Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Marten van Dijk
@article{DBLP:journals/corr/abs-2403-07842, author = {Chaoyi Zhu and Jiayi Tang and Hans Brouwer and Juan F. P{\'{e}}rez and Marten van Dijk and Lydia Y. Chen}, title = {Quantifying and Mitigating Privacy Risks for Tabular Generative Models}, journal = {CoRR}, volume = {abs/2403.07842}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2403.07842}, doi = {10.48550/ARXIV.2403.07842}, eprinttype = {arXiv}, eprint = {2403.07842}, timestamp = {Thu, 04 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2403-07842.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/DijkJ23, author = {Marten van Dijk and Chenglu Jin}, title = {A Theoretical Framework for the Analysis of Physical Unclonable Function Interfaces and Its Relation to the Random Oracle Model}, journal = {J. Cryptol.}, volume = {36}, number = {4}, pages = {35}, year = {2023}, url = {https://doi.org/10.1007/s00145-023-09475-1}, doi = {10.1007/S00145-023-09475-1}, timestamp = {Tue, 12 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/DijkJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2303-04676, author = {Marten van Dijk and Phuong Ha Nguyen}, title = {Considerations on the Theory of Training Models with Differential Privacy}, journal = {CoRR}, volume = {abs/2303.04676}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2303.04676}, doi = {10.48550/ARXIV.2303.04676}, eprinttype = {arXiv}, eprint = {2303.04676}, timestamp = {Wed, 15 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2303-04676.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2307-11939, author = {Toan N. Nguyen and Phuong Ha Nguyen and Lam M. Nguyen and Marten van Dijk}, title = {Batch Clipping and Adaptive Layerwise Clipping for Differential Private Stochastic Gradient Descent}, journal = {CoRR}, volume = {abs/2307.11939}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2307.11939}, doi = {10.48550/ARXIV.2307.11939}, eprinttype = {arXiv}, eprint = {2307.11939}, timestamp = {Tue, 01 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2307-11939.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2312-01256, author = {Niloufar Sayadi and Phuong Ha Nguyen and Marten van Dijk and Chenglu Jin}, title = {Breaking {XOR} Arbiter PUFs without Reliability Information}, journal = {CoRR}, volume = {abs/2312.01256}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2312.01256}, doi = {10.48550/ARXIV.2312.01256}, eprinttype = {arXiv}, eprint = {2312.01256}, timestamp = {Fri, 08 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2312-01256.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2312-08086, author = {Reza Rahaeimehr and Marten van Dijk}, title = {Recursive Augmented Fernet {(RAF)} Token: Alleviating the Pain of Stolen Tokens}, journal = {CoRR}, volume = {abs/2312.08086}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2312.08086}, doi = {10.48550/ARXIV.2312.08086}, eprinttype = {arXiv}, eprint = {2312.08086}, timestamp = {Mon, 08 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2312-08086.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/MahmoodMRD22, author = {Kaleel Mahmood and Rigel Mahmood and Ethan Rathbun and Marten van Dijk}, title = {Back in Black: {A} Comparative Evaluation of Recent State-Of-The-Art Black-Box Attacks}, journal = {{IEEE} Access}, volume = {10}, pages = {998--1019}, year = {2022}, url = {https://doi.org/10.1109/ACCESS.2021.3138338}, doi = {10.1109/ACCESS.2021.3138338}, timestamp = {Fri, 21 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/MahmoodMRD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/MahmoodNNND22, author = {Kaleel Mahmood and Phuong Ha Nguyen and Lam M. Nguyen and Thanh Nguyen and Marten van Dijk}, title = {Besting the Black-Box: Barrier Zones for Adversarial Example Defense}, journal = {{IEEE} Access}, volume = {10}, pages = {1451--1474}, year = {2022}, url = {https://doi.org/10.1109/ACCESS.2021.3138966}, doi = {10.1109/ACCESS.2021.3138966}, timestamp = {Fri, 21 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/MahmoodNNND22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/coap/NguyenDPNWK22, author = {Lam M. Nguyen and Marten van Dijk and Dzung T. Phan and Phuong Ha Nguyen and Tsui{-}Wei Weng and Jayant R. Kalagnanam}, title = {Finite-sum smooth optimization with {SARAH}}, journal = {Comput. Optim. Appl.}, volume = {82}, number = {3}, pages = {561--593}, year = {2022}, url = {https://doi.org/10.1007/s10589-022-00375-x}, doi = {10.1007/S10589-022-00375-X}, timestamp = {Mon, 25 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/coap/NguyenDPNWK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/JinBDR22, author = {Chenglu Jin and Wayne P. Burleson and Marten van Dijk and Ulrich R{\"{u}}hrmair}, title = {Programmable access-controlled and generic erasable {PUF} design and its applications}, journal = {J. Cryptogr. Eng.}, volume = {12}, number = {4}, pages = {413--432}, year = {2022}, url = {https://doi.org/10.1007/s13389-022-00284-z}, doi = {10.1007/S13389-022-00284-Z}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/JinBDR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/GaoDXYNR22, author = {Yansong Gao and Marten van Dijk and Lei Xu and Wei Yang and Surya Nepal and Damith C. Ranasinghe}, title = {{TREVERSE:} TRial-and-Error Lightweight Secure ReVERSE Authentication With Simulatable PUFs}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {19}, number = {1}, pages = {419--437}, year = {2022}, url = {https://doi.org/10.1109/TDSC.2020.2993802}, doi = {10.1109/TDSC.2020.2993802}, timestamp = {Fri, 21 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/GaoDXYNR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Dijk22, author = {Marten van Dijk}, editor = {Chip{-}Hong Chang and Ulrich R{\"{u}}hrmair and Debdeep Mukhopadhyay and Domenic Forte}, title = {Towards Remote Verifiable Computation without Digital Secrets}, booktitle = {Proceedings of the 2022 Workshop on Attacks and Solutions in Hardware Security, {ASHES} 2022, Los Angeles, CA, USA, 11 November 2022}, pages = {1}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3560834.3563762}, doi = {10.1145/3560834.3563762}, timestamp = {Tue, 08 Nov 2022 14:20:01 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Dijk22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Dijk022, author = {Marten van Dijk and Francesco Regazzoni}, editor = {Heng Yin and Angelos Stavrou and Cas