  Hoda Maleki and
                  Ulrich R{\"{u}}hrmair and
                  Patrick Schaumont},
  title        = {Using Universal Composition to Design and Analyze Secure Complex Hardware
                  Systems},
  booktitle    = {2020 Design, Automation {\&} Test in Europe Conference {\&}
                  Exhibition, {DATE} 2020, Grenoble, France, March 9-13, 2020},
  pages        = {520--525},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.23919/DATE48585.2020.9116295},
  doi          = {10.23919/DATE48585.2020.9116295},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/date/CanettiDMRS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2002-08246,
  author       = {Lam M. Nguyen and
                  Quoc Tran{-}Dinh and
                  Dzung T. Phan and
                  Phuong Ha Nguyen and
                  Marten van Dijk},
  title        = {A Unified Convergence Analysis for Shuffling-Type Gradient Methods},
  journal      = {CoRR},
  volume       = {abs/2002.08246},
  year         = {2020},
  url          = {https://arxiv.org/abs/2002.08246},
  eprinttype    = {arXiv},
  eprint       = {2002.08246},
  timestamp    = {Tue, 03 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2002-08246.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2003-00430,
  author       = {Nhan H. Pham and
                  Lam M. Nguyen and
                  Dzung T. Phan and
                  Phuong Ha Nguyen and
                  Marten van Dijk and
                  Quoc Tran{-}Dinh},
  title        = {A Hybrid Stochastic Policy Gradient Algorithm for Reinforcement Learning},
  journal      = {CoRR},
  volume       = {abs/2003.00430},
  year         = {2020},
  url          = {https://arxiv.org/abs/2003.00430},
  eprinttype    = {arXiv},
  eprint       = {2003.00430},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2003-00430.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2006-10876,
  author       = {Kaleel Mahmood and
                  Deniz Gurevin and
                  Marten van Dijk and
                  Phuong Ha Nguyen},
  title        = {Beware the Black-Box: on the Robustness of Recent Defenses to Adversarial
                  Examples},
  journal      = {CoRR},
  volume       = {abs/2006.10876},
  year         = {2020},
  url          = {https://arxiv.org/abs/2006.10876},
  eprinttype    = {arXiv},
  eprint       = {2006.10876},
  timestamp    = {Tue, 23 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2006-10876.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2007-09208,
  author       = {Marten van Dijk and
                  Nhuong V. Nguyen and
                  Toan N. Nguyen and
                  Lam M. Nguyen and
                  Quoc Tran{-}Dinh and
                  Phuong Ha Nguyen},
  title        = {Asynchronous Federated Learning with Reduced Number of Rounds and
                  with Differential Privacy from Less Aggregated Gaussian Noise},
  journal      = {CoRR},
  volume       = {abs/2007.09208},
  year         = {2020},
  url          = {https://arxiv.org/abs/2007.09208},
  eprinttype    = {arXiv},
  eprint       = {2007.09208},
  timestamp    = {Tue, 28 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2007-09208.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2010-14763,
  author       = {Marten van Dijk and
                  Nhuong V. Nguyen and
                  Toan N. Nguyen and
                  Lam M. Nguyen and
                  Quoc Tran{-}Dinh and
                  Phuong Ha Nguyen},
  title        = {Hogwild! over Distributed Local Data Sets with Linearly Increasing
                  Mini-Batch Sizes},
  journal      = {CoRR},
  volume       = {abs/2010.14763},
  year         = {2020},
  url          = {https://arxiv.org/abs/2010.14763},
  eprinttype    = {arXiv},
  eprint       = {2010.14763},
  timestamp    = {Mon, 02 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2010-14763.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/HaiderD19,
  author       = {Syed Kamran Haider and
                  Marten van Dijk},
  title        = {Flat {ORAM:} {A} Simplified Write-Only Oblivious {RAM} Construction
                  for Secure Processors},
  journal      = {Cryptogr.},
  volume       = {3},
  number       = {1},
  pages        = {10},
  year         = {2019},
  url          = {https://doi.org/10.3390/cryptography3010010},
  doi          = {10.3390/CRYPTOGRAPHY3010010},
  timestamp    = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/HaiderD19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmlr/NguyenNRSTD19,
  author       = {Lam M. Nguyen and
                  Phuong Ha Nguyen and
                  Peter Richt{\'{a}}rik and
                  Katya Scheinberg and
                  Martin Tak{\'{a}}c and
                  Marten van Dijk},
  title        = {New Convergence Aspects of Stochastic Gradient Algorithms},
  journal      = {J. Mach. Learn. Res.},
  volume       = {20},
  pages        = {176:1--176:49},
  year         = {2019},
  url          = {http://jmlr.org/papers/v20/18-759.html},
  timestamp    = {Wed, 11 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmlr/NguyenNRSTD19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/NguyenSJMRD19,
  author       = {Phuong Ha Nguyen and
                  Durga Prasad Sahoo and
                  Chenglu Jin and
                  Kaleel Mahmood and
                  Ulrich R{\"{u}}hrmair and
                  Marten van Dijk},
  title        = {The Interpose {PUF:} Secure {PUF} Design against State-of-the-art
                  Machine Learning Attacks},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2019},
  number       = {4},
  pages        = {243--290},
  year         = {2019},
  url          = {https://doi.org/10.13154/tches.v2019.i4.243-290},
  doi          = {10.13154/TCHES.V2019.I4.243-290},
  timestamp    = {Thu, 06 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tches/NguyenSJMRD19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/HaiderJASKD19,
  author       = {Syed Kamran Haider and
                  Chenglu Jin and
                  Masab Ahmad and
                  Devu Manikantan Shila and
                  Omer Khan and
                  Marten van Dijk},
  title        = {Advancing the State-of-the-Art in Hardware Trojans Detection},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {16},
  number       = {1},
  pages        = {18--32},
  year         = {2019},
  url          = {https://doi.org/10.1109/TDSC.2017.2654352},
  doi          = {10.1109/TDSC.2017.2654352},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/HaiderJASKD19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/JinD19,
  author       = {Chenglu Jin and
                  Marten van Dijk},
  title        = {Secure and Efficient Initialization and Authentication Protocols for
                  {SHIELD}},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {16},
  number       = {1},
  pages        = {156--173},
  year         = {2019},
  url          = {https://doi.org/10.1109/TDSC.2017.2647950},
  doi          = {10.1109/TDSC.2017.2647950},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/JinD19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/RenFKDD19,
  author       = {Ling Ren and
                  Christopher W. Fletcher and
                  Albert Kwon and
                  Marten van Dijk and
                  Srinivas Devadas},
  title        = {Design and Implementation of the Ascend Secure Processor},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {16},
  number       = {2},
  pages        = {204--216},
  year         = {2019},
  url          = {https://doi.org/10.1109/TDSC.2017.2687463},
  doi          = {10.1109/TDSC.2017.2687463},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/RenFKDD19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ChangDRT19,
  author       = {Chip{-}Hong Chang and
                  Marten van Dijk and
                  Ulrich R{\"{u}}hrmair and
                  Mark M. Tehranipoor},
  title        = {Emerging Attacks and Solutions for Secure Hardware in the Internet
                  of Things},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {16},
  number       = {3},
  pages        = {373--375},
  year         = {2019},
  url          = {https://doi.org/10.1109/TDSC.2019.2901048},
  doi          = {10.1109/TDSC.2019.2901048},
  timestamp    = {Tue, 30 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/ChangDRT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/JinYD019,
  author       = {Chenglu Jin and
                  Zheng Yang and
                  Marten van Dijk and
                  Jianying Zhou},
  editor       = {David Balenson},
  title        = {Proof of aliveness},
  booktitle    = {Proceedings of the 35th Annual Computer Security Applications Conference,
                  {ACSAC} 2019, San Juan, PR, USA, December 09-13, 2019},
  pages        = {1--16},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3359789.3359827},
  doi          = {10.1145/3359789.3359827},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/JinYD019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ValizadehD19,
  author       = {Saeed Valizadeh and
                  Marten van Dijk},
  editor       = {Radu Sion and
                  Charalampos Papamanthou},
  title        = {MalPro: {A} Learning-based Malware Propagation and Containment Modeling},
  booktitle    = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Cloud Computing
                  Security Workshop, CCSW@CCS 2019, London, UK, November 11, 2019},
  pages        = {45--56},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3338466.3358920},
  doi          = {10.1145/3338466.3358920},
  timestamp    = {Thu, 12 Oct 2023 12:32:09 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/ValizadehD19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icml/DijkNNP19,
  author       = {Marten van Dijk and
                  Lam M. Nguyen and
                  Phuong Ha Nguyen and
                  Dzung T. Phan},
  editor       = {Kamalika Chaudhuri and
                  Ruslan Salakhutdinov},
  title        = {Characterization of Convex Objective Functions and Optimal Expected
                  Convergence Rates for {SGD}},
  booktitle    = {Proceedings of the 36th International Conference on Machine Learning,
                  {ICML} 2019, 9-15 June 2019, Long Beach, California, {USA}},
  series       = {Proceedings of Machine Learning Research},
  volume       = {97},
  pages        = {6392--6400},
  publisher    = {{PMLR}},
  year         = {2019},
  url          = {http://proceedings.mlr.press/v97/van-dijk19a.html},
  timestamp    = {Tue, 11 Jun 2019 15:37:38 +0200},
  biburl       = {https://dblp.org/rec/conf/icml/DijkNNP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mtv/SiddiquiSJGPDS19,
  author       = {Ali Shuja Siddiqui and
                  Geraldine Shirley and
                  Sam Reji Joseph and
                  Yutian Gui and
                  Jim Plusquellic and
                  Marten van Dijk and
                  Fareena Saqib},
  title        = {Multilayer Camouflaged Secure Boot for SoCs},
  booktitle    = {20th International Workshop on Microprocessor/SoC Test, Security and
                  Verification, {MTV} 2019, Austin, TX, USA, December 9-10, 2019},
  pages        = {56--61},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/MTV48867.2019.00019},
  doi          = {10.1109/MTV48867.2019.00019},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mtv/SiddiquiSJGPDS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nips/NguyenND19,
  author       = {Phuong Ha Nguyen and
                  Lam M. Nguyen and
                  Marten van Dijk},
  editor       = {Hanna M. Wallach and
                  Hugo Larochelle and
                  Alina Beygelzimer and
                  Florence d'Alch{\'{e}}{-}Buc and
                  Emily B. Fox and
                  Roman Garnett},
  title        = {Tight Dimension Independent Lower Bound on the Expected Convergence
                  Rate for Diminishing Step Sizes in {SGD}},
  booktitle    = {Advances in Neural Information Processing Systems 32: Annual Conference
                  on Neural Information Processing Systems 2019, NeurIPS 2019, December
                  8-14, 2019, Vancouver, BC, Canada},
  pages        = {3660--3669},
  year         = {2019},
  url          = {https://proceedings.neurips.cc/paper/2019/hash/deb54ffb41e085fd7f69a75b6359c989-Abstract.html},
  timestamp    = {Mon, 16 May 2022 15:41:51 +0200},
  biburl       = {https://dblp.org/rec/conf/nips/NguyenND19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/HoganMRCDHVZ19,
  author       = {Kyle Hogan and
                  Hoda Maleki and
                  Reza Rahaeimehr and
                  Ran Canetti and
                  Marten van Dijk and
                  Jason Hennessey and
                  Mayank Varia and
                  Haibin Zhang},