Cremers and Elaine Shi}, title = {{CCSW} '22: The 2022 Cloud Computing Security Workshop}, booktitle = {Proceedings of the 2022 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2022, Los Angeles, CA, USA, November 7-11, 2022}, pages = {3541--3542}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3548606.3563821}, doi = {10.1145/3548606.3563821}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/Dijk022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccsw-ws/2022, editor = {Francesco Regazzoni and Marten van Dijk}, title = {Proceedings of the 2022 on Cloud Computing Security Workshop, {CCSW} 2022, Los Angeles, CA, USA, 7 November 2022}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3560810}, doi = {10.1145/3560810}, isbn = {978-1-4503-9875-6}, timestamp = {Thu, 12 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccsw-ws/2022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2201-01834, author = {Deniz Gurevin and Chenglu Jin and Phuong Ha Nguyen and Omer Khan and Marten van Dijk}, title = {Secure Remote Attestation with Strong Key Insulation Guarantees}, journal = {CoRR}, volume = {abs/2201.01834}, year = {2022}, url = {https://arxiv.org/abs/2201.01834}, eprinttype = {arXiv}, eprint = {2201.01834}, timestamp = {Mon, 10 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2201-01834.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2202-03524, author = {Lam M. Nguyen and Trang H. Tran and Marten van Dijk}, title = {Finite-Sum Optimization: {A} New Perspective for Convergence to a Global Solution}, journal = {CoRR}, volume = {abs/2202.03524}, year = {2022}, url = {https://arxiv.org/abs/2202.03524}, eprinttype = {arXiv}, eprint = {2202.03524}, timestamp = {Wed, 09 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2202-03524.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2211-14669, author = {Ethan Rathbun and Kaleel Mahmood and Sohaib Ahmad and Caiwen Ding and Marten van Dijk}, title = {Game Theoretic Mixed Experts for Combinational Adversarial Machine Learning}, journal = {CoRR}, volume = {abs/2211.14669}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2211.14669}, doi = {10.48550/ARXIV.2211.14669}, eprinttype = {arXiv}, eprint = {2211.14669}, timestamp = {Tue, 29 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2211-14669.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2212-05796, author = {Marten van Dijk and Phuong Ha Nguyen and Toan N. Nguyen and Lam M. Nguyen}, title = {Generalizing {DP-SGD} with Shuffling and Batching Clipping}, journal = {CoRR}, volume = {abs/2212.05796}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2212.05796}, doi = {10.48550/ARXIV.2212.05796}, eprinttype = {arXiv}, eprint = {2212.05796}, timestamp = {Mon, 02 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2212-05796.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DijkJ22, author = {Marten van Dijk and Chenglu Jin}, title = {A Theoretical Framework for the Analysis of Physical Unclonable Function Interfaces and its Relation to the Random Oracle Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1069}, year = {2022}, url = {https://eprint.iacr.org/2022/1069}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DijkJ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/entropy/MahmoodGDN21, author = {Kaleel Mahmood and Deniz Gurevin and Marten van Dijk and Phuoung Ha Nguyen}, title = {Beware the Black-Box: On the Robustness of Recent Defenses to Adversarial Examples}, journal = {Entropy}, volume = {23}, number = {10}, pages = {1359}, year = {2021}, url = {https://doi.org/10.3390/e23101359}, doi = {10.3390/E23101359}, timestamp = {Wed, 03 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/entropy/MahmoodGDN21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmlr/NguyenTPND21, author = {Lam M. Nguyen and Quoc Tran{-}Dinh and Dzung T. Phan and Phuong Ha Nguyen and Marten van Dijk}, title = {A Unified Convergence Analysis for Shuffling-Type Gradient Methods}, journal = {J. Mach. Learn. Res.}, volume = {22}, pages = {207:1--207:44}, year = {2021}, url = {http://jmlr.org/papers/v22/20-1238.html}, timestamp = {Mon, 31 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmlr/NguyenTPND21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aistats/NguyenNNTND21, author = {Nhuong V. Nguyen and Toan N. Nguyen and Phuong Ha Nguyen and Quoc Tran{-}Dinh and Lam M. Nguyen and Marten van Dijk}, editor = {Arindam Banerjee and Kenji Fukumizu}, title = {Hogwild! over Distributed Local Data Sets with Linearly Increasing Mini-Batch Sizes}, booktitle = {The 24th International Conference on Artificial Intelligence and Statistics, {AISTATS} 2021, April 13-15, 2021, Virtual Event}, series = {Proceedings of Machine Learning Research}, volume = {130}, pages = {1207--1215}, publisher = {{PMLR}}, year = {2021}, url = {http://proceedings.mlr.press/v130/nguyen21a.html}, timestamp = {Wed, 14 Apr 2021 16:51:37 +0200}, biburl = {https://dblp.org/rec/conf/aistats/NguyenNNTND21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccv/MahmoodMD21, author = {Kaleel Mahmood and Rigel Mahmood and Marten van Dijk}, title = {On the Robustness of Vision Transformers to Adversarial Examples}, booktitle = {2021 {IEEE/CVF} International Conference on Computer Vision, {ICCV} 2021, Montreal, QC, Canada, October 10-17, 2021}, pages = {7818--7827}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ICCV48922.2021.00774}, doi = {10.1109/ICCV48922.2021.00774}, timestamp = {Fri, 11 Mar 2022 10:01:27 +0100}, biburl = {https://dblp.org/rec/conf/iccv/MahmoodMD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccsw-ws/2021, editor = {Yinqian Zhang and Marten van Dijk}, title = {CCSW@CCS '21: Proceedings of the 2021 on Cloud Computing Security Workshop, Virtual Event, Republic of Korea, 15 November 2021}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3474123}, doi = {10.1145/3474123}, isbn = {978-1-4503-8653-1}, timestamp = {Thu, 12 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccsw-ws/2021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2102-09030, author = {Marten van Dijk and Nhuong V. Nguyen and Toan N. Nguyen and Lam M. Nguyen and Phuong Ha Nguyen}, title = {Differential Private Hogwild! over Distributed Local Data Sets}, journal = {CoRR}, volume = {abs/2102.09030}, year = {2021}, url = {https://arxiv.org/abs/2102.09030}, eprinttype = {arXiv}, eprint = {2102.09030}, timestamp = {Wed, 24 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2102-09030.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2104-02610, author = {Kaleel Mahmood and Rigel Mahmood and Marten van Dijk}, title = {On the Robustness of Vision Transformers to Adversarial Examples}, journal = {CoRR}, volume = {abs/2104.02610}, year = {2021}, url = {https://arxiv.org/abs/2104.02610}, eprinttype = {arXiv}, eprint = {2104.02610}, timestamp = {Tue, 13 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2104-02610.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2109-15031, author = {Kaleel Mahmood and Rigel Mahmood and Ethan Rathbun and Marten van Dijk}, title = {Back in Black: {A} Comparative Evaluation of Recent State-Of-The-Art Black-Box Attacks}, journal = {CoRR}, volume = {abs/2109.15031}, year = {2021}, url = {https://arxiv.org/abs/2109.15031}, eprinttype = {arXiv}, eprint = {2109.15031}, timestamp = {Mon, 04 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2109-15031.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DijkGJKN21, author = {Marten van Dijk and Deniz Gurevin and Chenglu Jin and Omer Khan and Phuong Ha Nguyen}, title = {Autonomous Secure Remote Attestation even when all Used and to be Used Digital Keys Leak}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {602}, year = {2021}, url = {https://eprint.iacr.org/2021/602}, timestamp = {Mon, 07 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DijkGJKN21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DijkGJKN21a, author = {Marten van Dijk and Deniz Gurevin and Chenglu Jin and Omer Khan and Phuong Ha Nguyen}, title = {Bilinear Map Based One-Time Signature Scheme with Secret Key Exposure}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {925}, year = {2021}, url = {https://eprint.iacr.org/2021/925}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DijkGJKN21a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcad/StefanovDSF0YD20, author = {Emil Stefanov and Marten van Dijk and Elaine Shi and Christopher W. Fletcher and Ling Ren and Xiangyao Yu and Srinivas Devadas}, title = {A Retrospective on Path {ORAM}}, journal = {{IEEE} Trans. Comput. Aided Des. Integr. Circuits Syst.}, volume = {39}, number = {8}, pages = {1572--1576}, year = {2020}, url = {https://doi.org/10.1109/TCAD.2019.2925398}, doi = {10.1109/TCAD.2019.2925398}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcad/StefanovDSF0YD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/WisiolMPNMSDR20, author = {Nils Wisiol and Christopher M{\"{u}}hl and Niklas Pirnay and Phuong Ha Nguyen and Marian Margraf and Jean{-}Pierre Seifert and Marten van Dijk and Ulrich R{\"{u}}hrmair}, title = {Splitting the Interpose {PUF:} {A} Novel Modeling Attack Strategy}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2020}, number = {3}, pages = {97--120}, year = {2020}, url = {https://doi.org/10.13154/tches.v2020.i3.97-120}, doi = {10.13154/TCHES.V2020.I3.97-120}, timestamp = {Thu, 02 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/WisiolMPNMSDR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/JohnHOD20, author = {Tara Merin John and Syed Kamran Haider and Hamza Omar and Marten van Dijk}, title = {Connecting the Dots: Privacy Leakage via Write-Access Patterns to the Main Memory}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {2}, pages = {436--442}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2017.2779780}, doi = {10.1109/TDSC.2017.2779780}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/JohnHOD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aistats/PhamNPNDT20, author = {Nhan H. Pham and Lam M. Nguyen and Dzung T. Phan and Phuong Ha Nguyen and Marten van Dijk and Quoc Tran{-}Dinh}, editor = {Silvia Chiappa and Roberto Calandra}, title = {A Hybrid Stochastic Policy Gradient Algorithm for Reinforcement Learning}, booktitle = {The 23rd International Conference on Artificial Intelligence and Statistics, {AISTATS} 2020, 26-28 August 2020, Online [Palermo, Sicily, Italy]}, series = {Proceedings of Machine Learning Research}, volume = {108}, pages = {374--385}, publisher = {{PMLR}}, year = {2020}, url = {http://proceedings.mlr.press/v108/pham20a.html}, timestamp = {Mon, 29 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/aistats/PhamNPNDT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/JinBDR20, author = {Chenglu Jin and Wayne P. Burleson and Marten van Dijk and Ulrich R{\"{u}}hrmair}, editor = {Chip{-}Hong Chang and Ulrich R{\"{u}}hrmair and Stefan Katzenbeisser and Patrick Schaumont}, title = {Erasable PUFs: Formal Treatment and Generic Design}, booktitle = {Proceedings of the 4th {ACM} Workshop on Attacks and Solutions in Hardware Security Workshop, ASHES@CCS 2020, Virtual Event, USA, November 13, 2020}, pages = {21--33}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3411504.3421215}, doi = {10.1145/3411504.3421215}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/JinBDR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/date/CanettiDMRS20, author = {Ran Canetti and Marten van Dijk and Hoda Maleki and Ulrich R{\"{u}}hrmair and Patrick Schaumont}, title = {Using Universal Composition to Design and Analyze Secure Complex Hardware Systems}, booktitle = {2020 Design, Automation {\&} Test in Europe Conference {\&} Exhibition, {DATE} 2020, Grenoble, France, March 9-13, 2020}, pages = {520--525}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.23919/DATE48585.2020.9116295}, doi = {10.23919/DATE48585.2020.9116295}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/date/CanettiDMRS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2002-08246, author = {Lam M. Nguyen and Quoc Tran{-}Dinh and Dzung T. Phan and Phuong Ha Nguyen and Marten van Dijk}, title = {A Unified Convergence Analysis for Shuffling-Type Gradient Methods}, journal = {CoRR}, volume = {abs/2002.08246}, year = {2020}, url = {https://arxiv.org/abs/2002.08246}, eprinttype = {arXiv}, eprint = {2002.08246}, timestamp = {Tue, 03 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2002-08246.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2003-00430, author = {Nhan H. Pham and Lam M. Nguyen and Dzung T. Phan and Phuong Ha Nguyen and Marten van Dijk and Quoc Tran{-}Dinh}, title = {A Hybrid Stochastic Policy Gradient Algorithm for Reinforcement Learning}, journal = {CoRR}, volume = {abs/2003.00430}, year = {2020}, url = {https://arxiv.org/abs/2003.00430}, eprinttype = {arXiv}, eprint = {2003.00430}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2003-00430.