  title        = {On the Universally Composable Security of OpenStack},
  booktitle    = {2019 {IEEE} Cybersecurity Development, SecDev 2019, Tysons Corner,
                  VA, USA, September 23-25, 2019},
  pages        = {20--33},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/SecDev.2019.00015},
  doi          = {10.1109/SECDEV.2019.00015},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secdev/HoganMRCDHVZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1901-01598,
  author       = {Saeed Valizadeh and
                  Marten van Dijk},
  title        = {Toward a Theory of Cyber Attacks},
  journal      = {CoRR},
  volume       = {abs/1901.01598},
  year         = {2019},
  url          = {http://arxiv.org/abs/1901.01598},
  eprinttype    = {arXiv},
  eprint       = {1901.01598},
  timestamp    = {Thu, 31 Jan 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1901-01598.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1901-07648,
  author       = {Lam M. Nguyen and
                  Marten van Dijk and
                  Dzung T. Phan and
                  Phuong Ha Nguyen and
                  Tsui{-}Wei Weng and
                  Jayant R. Kalagnanam},
  title        = {Optimal Finite-Sum Smooth Non-Convex Optimization with {SARAH}},
  journal      = {CoRR},
  volume       = {abs/1901.07648},
  year         = {2019},
  url          = {http://arxiv.org/abs/1901.07648},
  eprinttype    = {arXiv},
  eprint       = {1901.07648},
  timestamp    = {Sat, 23 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1901-07648.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1905-00154,
  author       = {Saeed Valizadeh and
                  Marten van Dijk},
  title        = {On the Convergence Rates of Learning-based Signature Generation Schemes
                  to Contain Self-propagating Malware},
  journal      = {CoRR},
  volume       = {abs/1905.00154},
  year         = {2019},
  url          = {http://arxiv.org/abs/1905.00154},
  eprinttype    = {arXiv},
  eprint       = {1905.00154},
  timestamp    = {Mon, 27 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1905-00154.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1910-02785,
  author       = {Phuong Ha Nguyen and
                  Kaleel Mahmood and
                  Lam M. Nguyen and
                  Thanh Nguyen and
                  Marten van Dijk},
  title        = {BUZz: BUffer Zones for defending adversarial examples in image classification},
  journal      = {CoRR},
  volume       = {abs/1910.02785},
  year         = {2019},
  url          = {http://arxiv.org/abs/1910.02785},
  eprinttype    = {arXiv},
  eprint       = {1910.02785},
  timestamp    = {Wed, 09 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1910-02785.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WisiolMPNMSDR19,
  author       = {Nils Wisiol and
                  Christopher M{\"{u}}hl and
                  Niklas Pirnay and
                  Phuong Ha Nguyen and
                  Marian Margraf and
                  Jean{-}Pierre Seifert and
                  Marten van Dijk and
                  Ulrich R{\"{u}}hrmair},
  title        = {Splitting the Interpose {PUF:} {A} Novel Modeling Attack Strategy},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1473},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/1473},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WisiolMPNMSDR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jacm/StefanovDSCFRYD18,
  author       = {Emil Stefanov and
                  Marten van Dijk and
                  Elaine Shi and
                  T.{-}H. Hubert Chan and
                  Christopher W. Fletcher and
                  Ling Ren and
                  Xiangyao Yu and
                  Srinivas Devadas},
  title        = {Path {ORAM:} An Extremely Simple Oblivious {RAM} Protocol},
  journal      = {J. {ACM}},
  volume       = {65},
  number       = {4},
  pages        = {18:1--18:26},
  year         = {2018},
  url          = {https://doi.org/10.1145/3177872},
  doi          = {10.1145/3177872},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jacm/StefanovDSCFRYD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/DijkJMNR18,
  author       = {Marten van Dijk and
                  Chenglu Jin and
                  Hoda Maleki and
                  Phuong Ha Nguyen and
                  Reza Rahaeimehr},
  editor       = {Sarah Meiklejohn and
                  Kazue Sako},
  title        = {Weak-Unforgeable Tags for Secure Supply Chain Management},
  booktitle    = {Financial Cryptography and Data Security - 22nd International Conference,
                  {FC} 2018, Nieuwpoort, Cura{\c{c}}ao, February 26 - March 2, 2018,
                  Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10957},
  pages        = {80--98},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-662-58387-6\_5},
  doi          = {10.1007/978-3-662-58387-6\_5},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/DijkJMNR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccd/OmarH0DK18,
  author       = {Hamza Omar and
                  Syed Kamran Haider and
                  Ling Ren and
                  Marten van Dijk and
                  Omer Khan},
  title        = {Breaking the Oblivious-RAM Bandwidth Wall},
  booktitle    = {36th {IEEE} International Conference on Computer Design, {ICCD} 2018,
                  Orlando, FL, USA, October 7-10, 2018},
  pages        = {115--122},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/ICCD.2018.00026},
  doi          = {10.1109/ICCD.2018.00026},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iccd/OmarH0DK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icml/NguyenNDRST18,
  author       = {Lam M. Nguyen and
                  Phuong Ha Nguyen and
                  Marten van Dijk and
                  Peter Richt{\'{a}}rik and
                  Katya Scheinberg and
                  Martin Tak{\'{a}}c},
  editor       = {Jennifer G. Dy and
                  Andreas Krause},
  title        = {{SGD} and Hogwild! Convergence Without the Bounded Gradients Assumption},
  booktitle    = {Proceedings of the 35th International Conference on Machine Learning,
                  {ICML} 2018, Stockholmsm{\"{a}}ssan, Stockholm, Sweden, July
                  10-15, 2018},
  series       = {Proceedings of Machine Learning Research},
  volume       = {80},
  pages        = {3747--3755},
  publisher    = {{PMLR}},
  year         = {2018},
  url          = {http://proceedings.mlr.press/v80/nguyen18c.html},
  timestamp    = {Wed, 11 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icml/NguyenNDRST18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icphys/JinVD18,
  author       = {Chenglu Jin and
                  Saeed Valizadeh and
                  Marten van Dijk},
  title        = {Snapshotter: Lightweight intrusion detection and prevention system
                  for industrial control systems},
  booktitle    = {{IEEE} Industrial Cyber-Physical Systems, {ICPS} 2018, Saint Petersburg,
                  Russia, May 15-18, 2018},
  pages        = {824--829},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/ICPHYS.2018.8390813},
  doi          = {10.1109/ICPHYS.2018.8390813},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icphys/JinVD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1802-03801,
  author       = {Lam M. Nguyen and
                  Phuong Ha Nguyen and
                  Marten van Dijk and
                  Peter Richt{\'{a}}rik and
                  Katya Scheinberg and
                  Martin Tak{\'{a}}c},
  title        = {{SGD} and Hogwild! Convergence Without the Bounded Gradients Assumption},
  journal      = {CoRR},
  volume       = {abs/1802.03801},
  year         = {2018},
  url          = {http://arxiv.org/abs/1802.03801},
  eprinttype    = {arXiv},
  eprint       = {1802.03801},
  timestamp    = {Wed, 11 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1802-03801.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1804-04783,
  author       = {Syed Kamran Haider and
                  Chenglu Jin and
                  Marten van Dijk},
  title        = {Comments on "Defeating HaTCh: Building Malicious {IP} Cores"},
  journal      = {CoRR},
  volume       = {abs/1804.04783},
  year         = {2018},
  url          = {http://arxiv.org/abs/1804.04783},
  eprinttype    = {arXiv},
  eprint       = {1804.04783},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1804-04783.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1807-11046,
  author       = {Yansong Gao and
                  Marten van Dijk and
                  Lei Xu and
                  Surya Nepal and
                  Damith Chinthana Ranasinghe},
  title        = {{TREVERSE:} Trial-and-Error Lightweight Secure Reverse Authentication
                  with Simulatable PUFs},
  journal      = {CoRR},
  volume       = {abs/1807.11046},
  year         = {2018},
  url          = {http://arxiv.org/abs/1807.11046},
  eprinttype    = {arXiv},
  eprint       = {1807.11046},
  timestamp    = {Sat, 22 Dec 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1807-11046.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1810-04100,
  author       = {Marten van Dijk and
                  Lam M. Nguyen and
                  Phuong Ha Nguyen and
                  Dzung T. Phan},
  title        = {Characterization of Convex Objective Functions and Optimal Expected
                  Convergence Rates for {SGD}},
  journal      = {CoRR},
  volume       = {abs/1810.04100},
  year         = {2018},
  url          = {http://arxiv.org/abs/1810.04100},
  eprinttype    = {arXiv},
  eprint       = {1810.04100},
  timestamp    = {Sat, 23 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1810-04100.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1810-04723,
  author       = {Phuong Ha Nguyen and
                  Lam M. Nguyen and
                  Marten van Dijk},
  title        = {Tight Dimension Independent Lower Bound on Optimal Expected Convergence
                  Rate for Diminishing Step Sizes in {SGD}},
  journal      = {CoRR},
  volume       = {abs/1810.04723},
  year         = {2018},
  url          = {http://arxiv.org/abs/1810.04723},
  eprinttype    = {arXiv},
  eprint       = {1810.04723},
  timestamp    = {Sat, 23 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1810-04723.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1811-12403,
  author       = {Lam M. Nguyen and
                  Phuong Ha Nguyen and
                  Peter Richt{\'{a}}rik and
                  Katya Scheinberg and
                  Martin Tak{\'{a}}c and
                  Marten van Dijk},
  title        = {New Convergence Aspects of Stochastic Gradient Algorithms},
  journal      = {CoRR},
  volume       = {abs/1811.12403},
  year         = {2018},
  url          = {http://arxiv.org/abs/1811.12403},
  eprinttype    = {arXiv},
  eprint       = {1811.12403},
  timestamp    = {Wed, 11 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1811-12403.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NguyenSJMRD18,
  author       = {Phuong Ha Nguyen and
                  Durga Prasad Sahoo and
                  Chenglu Jin and
                  Kaleel Mahmood and
                  Ulrich R{\"{u}}hrmair and
                  Marten van Dijk},
  title        = {The Interpose {PUF:} Secure {PUF} Design against State-of-the-art
                  Machine Learning Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {350},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/350},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NguyenSJMRD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GaoJKNXBKDRR18,
  author       = {Yansong Gao and
                  Chenglu Jin and
                  Jeeson Kim and
                  Hussein Nili and
                  Xiaolin Xu and
                  Wayne P. Burleson and
                  Omid Kavehei and
                  Marten van Dijk and
                  Damith Chinthana Ranasinghe and
                  Ulrich R{\"{u}}hrmair},
  title        = {Efficient Erasable PUFs from Programmable Logic and Memristors},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {358},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/358},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GaoJKNXBKDRR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HoganMRCDHVZ18,
  author       = {Kyle Hogan and
                  Hoda Maleki and
                  Reza Rahaeimehr and
                  Ran Canetti and
                  Marten van Dijk and
                  Jason Hennessey and
                  Mayank Varia and
                  Haibin Zhang},
  title        = {On the Universally Composable Security of OpenStack},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {602},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/602},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HoganMRCDHVZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JinDRZ18,