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2006-10876, author = {Kaleel Mahmood and Deniz Gurevin and Marten van Dijk and Phuong Ha Nguyen}, title = {Beware the Black-Box: on the Robustness of Recent Defenses to Adversarial Examples}, journal = {CoRR}, volume = {abs/2006.10876}, year = {2020}, url = {https://arxiv.org/abs/2006.10876}, eprinttype = {arXiv}, eprint = {2006.10876}, timestamp = {Tue, 23 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2006-10876.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2007-09208, author = {Marten van Dijk and Nhuong V. Nguyen and Toan N. Nguyen and Lam M. Nguyen and Quoc Tran{-}Dinh and Phuong Ha Nguyen}, title = {Asynchronous Federated Learning with Reduced Number of Rounds and with Differential Privacy from Less Aggregated Gaussian Noise}, journal = {CoRR}, volume = {abs/2007.09208}, year = {2020}, url = {https://arxiv.org/abs/2007.09208}, eprinttype = {arXiv}, eprint = {2007.09208}, timestamp = {Tue, 28 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2007-09208.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2010-14763, author = {Marten van Dijk and Nhuong V. Nguyen and Toan N. Nguyen and Lam M. Nguyen and Quoc Tran{-}Dinh and Phuong Ha Nguyen}, title = {Hogwild! over Distributed Local Data Sets with Linearly Increasing Mini-Batch Sizes}, journal = {CoRR}, volume = {abs/2010.14763}, year = {2020}, url = {https://arxiv.org/abs/2010.14763}, eprinttype = {arXiv}, eprint = {2010.14763}, timestamp = {Mon, 02 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2010-14763.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/HaiderD19, author = {Syed Kamran Haider and Marten van Dijk}, title = {Flat {ORAM:} {A} Simplified Write-Only Oblivious {RAM} Construction for Secure Processors}, journal = {Cryptogr.}, volume = {3}, number = {1}, pages = {10}, year = {2019}, url = {https://doi.org/10.3390/cryptography3010010}, doi = {10.3390/CRYPTOGRAPHY3010010}, timestamp = {Fri, 03 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/HaiderD19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmlr/NguyenNRSTD19, author = {Lam M. Nguyen and Phuong Ha Nguyen and Peter Richt{\'{a}}rik and Katya Scheinberg and Martin Tak{\'{a}}c and Marten van Dijk}, title = {New Convergence Aspects of Stochastic Gradient Algorithms}, journal = {J. Mach. Learn. Res.}, volume = {20}, pages = {176:1--176:49}, year = {2019}, url = {http://jmlr.org/papers/v20/18-759.html}, timestamp = {Wed, 11 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmlr/NguyenNRSTD19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/NguyenSJMRD19, author = {Phuong Ha Nguyen and Durga Prasad Sahoo and Chenglu Jin and Kaleel Mahmood and Ulrich R{\"{u}}hrmair and Marten van Dijk}, title = {The Interpose {PUF:} Secure {PUF} Design against State-of-the-art Machine Learning Attacks}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2019}, number = {4}, pages = {243--290}, year = {2019}, url = {https://doi.org/10.13154/tches.v2019.i4.243-290}, doi = {10.13154/TCHES.V2019.I4.243-290}, timestamp = {Thu, 06 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tches/NguyenSJMRD19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/HaiderJASKD19, author = {Syed Kamran Haider and Chenglu Jin and Masab Ahmad and Devu Manikantan Shila and Omer Khan and Marten van Dijk}, title = {Advancing the State-of-the-Art in Hardware Trojans Detection}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {16}, number = {1}, pages = {18--32}, year = {2019}, url = {https://doi.org/10.1109/TDSC.2017.2654352}, doi = {10.1109/TDSC.2017.2654352}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/HaiderJASKD19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/JinD19, author = {Chenglu Jin and Marten van Dijk}, title = {Secure and Efficient Initialization and Authentication Protocols for {SHIELD}}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {16}, number = {1}, pages = {156--173}, year = {2019}, url = {https://doi.org/10.1109/TDSC.2017.2647950}, doi = {10.1109/TDSC.2017.2647950}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/JinD19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/RenFKDD19, author = {Ling Ren and Christopher W. Fletcher and Albert Kwon and Marten van Dijk and Srinivas Devadas}, title = {Design and Implementation of the Ascend Secure Processor}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {16}, number = {2}, pages = {204--216}, year = {2019}, url = {https://doi.org/10.1109/TDSC.2017.2687463}, doi = {10.1109/TDSC.2017.2687463}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/RenFKDD19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ChangDRT19, author = {Chip{-}Hong Chang and Marten van Dijk and Ulrich R{\"{u}}hrmair and Mark M. Tehranipoor}, title = {Emerging Attacks and Solutions for Secure Hardware in the Internet of Things}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {16}, number = {3}, pages = {373--375}, year = {2019}, url = {https://doi.org/10.1109/TDSC.2019.2901048}, doi = {10.1109/TDSC.2019.2901048}, timestamp = {Tue, 30 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/ChangDRT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/JinYD019, author = {Chenglu Jin and Zheng Yang and Marten van Dijk and Jianying Zhou}, editor = {David Balenson}, title = {Proof of aliveness}, booktitle = {Proceedings of the 35th Annual Computer Security Applications Conference, {ACSAC} 2019, San Juan, PR, USA, December 09-13, 2019}, pages = {1--16}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3359789.3359827}, doi = {10.1145/3359789.3359827}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/JinYD019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ValizadehD19, author = {Saeed Valizadeh and Marten van Dijk}, editor = {Radu Sion and Charalampos Papamanthou}, title = {MalPro: {A} Learning-based Malware Propagation and Containment Modeling}, booktitle = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Cloud Computing Security Workshop, CCSW@CCS 2019, London, UK, November 11, 2019}, pages = {45--56}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3338466.3358920}, doi = {10.1145/3338466.3358920}, timestamp = {Thu, 12 Oct 2023 12:32:09 +0200}, biburl = {https://dblp.org/rec/conf/ccs/ValizadehD19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icml/DijkNNP19, author = {Marten van Dijk and Lam M. Nguyen and Phuong Ha Nguyen and Dzung T. Phan}, editor = {Kamalika Chaudhuri and Ruslan Salakhutdinov}, title = {Characterization of Convex Objective Functions and Optimal Expected Convergence Rates for {SGD}}, booktitle = {Proceedings of the 36th International Conference on Machine Learning, {ICML} 2019, 9-15 June 2019, Long Beach, California, {USA}}, series = {Proceedings of Machine Learning Research}, volume = {97}, pages = {6392--6400}, publisher = {{PMLR}}, year = {2019}, url = {http://proceedings.mlr.press/v97/van-dijk19a.html}, timestamp = {Tue, 11 Jun 2019 15:37:38 +0200}, biburl = {https://dblp.org/rec/conf/icml/DijkNNP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mtv/SiddiquiSJGPDS19, author = {Ali Shuja Siddiqui and Geraldine Shirley and Sam Reji Joseph and Yutian Gui and Jim Plusquellic and Marten van Dijk and Fareena Saqib}, title = {Multilayer Camouflaged Secure Boot for SoCs}, booktitle = {20th International Workshop on Microprocessor/SoC Test, Security and Verification, {MTV} 2019, Austin, TX, USA, December 9-10, 2019}, pages = {56--61}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/MTV48867.2019.00019}, doi = {10.1109/MTV48867.2019.00019}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mtv/SiddiquiSJGPDS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nips/NguyenND19, author = {Phuong Ha Nguyen and Lam M. Nguyen and Marten van Dijk}, editor = {Hanna M. Wallach and Hugo Larochelle and Alina Beygelzimer and Florence d'Alch{\'{e}}{-}Buc and Emily B. Fox and Roman Garnett}, title = {Tight Dimension Independent Lower Bound on the Expected Convergence Rate for Diminishing Step Sizes in {SGD}}, booktitle = {Advances in Neural Information Processing Systems 32: Annual Conference on Neural Information Processing Systems 2019, NeurIPS 2019, December 8-14, 2019, Vancouver, BC, Canada}, pages = {3660--3669}, year = {2019}, url = {https://proceedings.neurips.cc/paper/2019/hash/deb54ffb41e085fd7f69a75b6359c989-Abstract.html}, timestamp = {Mon, 16 May 2022 15:41:51 +0200}, biburl = {https://dblp.org/rec/conf/nips/NguyenND19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/HoganMRCDHVZ19, author = {Kyle Hogan and Hoda Maleki and Reza Rahaeimehr and Ran Canetti and Marten van Dijk and Jason Hennessey and Mayank Varia and Haibin Zhang}, title = {On the Universally Composable Security of OpenStack}, booktitle = {2019 {IEEE} Cybersecurity Development, SecDev 2019, Tysons Corner, VA, USA, September 23-25, 2019}, pages = {20--33}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/SecDev.2019.00015}, doi = {10.1109/SECDEV.2019.00015}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secdev/HoganMRCDHVZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1901-01598, author = {Saeed Valizadeh and Marten van Dijk}, title = {Toward a Theory of Cyber Attacks}, journal = {CoRR}, volume = {abs/1901.01598}, year = {2019}, url = {http://arxiv.org/abs/1901.01598}, eprinttype = {arXiv}, eprint = {1901.01598}, timestamp = {Thu, 31 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1901-01598.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1901-07648, author = {Lam M. Nguyen and Marten van Dijk and Dzung T. Phan and Phuong Ha Nguyen and Tsui{-}Wei Weng and Jayant R. Kalagnanam}, title = {Optimal Finite-Sum Smooth Non-Convex Optimization with {SARAH}}, journal = {CoRR}, volume = {abs/1901.07648}, year = {2019}, url = {http://arxiv.org/abs/1901.07648}, eprinttype = {arXiv}, eprint = {1901.07648}, timestamp = {Sat, 23 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1901-07648.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1905-00154, author = {Saeed Valizadeh and Marten van Dijk}, title = {On the Convergence Rates of Learning-based Signature Generation Schemes to Contain Self-propagating Malware}, journal = {CoRR}, volume = {abs/1905.00154}, year = {2019}, url = {http://arxiv.org/abs/1905.00154}, eprinttype = {arXiv}, eprint = {1905.00154}, timestamp = {Mon, 27 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1905-00154.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1910-02785, author = {Phuong Ha Nguyen and Kaleel Mahmood and Lam M. Nguyen and Thanh Nguyen and Marten van Dijk}, title = {BUZz: BUffer Zones for defending adversarial examples in image classification}, journal = {CoRR}, volume = {abs/1910.02785}, year = {2019}, url = {http://arxiv.org/abs/1910.02785}, eprinttype = {arXiv}, eprint = {1910.02785}, timestamp = {Wed, 09 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1910-02785.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WisiolMPNMSDR19, author = {Nils Wisiol and Christopher M{\"{u}}hl and Niklas Pirnay and Phuong Ha Nguyen and Marian Margraf and Jean{-}Pierre Seifert and Marten van Dijk and Ulrich R{\"{u}}hrmair}, title = {Splitting the Interpose {PUF:} {A} Novel Modeling Attack Strategy}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1473}, year = {2019}, url = {https://eprint.iacr.org/2019/1473}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WisiolMPNMSDR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jacm/StefanovDSCFRYD18, author = {Emil Stefanov and Marten van Dijk and Elaine Shi and T.{-}H. Hubert Chan and Christopher W. Fletcher and Ling Ren and Xiangyao Yu and Srinivas Devadas}, title = {Path {ORAM:} An Extremely Simple Oblivious {RAM} Protocol}, journal = {J. {ACM}}, volume = {65}, number = {4}, pages = {18:1--18:26}, year = {2018}, url = {https://doi.org/10.1145/3177872}, doi = {10.1145/3177872}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jacm/StefanovDSCFRYD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/DijkJMNR18, author = {Marten van Dijk and Chenglu Jin and Hoda Maleki and Phuong Ha Nguyen and Reza Rahaeimehr}, editor = {Sarah Meiklejohn and Kazue Sako}, title = {Weak-Unforgeable Tags for Secure Supply Chain Management}, booktitle = {Financial Cryptography and Data Security - 22nd International Conference, {FC} 2018, Nieuwpoort, Cura{\c{c}}ao, February 26 - March 2, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10957}, pages = {80--98}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-662-58387-6\_5}, doi = {10.1007/978-3-662-58387-6\_5}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/DijkJMNR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccd/OmarH0DK18, author = {Hamza Omar and Syed Kamran Haider and Ling Ren and Marten van Dijk and Omer Khan}, title = {Breaking the Oblivious-RAM Bandwidth Wall}, booktitle = {36th {IEEE} International