  author       = {Chenglu Jin and
                  Marten van Dijk and
                  Michael K. Reiter and
                  Haibin Zhang},
  title        = {PwoP: Intrusion-Tolerant and Privacy-Preserving Sensor Fusion},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1171},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1171},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JinDRZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/JinH0NFDD17,
  author       = {Chenglu Jin and
                  Charles Herder and
                  Ling Ren and
                  Phuong Ha Nguyen and
                  Benjamin Fuller and
                  Srinivas Devadas and
                  Marten van Dijk},
  title        = {{FPGA} Implementation of a Cryptographically-Secure {PUF} Based on
                  Learning Parity with Noise},
  journal      = {Cryptogr.},
  volume       = {1},
  number       = {3},
  pages        = {23},
  year         = {2017},
  url          = {https://doi.org/10.3390/cryptography1030023},
  doi          = {10.3390/CRYPTOGRAPHY1030023},
  timestamp    = {Mon, 14 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/JinH0NFDD17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/HerderRDYD17,
  author       = {Charles Herder and
                  Ling Ren and
                  Marten van Dijk and
                  Meng{-}Day (Mandel) Yu and
                  Srinivas Devadas},
  title        = {Trapdoor Computational Fuzzy Extractors and Stateless Cryptographically-Secure
                  Physical Unclonable Functions},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {14},
  number       = {1},
  pages        = {65--82},
  year         = {2017},
  url          = {https://doi.org/10.1109/TDSC.2016.2536609},
  doi          = {10.1109/TDSC.2016.2536609},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/HerderRDYD17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/MalekiRD17,
  author       = {Hoda Maleki and
                  Reza Rahaeimehr and
                  Marten van Dijk},
  editor       = {Chip{-}Hong Chang and
                  Ulrich R{\"{u}}hrmair and
                  Wei Zhang},
  title        = {SoK: RFID-based Clone Detection Mechanisms for Supply Chains},
  booktitle    = {Proceedings of the 2017 Workshop on Attacks and Solutions in Hardware
                  Security, ASHES@CCS 2017, Dallas, TX, USA, November 3, 2017},
  pages        = {33--41},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3139324.3139332},
  doi          = {10.1145/3139324.3139332},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/MalekiRD17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ChangDKRT17,
  author       = {Chip{-}Hong Chang and
                  Marten van Dijk and
                  Farinaz Koushanfar and
                  Ulrich R{\"{u}}hrmair and
                  Mark M. Tehranipoor},
  editor       = {Bhavani Thuraisingham and
                  David Evans and
                  Tal Malkin and
                  Dongyan Xu},
  title        = {{ASHES} 2017: Workshop on Attacks and Solutions in Hardware Security},
  booktitle    = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 -
                  November 03, 2017},
  pages        = {2623--2625},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3133956.3137049},
  doi          = {10.1145/3133956.3137049},
  timestamp    = {Wed, 29 Jun 2022 15:37:41 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/ChangDKRT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cpsweek/JinRL0D17,
  author       = {Chenglu Jin and
                  Lingyu Ren and
                  Xubin Liu and
                  Peng Zhang and
                  Marten van Dijk},
  title        = {Mitigating Synchronized Hardware Trojan Attacks in Smart Grids},
  booktitle    = {Proceedings of the 2nd Workshop on Cyber-Physical Security and Resilience
                  in Smart Grids, SPSR-SG@CPSWeek 2017, Pittsburgh, PA, USA, April 21,
                  2017},
  pages        = {35--40},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3055386.3055394},
  doi          = {10.1145/3055386.3055394},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cpsweek/JinRL0D17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/MalekiRJD17,
  author       = {Hoda Maleki and
                  Reza Rahaeimehr and
                  Chenglu Jin and
                  Marten van Dijk},
  title        = {New clone-detection approach for RFID-based supply chains},
  booktitle    = {2017 {IEEE} International Symposium on Hardware Oriented Security
                  and Trust, {HOST} 2017, McLean, VA, USA, May 1-5, 2017},
  pages        = {122--127},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/HST.2017.7951810},
  doi          = {10.1109/HST.2017.7951810},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/host/MalekiRJD17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/JohnHOD17,
  author       = {Tara Merin John and
                  Syed Kamran Haider and
                  Hamza Omar and
                  Marten van Dijk},
  title        = {Connecting the dots: Privacy leakage via write-access patterns to
                  the main memory},
  booktitle    = {2017 {IEEE} International Symposium on Hardware Oriented Security
                  and Trust, {HOST} 2017, McLean, VA, USA, May 1-5, 2017},
  pages        = {170},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/HST.2017.7951834},
  doi          = {10.1109/HST.2017.7951834},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/host/JohnHOD17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mwscas/HaiderJD17,
  author       = {Syed Kamran Haider and
                  Chenglu Jin and
                  Marten van Dijk},
  title        = {Advancing the state-of-the-art in hardware Trojans design},
  booktitle    = {{IEEE} 60th International Midwest Symposium on Circuits and Systems,
                  {MWSCAS} 2017, Boston, MA, USA, August 6-9, 2017},
  pages        = {823--826},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/MWSCAS.2017.8053050},
  doi          = {10.1109/MWSCAS.2017.8053050},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mwscas/HaiderJD17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/HaiderOLDD17,
  author       = {Syed Kamran Haider and
                  Hamza Omar and
                  Ilia A. Lebedev and
                  Srinivas Devadas and
                  Marten van Dijk},
  editor       = {Elisa Bertino and
                  Ravi S. Sandhu and
                  Edgar R. Weippl},
  title        = {Leveraging Hardware Isolation for Process Level Access Control {\&}
                  Authentication},
  booktitle    = {Proceedings of the 22nd {ACM} on Symposium on Access Control Models
                  and Technologies, {SACMAT} 2017, Indianapolis, IN, USA, June 21-23,
                  2017},
  pages        = {133--141},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3078861.3078882},
  doi          = {10.1145/3078861.3078882},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sacmat/HaiderOLDD17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/JohnHOD17,
  author       = {Tara Merin John and
                  Syed Kamran Haider and
                  Hamza Omar and
                  Marten van Dijk},
  title        = {Connecting the Dots: Privacy Leakage via Write-Access Patterns to
                  the Main Memory},
  journal      = {CoRR},
  volume       = {abs/1702.03965},
  year         = {2017},
  url          = {http://arxiv.org/abs/1702.03965},
  eprinttype    = {arXiv},
  eprint       = {1702.03965},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/JohnHOD17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/KhanKJSNMDNSDG17,
  author       = {Raihan Sayeed Khan and
                  Nadim Kanan and
                  Chenglu Jin and
                  Jake Scoggin and
                  Nafisa Noor and
                  Sadid Muneer and
                  Faruk Dirisaglik and
                  Phuong Ha Nguyen and
                  Helena Silva and
                  Marten van Dijk and
                  Ali Gokirmak},
  title        = {Intrinsically Reliable and Lightweight Physical Obfuscated Keys},
  journal      = {CoRR},
  volume       = {abs/1703.07427},
  year         = {2017},
  url          = {http://arxiv.org/abs/1703.07427},
  eprinttype    = {arXiv},
  eprint       = {1703.07427},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/KhanKJSNMDNSDG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/HaiderD17,
  author       = {Syed Kamran Haider and
                  Marten van Dijk},
  title        = {Revisiting Definitional Foundations of Oblivious {RAM} for Secure
                  Processor Implementations},
  journal      = {CoRR},
  volume       = {abs/1706.03852},
  year         = {2017},
  url          = {http://arxiv.org/abs/1706.03852},
  eprinttype    = {arXiv},
  eprint       = {1706.03852},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/HaiderD17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HerderFDD17,
  author       = {Charles Herder and
                  Benjamin Fuller and
                  Marten van Dijk and
                  Srinivas Devadas},
  title        = {Public Key Cryptosystems with Noisy Secret Keys},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {210},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/210},
  timestamp    = {Mon, 14 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HerderFDD17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NguyenSJMD17,
  author       = {Phuong Ha Nguyen and
                  Durga Prasad Sahoo and
                  Chenglu Jin and
                  Kaleel Mahmood and
                  Marten van Dijk},
  title        = {{MXPUF:} Secure {PUF} Design against State-of-the-art Modeling Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {572},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/572},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NguyenSJMD17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DijkJMNR17,
  author       = {Marten van Dijk and
                  Chenglu Jin and
                  Hoda Maleki and
                  Phuong Ha Nguyen and
                  Reza Rahaeimehr},
  title        = {Weak-Unforgeable Tags for Secure Supply Chain Management},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1221},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1221},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DijkJMNR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/MalekiVKBD16,
  author       = {Hoda Maleki and
                  Saeed Valizadeh and
                  William Koch and
                  Azer Bestavros and
                  Marten van Dijk},
  editor       = {Peng Liu and
                  Cliff Wang},
  title        = {Markov Modeling of Moving Target Defense Games},
  booktitle    = {Proceedings of the 2016 {ACM} Workshop on Moving Target Defense, MTD@CCS
                  2016, Vienna, Austria, October 24, 2016},
  pages        = {81--92},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2995272.2995273},
  doi          = {10.1145/2995272.2995273},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/MalekiVKBD16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/DevadasDFRSW16,
  author       = {Srinivas Devadas and
                  Marten van Dijk and
                  Christopher W. Fletcher and
                  Ling Ren and
                  Elaine Shi and
                  Daniel Wichs},
  editor       = {Eyal Kushilevitz and
                  Tal Malkin},
  title        = {Onion {ORAM:} {A} Constant Bandwidth Blowup Oblivious {RAM}},
  booktitle    = {Theory of Cryptography - 13th International Conference, {TCC} 2016-A,
                  Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9563},
  pages        = {145--174},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-49099-0\_6},
  doi          = {10.1007/978-3-662-49099-0\_6},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/DevadasDFRSW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/HaiderJD16,
  author       = {Syed Kamran Haider and
                  Chenglu Jin and
                  Marten van Dijk},
  title        = {Advancing the State-of-the-Art in Hardware Trojans Design},
  journal      = {CoRR},
  volume       = {abs/1605.08413},
  year         = {2016},
  url          = {http://arxiv.org/abs/1605.08413},
  eprinttype    = {arXiv},
  eprint       = {1605.08413},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/HaiderJD16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/HaiderD16,
  author       = {Syed Kamran Haider and
                  Marten van Dijk},
  title        = {Flat {ORAM:} {A} Simplified Write-Only Oblivious {RAM} Construction
                  for Secure Processor Architectures},
  journal      = {CoRR},
  volume       = {abs/1611.01571},
  year         = {2016},