Conference on Computer Design, {ICCD} 2018, Orlando, FL, USA, October 7-10, 2018}, pages = {115--122}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/ICCD.2018.00026}, doi = {10.1109/ICCD.2018.00026}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iccd/OmarH0DK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icml/NguyenNDRST18, author = {Lam M. Nguyen and Phuong Ha Nguyen and Marten van Dijk and Peter Richt{\'{a}}rik and Katya Scheinberg and Martin Tak{\'{a}}c}, editor = {Jennifer G. Dy and Andreas Krause}, title = {{SGD} and Hogwild! Convergence Without the Bounded Gradients Assumption}, booktitle = {Proceedings of the 35th International Conference on Machine Learning, {ICML} 2018, Stockholmsm{\"{a}}ssan, Stockholm, Sweden, July 10-15, 2018}, series = {Proceedings of Machine Learning Research}, volume = {80}, pages = {3747--3755}, publisher = {{PMLR}}, year = {2018}, url = {http://proceedings.mlr.press/v80/nguyen18c.html}, timestamp = {Wed, 11 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icml/NguyenNDRST18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icphys/JinVD18, author = {Chenglu Jin and Saeed Valizadeh and Marten van Dijk}, title = {Snapshotter: Lightweight intrusion detection and prevention system for industrial control systems}, booktitle = {{IEEE} Industrial Cyber-Physical Systems, {ICPS} 2018, Saint Petersburg, Russia, May 15-18, 2018}, pages = {824--829}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/ICPHYS.2018.8390813}, doi = {10.1109/ICPHYS.2018.8390813}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icphys/JinVD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1802-03801, author = {Lam M. Nguyen and Phuong Ha Nguyen and Marten van Dijk and Peter Richt{\'{a}}rik and Katya Scheinberg and Martin Tak{\'{a}}c}, title = {{SGD} and Hogwild! Convergence Without the Bounded Gradients Assumption}, journal = {CoRR}, volume = {abs/1802.03801}, year = {2018}, url = {http://arxiv.org/abs/1802.03801}, eprinttype = {arXiv}, eprint = {1802.03801}, timestamp = {Wed, 11 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1802-03801.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1804-04783, author = {Syed Kamran Haider and Chenglu Jin and Marten van Dijk}, title = {Comments on "Defeating HaTCh: Building Malicious {IP} Cores"}, journal = {CoRR}, volume = {abs/1804.04783}, year = {2018}, url = {http://arxiv.org/abs/1804.04783}, eprinttype = {arXiv}, eprint = {1804.04783}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1804-04783.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1807-11046, author = {Yansong Gao and Marten van Dijk and Lei Xu and Surya Nepal and Damith Chinthana Ranasinghe}, title = {{TREVERSE:} Trial-and-Error Lightweight Secure Reverse Authentication with Simulatable PUFs}, journal = {CoRR}, volume = {abs/1807.11046}, year = {2018}, url = {http://arxiv.org/abs/1807.11046}, eprinttype = {arXiv}, eprint = {1807.11046}, timestamp = {Sat, 22 Dec 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1807-11046.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1810-04100, author = {Marten van Dijk and Lam M. Nguyen and Phuong Ha Nguyen and Dzung T. Phan}, title = {Characterization of Convex Objective Functions and Optimal Expected Convergence Rates for {SGD}}, journal = {CoRR}, volume = {abs/1810.04100}, year = {2018}, url = {http://arxiv.org/abs/1810.04100}, eprinttype = {arXiv}, eprint = {1810.04100}, timestamp = {Sat, 23 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1810-04100.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1810-04723, author = {Phuong Ha Nguyen and Lam M. Nguyen and Marten van Dijk}, title = {Tight Dimension Independent Lower Bound on Optimal Expected Convergence Rate for Diminishing Step Sizes in {SGD}}, journal = {CoRR}, volume = {abs/1810.04723}, year = {2018}, url = {http://arxiv.org/abs/1810.04723}, eprinttype = {arXiv}, eprint = {1810.04723}, timestamp = {Sat, 23 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1810-04723.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1811-12403, author = {Lam M. Nguyen and Phuong Ha Nguyen and Peter Richt{\'{a}}rik and Katya Scheinberg and Martin Tak{\'{a}}c and Marten van Dijk}, title = {New Convergence Aspects of Stochastic Gradient Algorithms}, journal = {CoRR}, volume = {abs/1811.12403}, year = {2018}, url = {http://arxiv.org/abs/1811.12403}, eprinttype = {arXiv}, eprint = {1811.12403}, timestamp = {Wed, 11 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1811-12403.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NguyenSJMRD18, author = {Phuong Ha Nguyen and Durga Prasad Sahoo and Chenglu Jin and Kaleel Mahmood and Ulrich R{\"{u}}hrmair and Marten van Dijk}, title = {The Interpose {PUF:} Secure {PUF} Design against State-of-the-art Machine Learning Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {350}, year = {2018}, url = {https://eprint.iacr.org/2018/350}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NguyenSJMRD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GaoJKNXBKDRR18, author = {Yansong Gao and Chenglu Jin and Jeeson Kim and Hussein Nili and Xiaolin Xu and Wayne P. Burleson and Omid Kavehei and Marten van Dijk and Damith Chinthana Ranasinghe and Ulrich R{\"{u}}hrmair}, title = {Efficient Erasable PUFs from Programmable Logic and Memristors}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {358}, year = {2018}, url = {https://eprint.iacr.org/2018/358}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GaoJKNXBKDRR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HoganMRCDHVZ18, author = {Kyle Hogan and Hoda Maleki and Reza Rahaeimehr and Ran Canetti and Marten van Dijk and Jason Hennessey and Mayank Varia and Haibin Zhang}, title = {On the Universally Composable Security of OpenStack}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {602}, year = {2018}, url = {https://eprint.iacr.org/2018/602}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HoganMRCDHVZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JinDRZ18, author = {Chenglu Jin and Marten van Dijk and Michael K. Reiter and Haibin Zhang}, title = {PwoP: Intrusion-Tolerant and Privacy-Preserving Sensor Fusion}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1171}, year = {2018}, url = {https://eprint.iacr.org/2018/1171}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JinDRZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/JinH0NFDD17, author = {Chenglu Jin and Charles Herder and Ling Ren and Phuong Ha Nguyen and Benjamin Fuller and Srinivas Devadas and Marten van Dijk}, title = {{FPGA} Implementation of a Cryptographically-Secure {PUF} Based on Learning Parity with Noise}, journal = {Cryptogr.}, volume = {1}, number = {3}, pages = {23}, year = {2017}, url = {https://doi.org/10.3390/cryptography1030023}, doi = {10.3390/CRYPTOGRAPHY1030023}, timestamp = {Mon, 14 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/JinH0NFDD17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/HerderRDYD17, author = {Charles Herder and Ling Ren and Marten van Dijk and Meng{-}Day (Mandel) Yu and Srinivas Devadas}, title = {Trapdoor Computational Fuzzy Extractors and Stateless Cryptographically-Secure Physical Unclonable Functions}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {14}, number = {1}, pages = {65--82}, year = {2017}, url = {https://doi.org/10.1109/TDSC.2016.2536609}, doi = {10.1109/TDSC.2016.2536609}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/HerderRDYD17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/MalekiRD17, author = {Hoda Maleki and Reza Rahaeimehr and Marten van Dijk}, editor = {Chip{-}Hong Chang and Ulrich R{\"{u}}hrmair and Wei Zhang}, title = {SoK: RFID-based Clone Detection Mechanisms for Supply Chains}, booktitle = {Proceedings of the 2017 Workshop on Attacks and Solutions in Hardware Security, ASHES@CCS 2017, Dallas, TX, USA, November 3, 2017}, pages = {33--41}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3139324.3139332}, doi = {10.1145/3139324.3139332}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/MalekiRD17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ChangDKRT17, author = {Chip{-}Hong Chang and Marten van Dijk and Farinaz Koushanfar and Ulrich R{\"{u}}hrmair and Mark M. Tehranipoor}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {{ASHES} 2017: Workshop on Attacks and Solutions in Hardware Security}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {2623--2625}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3137049}, doi = {10.1145/3133956.3137049}, timestamp = {Wed, 29 Jun 2022 15:37:41 +0200}, biburl = {https://dblp.org/rec/conf/ccs/ChangDKRT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cpsweek/JinRL0D17, author = {Chenglu Jin and Lingyu Ren and Xubin Liu and Peng Zhang and Marten van Dijk}, title = {Mitigating Synchronized Hardware Trojan Attacks in Smart Grids}, booktitle = {Proceedings of the 2nd Workshop on Cyber-Physical Security and Resilience in Smart Grids, SPSR-SG@CPSWeek 2017, Pittsburgh, PA, USA, April 21, 2017}, pages = {35--40}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3055386.3055394}, doi = {10.1145/3055386.3055394}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cpsweek/JinRL0D17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/host/MalekiRJD17, author = {Hoda Maleki and Reza Rahaeimehr and Chenglu Jin and Marten van Dijk}, title = {New clone-detection approach for RFID-based supply chains}, booktitle = {2017 {IEEE} International Symposium on Hardware Oriented Security and Trust, {HOST} 2017, McLean, VA, USA, May 1-5, 2017}, pages = {122--127}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/HST.2017.7951810}, doi = {10.1109/HST.2017.7951810}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/host/MalekiRJD17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/host/JohnHOD17, author = {Tara Merin John and Syed Kamran Haider and Hamza Omar and Marten van Dijk}, title = {Connecting the dots: Privacy leakage via write-access patterns to the main memory}, booktitle = {2017 {IEEE} International Symposium on Hardware Oriented Security and Trust, {HOST} 2017, McLean, VA, USA, May 1-5, 2017}, pages = {170}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/HST.2017.7951834}, doi = {10.1109/HST.2017.7951834}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/host/JohnHOD17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mwscas/HaiderJD17, author = {Syed Kamran Haider and Chenglu Jin and Marten van Dijk}, title = {Advancing the state-of-the-art in hardware Trojans design}, booktitle = {{IEEE} 60th International Midwest Symposium on Circuits and Systems, {MWSCAS} 2017, Boston, MA, USA, August 6-9, 2017}, pages = {823--826}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/MWSCAS.2017.8053050}, doi = {10.1109/MWSCAS.2017.8053050}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mwscas/HaiderJD17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/HaiderOLDD17, author = {Syed Kamran Haider and Hamza Omar and Ilia A. Lebedev and Srinivas Devadas and Marten van Dijk}, editor = {Elisa Bertino and Ravi S. Sandhu and Edgar R. Weippl}, title = {Leveraging Hardware Isolation for Process Level Access Control {\&} Authentication}, booktitle = {Proceedings of the 22nd {ACM} on Symposium on Access Control Models and Technologies, {SACMAT} 2017, Indianapolis, IN, USA, June 21-23, 2017}, pages = {133--141}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3078861.3078882}, doi = {10.1145/3078861.3078882}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacmat/HaiderOLDD17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/JohnHOD17, author = {Tara Merin John and Syed Kamran Haider and Hamza Omar and Marten van Dijk}, title = {Connecting the Dots: Privacy Leakage via Write-Access Patterns to the Main Memory}, journal = {CoRR}, volume = {abs/1702.03965}, year = {2017}, url = {http://arxiv.org/abs/1702.03965}, eprinttype = {arXiv}, eprint = {1702.03965}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/JohnHOD17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/KhanKJSNMDNSDG17, author = {Raihan Sayeed Khan and Nadim Kanan and Chenglu Jin and Jake Scoggin and Nafisa Noor and Sadid Muneer and Faruk Dirisaglik and Phuong Ha Nguyen and Helena Silva and Marten van Dijk and Ali Gokirmak}, title = {Intrinsically Reliable and Lightweight Physical Obfuscated Keys}, journal = {CoRR}, volume = {abs/1703.07427}, year = {2017}, url = {http://arxiv.org/abs/1703.07427}, eprinttype = {arXiv}, eprint = {1703.07427}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/KhanKJSNMDNSDG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/HaiderD17, author = {Syed Kamran Haider and Marten van Dijk}, title = {Revisiting Definitional Foundations of Oblivious {RAM} for Secure Processor Implementations}, journal = {CoRR}, volume = {abs/1706.03852}, year = {2017}, url = {http://arxiv.org/abs/1706.03852}, eprinttype = {arXiv}, eprint = {1706.03852}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/HaiderD17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HerderFDD17, author = {Charles Herder and Benjamin Fuller and Marten van Dijk and Srinivas Devadas}, title = {Public Key Cryptosystems with Noisy Secret Keys}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {210}, year = {2017}, url = {http://eprint.iacr.org/2017/210}, timestamp = {Mon, 14 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HerderFDD17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NguyenSJMD17, author = {Phuong Ha Nguyen and Durga Prasad Sahoo and Chenglu Jin and Kaleel Mahmood and Marten van Dijk}, title = {{MXPUF:} Secure {PUF} Design against State-of-the-art Modeling Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {572}, year = {2017}, url = {http://eprint.iacr.org/2017/572}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NguyenSJMD17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DijkJMNR17, author = {Marten van Dijk and Chenglu Jin and Hoda Maleki and Phuong Ha Nguyen and Reza Rahaeimehr}, title = {Weak-Unforgeable Tags for Secure Supply Chain Management}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1221}, year = {2017}, url = {http://eprint.iacr.org/2017/1221}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DijkJMNR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/MalekiVKBD16, author = {Hoda Maleki and Saeed Valizadeh and William Koch and Azer Bestavros and Marten van Dijk}, editor = {Peng Liu and Cliff Wang}, title = {Markov Modeling of Moving Target Defense Games}, booktitle = {Proceedings of the 2016 {ACM} Workshop on Moving Target Defense, MTD@CCS 2016, Vienna, Austria, October 24, 2016}, pages = {81--92}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2995272.2995273}, doi = {10.1145/2995272.2995273}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/MalekiVKBD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/DevadasDFRSW16, author = {Srinivas Devadas and Marten van Dijk and Christopher W. Fletcher and Ling Ren and Elaine Shi and Daniel Wichs}, editor = {Eyal Kushilevitz and Tal Malkin}, title = {Onion {ORAM:} {A} Constant Bandwidth Blowup Oblivious {RAM}}, booktitle = {Theory of Cryptography - 13th International Conference, {TCC} 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9563}, pages = {145--174}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49099-0\_6}, doi = {10.1007/978-3-662-49099-0\_6}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/DevadasDFRSW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/HaiderJD16, author = {Syed Kamran Haider and Chenglu Jin and Marten van Dijk}, title = {Advancing the State-of-the-Art in Hardware Trojans Design}, journal = {CoRR}, volume = {abs/1605.08413}, year = {2016}, url = {http://arxiv.org/abs/1605.08413}, eprinttype = {arXiv}, eprint = {1605.08413}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/HaiderJD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/HaiderD16, author = {Syed Kamran Haider and Marten van Dijk}, title = {Flat {ORAM:} {A} Simplified Write-Only Oblivious {RAM} Construction for Secure Processor Architectures}, journal = {CoRR}, volume = {abs/1611.01571}, year = {2016}, url = {http://arxiv.org/abs/1611.01571}, eprinttype = {arXiv}, eprint = {1611.01571}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/HaiderD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MalekiRD16, author = {Hoda Maleki and Reza Rahaeimehr and Marten van Dijk}, title = {LightSource: Ultra Lightweight Clone Detection of {RFID} Tags from Software Unclonable Responses}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {608}, year = {2016}, url = {http://eprint.iacr.org/2016/608}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MalekiRD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ValizadehMKBD16, author = {Mohammad Hadi Valizadeh and Hoda Maleki and William Koch and Azer Bestavros and Marten van Dijk}, title = {Markov Modeling of Moving Target Defense Games}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {741}, year = {2016}, url = {http://eprint.iacr.org/2016/741}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ValizadehMKBD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asplos/FletcherRKDD15, author = {Christopher W. Fletcher and Ling Ren and Albert Kwon and Marten van Dijk and Srinivas Devadas}, editor = {{\"{O}}zcan {\"{O}}zturk and Kemal Ebcioglu and Sandhya Dwarkadas}, title = {Freecursive {ORAM:} [Nearly] Free Recursion and Integrity Verification for Position-based Oblivious {RAM}}, booktitle = {Proceedings of the Twentieth International Conference on Architectural Support for Programming Languages and Operating Systems, {ASPLOS} 2015, Istanbul, Turkey, March 14-18, 2015}, pages = {103--116}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2694344.2694353}, doi = {10.1145/2694344.2694353}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asplos/FletcherRKDD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Dijk15, author = {Marten van Dijk}, editor = {Indrajit Ray and Xiaofeng Wang and Kui Ren}, title = {Hardware Security and its Adversaries}, booktitle = {Proceedings of the 5th International Workshop on Trustworthy Embedded Devices, TrustED 2015, Denver, Colorado, USA, October 16, 2015}, pages = {1--2}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2808414.2808422}, doi = {10.1145/2808414.2808422}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Dijk15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fccm/FletcherRKDSSD15, author = {Christopher W. Fletcher and Ling Ren and Albert Kwon and Marten van Dijk and Emil Stefanov and Dimitrios N. Serpanos and Srinivas Devadas}, title = {A Low-Latency, Low-Area Hardware Oblivious {RAM} Controller}, booktitle = {23rd {IEEE} Annual International Symposium on Field-Programmable Custom Computing Machines, {FCCM} 2015, Vancouver, BC, Canada, May 2-6, 2015}, pages = {215--222}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/FCCM.2015.58}, doi = {10.1109/FCCM.2015.58}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fccm/FletcherRKDSSD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hci/GrindleHMD15, author = {Viktoria Grindle and Syed Kamran Haider and John Magee and Marten van Dijk}, editor = {Margherita Antona and Constantine Stephanidis}, title = {Virtual Fingerprint - Image-Based Authentication Increases