  url          = {http://arxiv.org/abs/1611.01571},
  eprinttype    = {arXiv},
  eprint       = {1611.01571},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/HaiderD16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MalekiRD16,
  author       = {Hoda Maleki and
                  Reza Rahaeimehr and
                  Marten van Dijk},
  title        = {LightSource: Ultra Lightweight Clone Detection of {RFID} Tags from
                  Software Unclonable Responses},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {608},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/608},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MalekiRD16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ValizadehMKBD16,
  author       = {Mohammad Hadi Valizadeh and
                  Hoda Maleki and
                  William Koch and
                  Azer Bestavros and
                  Marten van Dijk},
  title        = {Markov Modeling of Moving Target Defense Games},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {741},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/741},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ValizadehMKBD16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asplos/FletcherRKDD15,
  author       = {Christopher W. Fletcher and
                  Ling Ren and
                  Albert Kwon and
                  Marten van Dijk and
                  Srinivas Devadas},
  editor       = {{\"{O}}zcan {\"{O}}zturk and
                  Kemal Ebcioglu and
                  Sandhya Dwarkadas},
  title        = {Freecursive {ORAM:} [Nearly] Free Recursion and Integrity Verification
                  for Position-based Oblivious {RAM}},
  booktitle    = {Proceedings of the Twentieth International Conference on Architectural
                  Support for Programming Languages and Operating Systems, {ASPLOS}
                  2015, Istanbul, Turkey, March 14-18, 2015},
  pages        = {103--116},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2694344.2694353},
  doi          = {10.1145/2694344.2694353},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asplos/FletcherRKDD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Dijk15,
  author       = {Marten van Dijk},
  editor       = {Indrajit Ray and
                  Xiaofeng Wang and
                  Kui Ren},
  title        = {Hardware Security and its Adversaries},
  booktitle    = {Proceedings of the 5th International Workshop on Trustworthy Embedded
                  Devices, TrustED 2015, Denver, Colorado, USA, October 16, 2015},
  pages        = {1--2},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2808414.2808422},
  doi          = {10.1145/2808414.2808422},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Dijk15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fccm/FletcherRKDSSD15,
  author       = {Christopher W. Fletcher and
                  Ling Ren and
                  Albert Kwon and
                  Marten van Dijk and
                  Emil Stefanov and
                  Dimitrios N. Serpanos and
                  Srinivas Devadas},
  title        = {A Low-Latency, Low-Area Hardware Oblivious {RAM} Controller},
  booktitle    = {23rd {IEEE} Annual International Symposium on Field-Programmable Custom
                  Computing Machines, {FCCM} 2015, Vancouver, BC, Canada, May 2-6, 2015},
  pages        = {215--222},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/FCCM.2015.58},
  doi          = {10.1109/FCCM.2015.58},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fccm/FletcherRKDSSD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hci/GrindleHMD15,
  author       = {Viktoria Grindle and
                  Syed Kamran Haider and
                  John Magee and
                  Marten van Dijk},
  editor       = {Margherita Antona and
                  Constantine Stephanidis},
  title        = {Virtual Fingerprint - Image-Based Authentication Increases Privacy
                  for Users of Mouse-Replacement Interfaces},
  booktitle    = {Universal Access in Human-Computer Interaction. Access to the Human
                  Environment and Culture - 9th International Conference, {UAHCI} 2015,
                  Held as Part of {HCI} International 2015, Los Angeles, CA, USA, August
                  2-7, 2015 Proceedings, Part {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9178},
  pages        = {182--191},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-20687-5\_18},
  doi          = {10.1007/978-3-319-20687-5\_18},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/hci/GrindleHMD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccd/HaiderAHPJSKD15,
  author       = {Syed Kamran Haider and
                  Masab Ahmad and
                  Farrukh Hijaz and
                  Astha Patni and
                  Ethan Johnson and
                  Matthew Seita and
                  Omer Khan and
                  Marten van Dijk},
  title        = {{M-MAP:} Multi-factor memory authentication for secure embedded processors},
  booktitle    = {33rd {IEEE} International Conference on Computer Design, {ICCD} 2015,
                  New York City, NY, USA, October 18-21, 2015},
  pages        = {471--474},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICCD.2015.7357151},
  doi          = {10.1109/ICCD.2015.7357151},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iccd/HaiderAHPJSKD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isca/AhmadHHDK15,
  author       = {Masab Ahmad and
                  Syed Kamran Haider and
                  Farrukh Hijaz and
                  Marten van Dijk and
                  Omer Khan},
  editor       = {Ruby B. Lee and
                  Weidong Shi and
                  Jakub Szefer},
  title        = {Exploring the performance implications of memory safety primitives
                  in many-core processors executing multi-threaded workloads},
  booktitle    = {Proceedings of the Fourth Workshop on Hardware and Architectural Support
                  for Security and Privacy, HASP@ISCA 2015, Portland, OR, USA, June
                  14, 2015},
  pages        = {6:1--6:8},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2768566.2768572},
  doi          = {10.1145/2768566.2768572},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isca/AhmadHHDK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isca/YuHRFKDD15,
  author       = {Xiangyao Yu and
                  Syed Kamran Haider and
                  Ling Ren and
                  Christopher W. Fletcher and
                  Albert Kwon and
                  Marten van Dijk and
                  Srinivas Devadas},
  editor       = {Deborah T. Marr and
                  David H. Albonesi},
  title        = {PrORAM: dynamic prefetcher for oblivious {RAM}},
  booktitle    = {Proceedings of the 42nd Annual International Symposium on Computer
                  Architecture, Portland, OR, USA, June 13-17, 2015},
  pages        = {616--628},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2749469.2750413},
  doi          = {10.1145/2749469.2750413},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isca/YuHRFKDD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/RenFKSSDD15,
  author       = {Ling Ren and
                  Christopher W. Fletcher and
                  Albert Kwon and
                  Emil Stefanov and
                  Elaine Shi and
                  Marten van Dijk and
                  Srinivas Devadas},
  editor       = {Jaeyeon Jung and
                  Thorsten Holz},
  title        = {Constants Count: Practical Improvements to Oblivious {RAM}},
  booktitle    = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington,
                  D.C., USA, August 12-14, 2015},
  pages        = {415--430},
  publisher    = {{USENIX} Association},
  year         = {2015},
  url          = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/ren-ling},
  timestamp    = {Mon, 01 Feb 2021 08:42:57 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/RenFKSSDD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DevadasDFR15,
  author       = {Srinivas Devadas and
                  Marten van Dijk and
                  Christopher W. Fletcher and
                  Ling Ren},
  title        = {Onion {ORAM:} {A} Constant Bandwidth and Constant Client Storage {ORAM}
                  (without {FHE} or {SWHE)}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {5},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/005},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DevadasDFR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JinD15,
  author       = {Chenglu Jin and
                  Marten van Dijk},
  title        = {Secure and Efficient Initialization and Authentication Protocols for
                  {SHIELD}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {210},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/210},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JinD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HaiderAHPJSKD15,
  author       = {Syed Kamran Haider and
                  Masab Ahmad and
                  Farrukh Hijaz and
                  Astha Patni and
                  Ethan Johnson and
                  Matthew Seita and
                  Omer Khan and
                  Marten van Dijk},
  title        = {{M-MAP:} Multi-Factor Memory Authentication for Secure Embedded Processors},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {831},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/831},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HaiderAHPJSKD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JinXBRD15,
  author       = {Chenglu Jin and
                  Xiaolin Xu and
                  Wayne P. Burleson and
                  Ulrich R{\"{u}}hrmair and
                  Marten van Dijk},
  title        = {PLayPUF: Programmable Logically Erasable PUFs for Forward and Backward
                  Secure Key Management},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1052},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1052},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JinXBRD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/date/DijkR14,
  author       = {Marten van Dijk and
                  Ulrich R{\"{u}}hrmair},
  editor       = {Gerhard P. Fettweis and
                  Wolfgang Nebel},
  title        = {Protocol attacks on advanced {PUF} protocols and countermeasures},
  booktitle    = {Design, Automation {\&} Test in Europe Conference {\&} Exhibition,
                  {DATE} 2014, Dresden, Germany, March 24-28, 2014},
  pages        = {1--6},
  publisher    = {European Design and Automation Association},
  year         = {2014},
  url          = {https://doi.org/10.7873/DATE.2014.364},
  doi          = {10.7873/DATE.2014.364},
  timestamp    = {Wed, 16 Oct 2019 14:14:53 +0200},
  biburl       = {https://dblp.org/rec/conf/date/DijkR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hpca/FletcherRYDKD14,
  author       = {Christopher W. Fletcher and
                  Ling Ren and
                  Xiangyao Yu and
                  Marten van Dijk and
                  Omer Khan and
                  Srinivas Devadas},
  title        = {Suppressing the Oblivious {RAM} timing channel while making information
                  leakage and program efficiency trade-offs},
  booktitle    = {20th {IEEE} International Symposium on High Performance Computer Architecture,
                  {HPCA} 2014, Orlando, FL, USA, February 15-19, 2014},
  pages        = {213--224},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/HPCA.2014.6835932},
  doi          = {10.1109/HPCA.2014.6835932},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hpca/FletcherRYDKD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ics/SuhFCGDD14,
  author       = {G. Edward Suh and
                  Christopher W. Fletcher and
                  Dwaine E. Clarke and
                  Blaise Gassend and
                  Marten van Dijk and
                  Srinivas Devadas},
  editor       = {Utpal Banerjee},
  title        = {Author retrospective {AEGIS:} architecture for tamper-evident and
                  tamper-resistant processing},
  booktitle    = {{ACM} International Conference on Supercomputing 25th Anniversary
                  Volume},
  pages        = {68--70},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2591635.2591665},
  doi          = {10.1145/2591635.2591665},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ics/SuhFCGDD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isvlsi/DijkR14,
  author       = {Marten van Dijk and
                  Uli R{\"{u}}hrmair},
  title        = {{PUF} Interfaces and their Security},
  booktitle    = {{IEEE} Computer Society Annual Symposium on VLSI, {ISVLSI} 2014, Tampa,
                  FL, USA, July 9-11, 2014},
  pages        = {25--28},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/ISVLSI.2014.90},
  doi          = {10.1109/ISVLSI.2014.90},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isvlsi/DijkR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RenFYKDD14,
  author       = {Ling Ren and
                  Christopher W. Fletcher and
                  Xiangyao Yu and
                  Albert Kwon and
                  Marten van Dijk and
                  Srinivas Devadas},
  title        = {Unified Oblivious-RAM: Improving Recursive {ORAM} with Locality and
                  Pseudorandomness},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {205},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/205},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/RenFYKDD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/YuRFKDD14,
  author       = {Xiangyao Yu and
                  Ling Ren and
                  Christopher W. Fletcher and
                  Albert Kwon and
                  Marten van Dijk and
                  Srinivas Devadas},
  title        = {Enhancing Oblivious {RAM} Performance Using Dynamic Prefetching},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {234},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/234},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/YuRFKDD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FletcherRKDSD14,
  author       = {Christopher W. Fletcher and
                  Ling Ren and
                  Albert Kwon and
                  Marten van Dijk and
                  Emil Stefanov and
                  Srinivas Devadas},
  title        = {{RAW} Path {ORAM:} {A} Low-Latency, Low-Area Hardware {ORAM} Controller
                  with Integrity Verification},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {431},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/431},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FletcherRKDSD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HerderRDYD14,
  author       = {Charles Herder and
                  Ling Ren and
                  Marten van Dijk and
                  Meng{-}Day (Mandel) Yu and
                  Srinivas Devadas},
  title        = {Trapdoor Computational Fuzzy Extractors},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {938},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/938},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HerderRDYD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HaiderJASKD14,
  author       = {Syed Kamran Haider and
                  Chenglu Jin and
                  Masab Ahmad and
                  Devu Manikantan Shila and
                  Omer Khan and
                  Marten van Dijk},
  title        = {HaTCh: Hardware Trojan Catcher},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {943},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/943},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HaiderJASKD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RenFKSSDD14,
  author       = {Ling Ren and
                  Christopher W. Fletcher and
                  Albert Kwon and
                  Emil Stefanov and
                  Elaine Shi and
                  Marten van Dijk and
                  Srinivas Devadas},
  title        = {Ring {ORAM:} Closing the Gap Between Small and Large Client Storage
                  Oblivious {RAM}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {997},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/997},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/RenFKSSDD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/RuhrmairD13,
  author       = {Ulrich R{\"{u}}hrmair and
                  Marten van Dijk},
  title        = {On the practical use of physical unclonable functions in oblivious
                  transfer and bit commitment protocols},
  journal      = {J. Cryptogr. Eng.},
  volume       = {3},
  number       = {1},
  pages        = {17--28},
  year         = {2013},
  url          = {https://doi.org/10.1007/s13389-013-0052-8},
  doi          = {10.1007/S13389-013-0052-8},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/RuhrmairD13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/DijkJOR13,
  author       = {Marten van Dijk and
                  Ari Juels and
                  Alina Oprea and
                  Ronald L. Rivest},
  title        = {FlipIt: The Game of "Stealthy Takeover"},
  journal      = {J. Cryptol.},
  volume       = {26},
  number       = {4},
  pages        = {655--713},
  year         = {2013},
  url          = {https://doi.org/10.1007/s00145-012-9134-5},
  doi          = {10.1007/S00145-012-9134-5},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/DijkJOR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/YuFRDD13,
  author       = {Xiangyao Yu and
                  Christopher W. Fletcher and
                  Ling Ren and
                  Marten van Dijk and
                  Srinivas Devadas},
  editor       = {Ari Juels and
                  Bryan Parno},
  title        = {Generalized external interaction with tamper-resistant hardware with
                  bounded information leakage},
  booktitle    = {CCSW'13, Proceedings of the 2013 {ACM} Cloud Computing Security Workshop,
                  Co-located with {CCS} 2013, Berlin, Germany, November 4, 2013},
  pages        = {23--34},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2517488.2517498},
  doi          = {10.1145/2517488.2517498},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/YuFRDD13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/StefanovDSFRYD13,
  author       = {Emil Stefanov and
                  Marten van Dijk and
                  Elaine Shi and
                  Christopher W. Fletcher and
                  Ling Ren and
                  Xiangyao Yu and
                  Srinivas Devadas},
  editor       = {Ahmad{-}Reza Sadeghi and
                  Virgil D. Gligor and
                  Moti Yung},
  title        = {Path {ORAM:} an extremely simple oblivious {RAM} protocol},
  booktitle    = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security,
                  CCS'13, Berlin, Germany, November 4-8, 2013},
  pages        = {299--310},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2508859.2516660},
  doi          = {10.1145/2508859.2516660},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/StefanovDSFRYD13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hpec/RenFYDD13,
  author       = {Ling Ren and
                  Christopher W. Fletcher and
                  Xiangyao Yu and
                  Marten van Dijk and
                  Srinivas Devadas},
  title        = {Integrity verification for path Oblivious-RAM},
  booktitle    = {{IEEE} High Performance Extreme Computing Conference, {HPEC} 2013,
                  Waltham, MA, USA, September 10-12, 2013},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/HPEC.2013.6670339},
  doi          = {10.1109/HPEC.2013.6670339},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/hpec/RenFYDD13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isca/RenYFDD13,
  author       = {Ling Ren and
                  Xiangyao Yu and
                  Christopher W. Fletcher and
                  Marten van Dijk and
                  Srinivas Devadas},
  editor       = {Avi Mendelson},
  title        = {Design space exploration and optimization of path oblivious {RAM}
                  in secure processors},
  booktitle    = {The 40th Annual International Symposium on Computer Architecture,
                  ISCA'13, Tel-Aviv, Israel, June 23-27, 2013},
  pages        = {571--582},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2485922.2485971},
  doi          = {10.1145/2485922.2485971},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isca/RenYFDD13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/RuhrmairD13,
  author       = {Ulrich R{\"{u}}hrmair and
                  Marten van Dijk},
  title        = {PUFs in Security Protocols: Attack Models and Security Evaluations},
  booktitle    = {2013 {IEEE} Symposium on Security and Privacy, {SP} 2013, Berkeley,
                  CA, USA, May 19-22, 2013},
  pages        = {286--300},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/SP.2013.27},
  doi          = {10.1109/SP.2013.27},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/RuhrmairD13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RenYFDD13,
  author       = {Ling Ren and
                  Xiangyao Yu and
                  Christopher W. Fletcher and
                  Marten van Dijk and
                  Srinivas Devadas},
  title        = {Design Space Exploration and Optimization of Path Oblivious {RAM}
                  in Secure Processors},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {76},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/076},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/RenYFDD13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/StefanovDSFRYD13,
  author       = {Emil Stefanov and
                  Marten van Dijk and
                  Elaine Shi and
                  Christopher W. Fletcher and
                  Ling Ren and
                  Xiangyao Yu and
                  Srinivas Devadas},
  title        = {Path {ORAM:} An Extremely Simple Oblivious {RAM} Protocol},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {280},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/280},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/StefanovDSFRYD13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/StefanovDJO12,
  author       = {Emil Stefanov and
                  Marten van Dijk and
                  Ari Juels and
                  Alina Oprea},
  editor       = {Robert H'obbes' Zakon},
  title        = {Iris: a scalable cloud file system with efficient integrity checks},
  booktitle    = {28th Annual Computer Security Applications Conference, {ACSAC} 2012,
                  Orlando, FL, USA, 3-7 December 2012},
  pages        = {229--238},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2420950.2420985},
  doi          = {10.1145/2420950.2420985},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/StefanovDJO12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/FletcherDD12,
  author       = {Christopher W. Fletcher and
                  Marten van Dijk and
                  Srinivas Devadas},
  editor       = {Ting Yu and
                  Srdjan Capkun and
                  Seny Kamara},
  title        = {Towards an interpreter for efficient encrypted computation},
  booktitle    = {Proceedings of the 2012 {ACM} Workshop on Cloud computing security,
                  {CCSW} 2012, Raleigh, NC, USA, October 19, 2012},
  pages        = {83--94},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2381913.2381928},
  doi          = {10.1145/2381913.2381928},
  timestamp    = {Tue, 12 Apr 2022 13:28:49 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/FletcherDD12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/DijkJORST12,
  author       = {Marten van Dijk and
                  Ari Juels and
                  Alina Oprea and
                  Ronald L. Rivest and
                  Emil Stefanov and
                  Nikos Triandopoulos},
  editor       = {Ting Yu and
                  George Danezis and
                  Virgil D. Gligor},
  title        = {Hourglass schemes: how to prove that cloud files are encrypted},
  booktitle    = {the {ACM} Conference on Computer and Communications Security, CCS'12,
                  Raleigh, NC, USA, October 16-18, 2012},
  pages        = {265--280},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2382196.2382227},
  doi          = {10.1145/2382196.2382227},
  timestamp    = {Tue, 12 Apr 2022 13:28:49 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/DijkJORST12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/RuhrmairD12,
  author       = {Ulrich R{\"{u}}hrmair and
                  Marten van Dijk},
  editor       = {Emmanuel Prouff and
                  Patrick Schaumont},
  title        = {Practical Security Analysis of PUF-Based Two-Player Protocols},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2012 - 14th International
                  Workshop, Leuven, Belgium, September 9-12, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7428},
  pages        = {251--267},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33027-8\_15},
  doi          = {10.1007/978-3-642-33027-8\_15},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/RuhrmairD12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/BowersDGJORT12,
  author       = {Kevin D. Bowers and
                  Marten van Dijk and
                  Robert Griffin and
                  Ari Juels and
                  Alina Oprea and
                  Ronald L. Rivest and
                  Nikos Triandopoulos},
  editor       = {Jens Grossklags and
                  Jean C. Walrand},
  title        = {Defending against the Unknown Enemy: Applying FlipIt to System Security},
  booktitle    = {Decision and Game Theory for Security - Third International Conference,
                  GameSec 2012, Budapest, Hungary, November 5-6, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7638},
  pages        = {248--263},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34266-0\_15},
  doi          = {10.1007/978-3-642-34266-0\_15},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/BowersDGJORT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DijkJOR12,
  author       = {Marten van Dijk and
                  Ari Juels and
                  Alina Oprea and
                  Ronald L. Rivest},
  title        = {FlipIt: The Game of "Stealthy Takeover"},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {103},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/103},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DijkJOR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DijkR12,
  author       = {Marten van Dijk and
                  Ulrich R{\"{u}}hrmair},
  title        = {Physical Unclonable Functions in Cryptographic Protocols: Security
                  Proofs and Impossibility Results},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {228},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/228},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DijkR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FletcherDD12,
  author       = {Christopher W. Fletcher and
                  Marten van Dijk and
                  Srinivas Devadas},
  title        = {Compilation Techniques for Efficient Encrypted Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {266},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/266},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FletcherDD12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BowersDGJORT12,
  author       = {Kevin D. Bowers and
                  Marten van Dijk and
                  Robert Griffin and
                  Ari Juels and
                  Alina Oprea and
                  Ronald L. Rivest and
                  Nikos Triandopoulos},
  title        = {Defending Against the Unknown Enemy: Applying FlipIt to System Security},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {579},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/579},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BowersDGJORT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BowersDJOR11,
  author       = {Kevin D. Bowers and
                  Marten van Dijk and
                  Ari Juels and
                  Alina Oprea and
                  Ronald L. Rivest},
  editor       = {Yan Chen and
                  George Danezis and
                  Vitaly Shmatikov},
  title        = {How to tell if your cloud files are vulnerable to drive crashes},
  booktitle    = {Proceedings of the 18th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2011, Chicago, Illinois, USA, October 17-21, 2011},
  pages        = {501--514},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2046707.2046766},
  doi          = {10.1145/2046707.2046766},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/BowersDJOR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/chi/DenningBDJ11,
  author       = {Tamara Denning and
                  Kevin D. Bowers and
                  Marten van Dijk and
                  Ari Juels},
  editor       = {Desney S. Tan and
                  Saleema Amershi and
                  Bo Begole and
                  Wendy A. Kellogg and
                  Manas Tungare},
  title        = {Exploring implicit memory for painless password recovery},
  booktitle    = {Proceedings of the International Conference on Human Factors in Computing
                  Systems, {CHI} 2011, Vancouver, BC, Canada, May 7-12, 2011},
  pages        = {2615--2618},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/1978942.1979323},
  doi          = {10.1145/1978942.1979323},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/chi/DenningBDJ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/StefanovDOJ11,
  author       = {Emil Stefanov and
                  Marten van Dijk and
                  Alina Oprea and
                  Ari Juels},
  title        = {Iris: {A} Scalable Cloud File System with Efficient Integrity Checks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {585},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/585},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/StefanovDOJ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/DijkGHV10,
  author       = {Marten van Dijk and
                  Craig Gentry and
                  Shai Halevi and
                  Vinod Vaikuntanathan},
  editor       = {Henri Gilbert},
  title        = {Fully Homomorphic Encryption over the Integers},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2010, 29th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Monaco / French Riviera, May 30 - June 3, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6110},
  pages        = {24--43},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13190-5\_2},
  doi          = {10.1007/978-3-642-13190-5\_2},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/DijkGHV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/DijkJ10,
  author       = {Marten van Dijk and
                  Ari Juels},
  editor       = {Wietse Z. Venema},
  title        = {On the Impossibility of Cryptography Alone for Privacy-Preserving
                  Cloud Computing},
  booktitle    = {5th {USENIX} Workshop on Hot Topics in Security, HotSec'10, Washington,
                  D.C., USA, August 10, 2010},
  publisher    = {{USENIX} Association},
  year         = {2010},
  url          = {https://www.usenix.org/conference/hotsec10/impossibility-cryptography-alone-privacy-preserving-cloud-computing},
  timestamp    = {Mon, 01 Feb 2021 08:43:16 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/DijkJ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BowersDJOR10,
  author       = {Kevin D. Bowers and
                  Marten van Dijk and
                  Ari Juels and
                  Alina Oprea and
                  Ronald L. Rivest},
  title        = {How to Tell if Your Cloud Files Are Vulnerable to Drive Crashes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {214},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/214},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BowersDJOR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DijkJ10,
  author       = {Marten van Dijk and
                  Ari Juels},
  title        = {On the Impossibility of Cryptography Alone for Privacy-Preserving
                  Cloud Computing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {305},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/305},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DijkJ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isca/KinsyCWSDD09,
  author       = {Michel A. Kinsy and
                  Myong Hyon Cho and
                  Tina Wen and
                  G. Edward Suh and
                  Marten van Dijk and
                  Srinivas Devadas},
  editor       = {Stephen W. Keckler and
                  Luiz Andr{\'{e}} Barroso},
  title        = {Application-aware deadlock-free oblivious routing},
  booktitle    = {36th International Symposium on Computer Architecture {(ISCA} 2009),
                  June 20-24, 2009, Austin, TX, {USA}},
  pages        = {208--219},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1555754.1555782},
  doi          = {10.1145/1555754.1555782},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isca/KinsyCWSDD09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DijkGHV09,
  author       = {Marten van Dijk and
                  Craig Gentry and
                  Shai Halevi and
                  Vinod Vaikuntanathan},
  title        = {Fully Homomorphic Encryption over the Integers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {616},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/616},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DijkGHV09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/GassendDCTDT08,
  author       = {Blaise Gassend and
                  Marten van Dijk and
                  Dwaine E. Clarke and
                  Emina Torlak and
                  Srinivas Devadas and
                  Pim Tuyls},
  title        = {Controlled physical random functions and applications},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {10},
  number       = {4},
  pages        = {3:1--3:22},
  year         = {2008},
  url          = {https://doi.org/10.1145/1284680.1284683},
  doi          = {10.1145/1284680.1284683},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/GassendDCTDT08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cardis/CostanSDD08,
  author       = {Victor Costan and
                  Luis F. G. Sarmenta and
                  Marten van Dijk and
                  Srinivas Devadas},
  editor       = {Gilles Grimaud and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {The Trusted Execution Module: Commodity General-Purpose Trusted Computing},
  booktitle    = {Smart Card Research and Advanced Applications, 8th {IFIP} {WG} 8.8/11.2
                  International Conference, {CARDIS} 2008, London, UK, September 8-11,
                  2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5189},
  pages        = {133--148},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85893-5\_10},
  doi          = {10.1007/978-3-540-85893-5\_10},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cardis/CostanSDD08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/SarmentaDRD08,
  author       = {Luis F. G. Sarmenta and
                  Marten van Dijk and
                  Jonathan Rhodes and
                  Srinivas Devadas},
  editor       = {Roger L. Wainwright and
                  Hisham Haddad},
  title        = {Offline count-limited certificates},
  booktitle    = {Proceedings of the 2008 {ACM} Symposium on Applied Computing (SAC),
                  Fortaleza, Ceara, Brazil, March 16-20, 2008},
  pages        = {2145--2152},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1363686.1364200},
  doi          = {10.1145/1363686.1364200},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sac/SarmentaDRD08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bmcbi/GassendOTLDD07,
  author       = {Blaise Gassend and
                  Charles W. O'Donnell and
                  William Thies and
                  Andrew Lee and
                  Marten van Dijk and
                  Srinivas Devadas},
  title        = {Learning biophysically-motivated parameters for alpha helix prediction},
  journal      = {{BMC} Bioinform.},
  volume       = {8},
  number       = {{S-5}},
  year         = {2007},
  url          = {https://doi.org/10.1186/1471-2105-8-S5-S3},
  doi          = {10.1186/1471-2105-8-S5-S3},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/bmcbi/GassendOTLDD07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/DijkRSD07,
  author       = {Marten van Dijk and
                  Jonathan Rhodes and
                  Luis F. G. Sarmenta and
                  Srinivas Devadas},
  editor       = {Peng Ning and
                  Vijay Atluri and
                  Shouhuai Xu and
                  Moti Yung},
  title        = {Offline untrusted storage with immediate detection of forking and
                  replay attacks},
  booktitle    = {Proceedings of the 2nd {ACM} Workshop on Scalable Trusted Computing,
                  {STC} 2007, Alexandria, VA, USA, November 2, 2007},
  pages        = {41--48},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1314354.1314364},
  doi          = {10.1145/1314354.1314364},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/DijkRSD07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/DijkCGSD06,
  author       = {Marten van Dijk and
                  Dwaine E. Clarke and
                  Blaise Gassend and
                  G. Edward Suh and
                  Srinivas Devadas},
  title        = {Speeding up Exponentiation using an Untrusted Computational Resource},
  journal      = {Des. Codes Cryptogr.},
  volume       = {39},
  number       = {2},
  pages        = {253--273},
  year         = {2006},
  url          = {https://doi.org/10.1007/s10623-005-3710-8},
  doi          = {10.1007/S10623-005-3710-8},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/DijkCGSD06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipl/DijkKST06,
  author       = {Marten van Dijk and
                  Tom A. M. Kevenaar and
                  Geert Jan Schrijen and
                  Pim Tuyls},
  title        = {Improved constructions of secret sharing schemes by applying (lambda,
                  omega)-decompositions},
  journal      = {Inf. Process. Lett.},
  volume       = {99},
  number       = {4},
  pages        = {154--157},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.ipl.2006.01.016},
  doi          = {10.1016/J.IPL.2006.01.016},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ipl/DijkKST06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/SarmentaDORD06,
  author       = {Luis F. G. Sarmenta and
                  Marten van Dijk and
                  Charles W. O'Donnell and
                  Jonathan Rhodes and
                  Srinivas Devadas},
  editor       = {Ari Juels and
                  Gene Tsudik and
                  Shouhuai Xu and
                  Moti Yung},
  title        = {Virtual monotonic counters and count-limited objects using a {TPM}
                  without a trusted {OS}},
  booktitle    = {Proceedings of the 1st {ACM} Workshop on Scalable Trusted Computing,
                  {STC} 2006, Alexandria, VA, USA, November 3, 2006},
  pages        = {27--42},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1179474.1179485},
  doi          = {10.1145/1179474.1179485},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/SarmentaDORD06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/prib/GassendOTLDD06,
  author       = {Blaise Gassend and
                  Charles W. O'Donnell and
                  William Thies and
                  Andrew Lee and
                  Marten van Dijk and
                  Srinivas Devadas},
  editor       = {Jagath C. Rajapakse and
                  Limsoon Wong and
                  Raj Acharya},
  title        = {Predicting Secondary Structure of All-Helical Proteins Using Hidden
                  Markov Support Vector Machines},
  booktitle    = {Pattern Recognition in Bioinformatics, International Workshop, {PRIB}
                  2006, Hong Kong, China, August 20, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4146},
  pages        = {93--104},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11818564\_11},
  doi          = {10.1007/11818564\_11},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/prib/GassendOTLDD06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-cs-0605097,
  author       = {Marten van Dijk and
                  Emina Torlak and
                  Blaise Gassend and
                  Srinivas Devadas},
  title        = {A Generalized Two-Phase Analysis of Knowledge Flows in Security Protocols},
  journal      = {CoRR},
  volume       = {abs/cs/0605097},
  year         = {2006},
  url          = {http://arxiv.org/abs/cs/0605097},
  eprinttype    = {arXiv},
  eprint       = {cs/0605097},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-cs-0605097.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-cs-0605109,
  author       = {Emina Torlak and
                  Marten van Dijk and
                  Blaise Gassend and
                  Daniel Jackson and
                  Srinivas Devadas},
  title        = {Knowledge Flow Analysis for Security Protocols},
  journal      = {CoRR},
  volume       = {abs/cs/0605109},
  year         = {2006},
  url          = {http://arxiv.org/abs/cs/0605109},
  eprinttype    = {arXiv},
  eprint       = {cs/0605109},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-cs-0605109.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/DijkEGW05,
  author       = {Marten van Dijk and
                  Sebastian Egner and
                  Marcus Greferath and
                  Alfred Wassermann},
  title        = {On two doubly even self-dual binary codes of length 160 and minimum
                  weight 24},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {51},
  number       = {1},
  pages        = {408--411},
  year         = {2005},
  url          = {https://doi.org/10.1109/TIT.2004.839535},
  doi          = {10.1109/TIT.2004.839535},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tit/DijkEGW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/WillemsD05,
  author       = {Frans M. J. Willems and
                  Marten van Dijk},
  title        = {Capacity and codes for embedding information in gray-scale signals},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {51},
  number       = {3},
  pages        = {1209--1214},
  year         = {2005},
  url          = {https://doi.org/10.1109/TIT.2004.842707},
  doi          = {10.1109/TIT.2004.842707},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tit/WillemsD05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tvlsi/LimLGSDD05,
  author       = {Daihyun Lim and
                  Jae W. Lee and
                  Blaise Gassend and
                  G. Edward Suh and
                  Marten van Dijk and
                  Srinivas Devadas},
  title        = {Extracting secret keys from integrated circuits},
  journal      = {{IEEE} Trans. Very Large Scale Integr. Syst.},
  volume       = {13},
  number       = {10},
  pages        = {1200--1205},
  year         = {2005},
  url          = {https://doi.org/10.1109/TVLSI.2005.859470},
  doi          = {10.1109/TVLSI.2005.859470},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tvlsi/LimLGSDD05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/DijkGPRSSW05,
  author       = {Marten van Dijk and
                  Robert Granger and
                  Dan Page and
                  Karl Rubin and
                  Alice Silverberg and
                  Martijn Stam and
                  David P. Woodruff},
  editor       = {Ronald Cramer},
  title        = {Practical Cryptography in High Dimensional Tori},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2005, 24th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Aarhus, Denmark, May 22-26, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3494},
  pages        = {234--250},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11426639\_14},
  doi          = {10.1007/11426639\_14},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/DijkGPRSSW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eusipco/DijkT05,
  author       = {Marten van Dijk and
                  Pim Tuyls},
  title        = {Secure biometrics},
  booktitle    = {13th European Signal Processing Conference, {EUSIPCO} 2005, Antalya,
                  Turkey, September 4-8, 2005},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2005},
  url          = {https://ieeexplore.ieee.org/document/7077980/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eusipco/DijkT05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/ClarkeSGSDD05,
  author       = {Dwaine E. Clarke and
                  G. Edward Suh and
                  Blaise Gassend and
                  Ajay Sudan and
                  Marten van Dijk and
                  Srinivas Devadas},
  title        = {Towards Constant Bandwidth Overhead Integrity Checking of Untrusted
                  Data},
  booktitle    = {2005 {IEEE} Symposium on Security and Privacy (S{\&}P 2005), 8-11
                  May 2005, Oakland, CA, {USA}},
  pages        = {139--153},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/SP.2005.24},
  doi          = {10.1109/SP.2005.24},
  timestamp    = {Thu, 21 Sep 2023 15:57:31 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/ClarkeSGSDD05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/concurrency/GassendLCDD04,
  author       = {Blaise Gassend and
                  Daihyun Lim and
                  Dwaine E. Clarke and
                  Marten van Dijk and
                  Srinivas Devadas},
  title        = {Identification and authentication of integrated circuits},
  journal      = {Concurr. Pract. Exp.},
  volume       = {16},
  number       = {11},
  pages        = {1077--1098},
  year         = {2004},
  url          = {https://doi.org/10.1002/cpe.805},
  doi          = {10.1002/CPE.805},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/concurrency/GassendLCDD04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DijkW04,
  author       = {Marten van Dijk and
                  David P. Woodruff},
  editor       = {Matthew K. Franklin},
  title        = {Asymptotically Optimal Communication for Torus-Based Cryptography},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2004, 24th Annual International
                  CryptologyConference, Santa Barbara, California, USA, August 15-19,
                  2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3152},
  pages        = {157--178},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-28628-8\_10},
  doi          = {10.1007/978-3-540-28628-8\_10},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/DijkW04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DijkGPRSSW04,
  author       = {Marten van Dijk and
                  Robert Granger and
                  Dan Page and
                  Karl Rubin and
                  Alice Silverberg and
                  Martijn Stam and
                  David P. Woodruff},
  title        = {Practical Cryptography in High Dimensional Tori},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {352},
  year         = {2004},
  url          = {http://eprint.iacr.org/2004/352},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DijkGPRSSW04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/LiuTD03,
  author       = {Shengli Liu and
                  Henk C. A. van Tilborg and
                  Marten van Dijk},
  title        = {A Practical Protocol for Advantage Distillation and Information Reconciliation},
  journal      = {Des. Codes Cryptogr.},
  volume       = {30},
  number       = {1},
  pages        = {39--62},
  year         = {2003},
  url          = {https://doi.org/10.1023/A:1024755209150},
  doi          = {10.1023/A:1024755209150},
  timestamp    = {Fri, 06 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/LiuTD03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ett/DijkJK03,
  author       = {Marten van Dijk and
                  Augustus J. E. M. Janssen and
                  Arie G. C. Koppelaar},
  title        = {Correcting systematic mismatches in computed log-likelihood ratios},
  journal      = {Eur. Trans. Telecommun.},
  volume       = {14},
  number       = {3},
  pages        = {227--244},
  year         = {2003},
  url          = {https://doi.org/10.1002/ett.917},
  doi          = {10.1002/ETT.917},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ett/DijkJK03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/DijkEMK03,
  author       = {Marten van Dijk and
                  Sebastian Egner and
                  Ravi Motwani and
                  Arie G. C. Koppelaar},
  title        = {Simultaneous zero-tailing of parallel concatenated codes},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {49},
  number       = {9},
  pages        = {2236--2241},
  year         = {2003},
  url          = {https://doi.org/10.1109/TIT.2003.815807},
  doi          = {10.1109/TIT.2003.815807},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tit/DijkEMK03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/ClarkeDDGS03,
  author       = {Dwaine E. Clarke and
                  Srinivas Devadas and
                  Marten van Dijk and
                  Blaise Gassend and
                  G. Edward Suh},
  editor       = {Chi{-}Sung Laih},
  title        = {Incremental Multiset Hash Functions and Their Application to Memory
                  Integrity Checking},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2003, 9th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Taipei, Taiwan, November 30 - December 4, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2894},
  pages        = {188--207},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-40061-5\_12},
  doi          = {10.1007/978-3-540-40061-5\_12},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/ClarkeDDGS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hpca/GassendSCDD03,
  author       = {Blaise Gassend and
                  G. Edward Suh and
                  Dwaine E. Clarke and
                  Marten van Dijk and
                  Srinivas Devadas},
  title        = {Caches and Hash Trees for Efficient Memory Integrity Verification},
  booktitle    = {Proceedings of the Ninth International Symposium on High-Performance
                  Computer Architecture (HPCA'03), Anaheim, California, USA, February
                  8-12, 2003},
  pages        = {295--306},
  publisher    = {{IEEE} Computer Society},
  year         = {2003},
  url          = {https://doi.org/10.1109/HPCA.2003.1183547},
  doi          = {10.1109/HPCA.2003.1183547},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hpca/GassendSCDD03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ics/SuhCGDD03,
  author       = {G. Edward Suh and
                  Dwaine E. Clarke and
                  Blaise Gassend and
                  Marten van Dijk and
                  Srinivas Devadas},
  editor       = {Utpal Banerjee and
                  Kyle A. Gallivan and
                  Antonio Gonz{\'{a}}lez},
  title        = {{AEGIS:} architecture for tamper-evident and tamper-resistant processing},
  booktitle    = {Proceedings of the 17th Annual International Conference on Supercomputing,
                  {ICS} 2003, San Francisco, CA, USA, June 23-26, 2003},
  pages        = {160--171},
  publisher    = {{ACM}},
  year         = {2003},
  url          = {https://doi.org/10.1145/782814.782838},
  doi          = {10.1145/782814.782838},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ics/SuhCGDD03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/micro/SuhCGDD03,
  author       = {G. Edward Suh and
                  Dwaine E. Clarke and
                  Blaise Gassend and
                  Marten van Dijk and
                  Srinivas Devadas},
  title        = {Efficient Memory Integrity Verification and Encryption for Secure
                  Processors},
  booktitle    = {Proceedings of the 36th Annual International Symposium on Microarchitecture,
                  San Diego, CA, USA, December 3-5, 2003},
  pages        = {339--350},
  publisher    = {{IEEE} Computer Society},
  year         = {2003},
  url          = {https://doi.org/10.1109/MICRO.2003.1253207},
  doi          = {10.1109/MICRO.2003.1253207},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/micro/SuhCGDD03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/GassendCDD03,
  author       = {Blaise Gassend and
                  Dwaine E. Clarke and
                  Marten van Dijk and
                  Srinivas Devadas},
  editor       = {Gary B. Lamont and
                  Hisham Haddad and
                  George A. Papadopoulos and
                  Brajendra Panda},
  title        = {Delay-Based Circuit Authentication and Applications},
  booktitle    = {Proceedings of the 2003 {ACM} Symposium on Applied Computing (SAC),
                  March 9-12, 2003, Melbourne, FL, {USA}},
  pages        = {294--301},
  publisher    = {{ACM}},
  year         = {2003},
  url          = {https://doi.org/10.1145/952532.952593},
  doi          = {10.1145/952532.952593},
  timestamp    = {Tue, 06 Nov 2018 11:06:45 +0100},
  biburl       = {https://dblp.org/rec/conf/sac/GassendCDD03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spc/TuylsKSSD03,
  author       = {Pim Tuyls and
                  Tom A. M. Kevenaar and
                  Geert Jan Schrijen and
                  Toine Staring and
                  Marten van Dijk},
  editor       = {Dieter Hutter and
                  G{\"{u}}nter M{\"{u}}ller and
                  Werner Stephan and
                  Markus Ullmann},
  title        = {Visual Crypto Displays Enabling Secure Communications},
  booktitle    = {Security in Pervasive Computing, First International Conference, Boppard,
                  Germany, March 12-14, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2802},
  pages        = {271--284},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-39881-3\_23},
  doi          = {10.1007/978-3-540-39881-3\_23},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spc/TuylsKSSD03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/TuylsKSSD03,
  author       = {Pim Tuyls and
                  Tom A. M. Kevenaar and
                  Geert Jan Schrijen and
                  Toine Staring and
                  Marten van Dijk},
  title        = {Visual Crypto Displays Enabling Secure Communications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {118},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/118},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/TuylsKSSD03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/GassendCDD02,
  author       = {Blaise Gassend and
                  Dwaine E. Clarke and
                  Marten van Dijk and
                  Srinivas Devadas},
  title        = {Controlled Physical Random Functions},
  booktitle    = {18th Annual Computer Security Applications Conference {(ACSAC} 2002),
                  9-13 December 2002, Las Vegas, NV, {USA}},
  pages        = {149--160},
  publisher    = {{IEEE} Computer Society},
  year         = {2002},
  url          = {https://doi.org/10.1109/CSAC.2002.1176287},
  doi          = {10.1109/CSAC.2002.1176287},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/GassendCDD02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/GassendCDD02,
  author       = {Blaise Gassend and
                  Dwaine E. Clarke and
                  Marten van Dijk and
                  Srinivas Devadas},
  editor       = {Vijayalakshmi Atluri},
  title        = {Silicon physical random functions},
  booktitle    = {Proceedings of the 9th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2002, Washington, DC, USA, November 18-22, 2002},
  pages        = {148--160},
  publisher    = {{ACM}},
  year         = {2002},
  url          = {https://doi.org/10.1145/586110.586132},
  doi          = {10.1145/586110.586132},
  timestamp    = {Tue, 10 Nov 2020 20:00:47 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/GassendCDD02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/WoodruffD02,
  author       = {David P. Woodruff and
                  Marten van Dijk},
  editor       = {Lars R. Knudsen},
  title        = {Cryptography in an Unbounded Computational Model},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2002, International Conference
                  on the Theory and Applications of Cryptographic Techniques, Amsterdam,
                  The Netherlands, April 28 - May 2, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2332},
  pages        = {149--164},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-46035-7\_10},
  doi          = {10.1007/3-540-46035-7\_10},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/WoodruffD02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pervasive/ClarkeGKBDDR02,
  author       = {Dwaine E. Clarke and
                  Blaise Gassend and
                  Thomas Kotwal and
                  Matt Burnside and
                  Marten van Dijk and
                  Srinivas Devadas and
                  Ronald L. Rivest},
  editor       = {Friedemann Mattern and
                  Mahmoud Naghshineh},
  title        = {The Untrusted Computer Problem and Camera-Based Authentication},
  booktitle    = {Pervasive Computing, First International Conference, Pervasive 2002,
                  Z{\"{u}}rich, Switzerland, August 26-28, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2414},
  pages        = {114--124},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45866-2\_10},
  doi          = {10.1007/3-540-45866-2\_10},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pervasive/ClarkeGKBDDR02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aaecc/KuijperDHO01,
  author       = {Margreta Kuijper and
                  Marten van Dijk and
                  Henk D. L. Hollmann and
                  Job Oostveen},
  editor       = {Serdar Boztas and
                  Igor E. Shparlinski},
  title        = {A Unifying System-Theoretic Framework for Errors-and-Erasures Reed-Solomon
                  Decoding},
  booktitle    = {Applied Algebra, Algebraic Algorithms and Error-Correcting Codes,
                  14th International Symposium, AAECC-14, Melbourne, Australia November
                  26-30, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2227},
  pages        = {343--352},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45624-4\_36},
  doi          = {10.1007/3-540-45624-4\_36},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aaecc/KuijperDHO01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/DijkT99,
  author       = {Marten van Dijk and
                  Ludo M. G. M. Tolhuizen},
  title        = {Efficient encoding for a class of subspace subcodes},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {45},
  number       = {6},
  pages        = {2142--2146},
  year         = {1999},
  url          = {https://doi.org/10.1109/18.782162},
  doi          = {10.1109/18.782162},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tit/DijkT99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/DijkGS98,
  author       = {Marten van Dijk and
                  Christian Gehrmann and
                  Ben J. M. Smeets},
  title        = {Unconditionally Secure Group Authentication},
  journal      = {Des. Codes Cryptogr.},
  volume       = {14},
  number       = {3},
  pages        = {281--296},
  year         = {1998},
  url          = {https://doi.org/10.1023/A:1008261021505},
  doi          = {10.1023/A:1008261021505},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/DijkGS98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/DijkJM98,
  author       = {Marten van Dijk and
                  Wen{-}Ai Jackson and
                  Keith M. Martin},
  title        = {A General Decomposition Construction for Incomplete Secret Sharing
                  Schemes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {15},
  number       = {3},
  pages        = {301--321},
  year         = {1998},
  url          = {https://doi.org/10.1023/A:1008381427667},
  doi          = {10.1023/A:1008381427667},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/DijkJM98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icip/KalkerLD98,
  author       = {Ton Kalker and
                  Jean{-}Paul M. G. Linnartz and
                  Marten van Dijk},
  title        = {Watermark Estimation through Detector Analysis},
  booktitle    = {Proceedings of the 1998 {IEEE} International Conference on Image Processing,
                  ICIP-98, Chicago, Illinois, USA, October 4-7, 1998},
  pages        = {425--429},
  publisher    = {{IEEE} Computer Society},
  year         = {1998},
  url          = {https://doi.org/10.1109/ICIP.1998.723516},
  doi          = {10.1109/ICIP.1998.723516},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icip/KalkerLD98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/LinnartzD98,
  author       = {Jean{-}Paul M. G. Linnartz and
                  Marten van Dijk},
  editor       = {David Aucsmith},
  title        = {Analysis of the Sensitivity Attack against Electronic Watermarks in
                  Images},
  booktitle    = {Information Hiding, Second International Workshop, Portland, Oregon,
                  USA, April 14-17, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1525},
  pages        = {258--272},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-49380-8\_18},
  doi          = {10.1007/3-540-49380-8\_18},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/LinnartzD98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Dijk97,
  author       = {Marten van Dijk},
  title        = {A Linear Construction of Secret Sharing Schemes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {12},
  number       = {2},
  pages        = {161--201},
  year         = {1997},
  url          = {https://doi.org/10.1023/A:1008259214236},
  doi          = {10.1023/A:1008259214236},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Dijk97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipl/Dijk97,
  author       = {Marten van Dijk},
  title        = {More Information Theoretical Inequalities to be Used in Secret Sharing?},
  journal      = {Inf. Process. Lett.},
  volume       = {63},
  number       = {1},
  pages        = {41--44},
  year         = {1997},
  url          = {https://doi.org/10.1016/S0020-0190(97)00086-0},
  doi          = {10.1016/S0020-0190(97)00086-0},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ipl/Dijk97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/Dijk97,
  author       = {Marten van Dijk},
  title        = {On a special class of broadcast channels with confidential messages},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {43},
  number       = {2},
  pages        = {712--714},
  year         = {1997},
  url          = {https://doi.org/10.1109/18.556128},
  doi          = {10.1109/18.556128},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tit/Dijk97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Dijk95,
  author       = {Marten van Dijk},
  title        = {On the Information Rate of Perfect Secret Sharing Schemes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {6},
  number       = {2},
  pages        = {143--169},
  year         = {1995},
  url          = {https://doi.org/10.1007/BF01398012},
  doi          = {10.1007/BF01398012},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Dijk95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/Dijk94,
  author       = {Marten van Dijk},
  editor       = {Alfredo De Santis},
  title        = {A Linear Construction of Perfect Secret Sharing Schemes},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '94, Workshop on the Theory and
                  Application of Cryptographic Techniques, Perugia, Italy, May 9-12,
                  1994, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {950},
  pages        = {23--34},
  publisher    = {Springer},
  year         = {1994},
  url          = {https://doi.org/10.1007/BFb0053421},
  doi          = {10.1007/BFB0053421},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/Dijk94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics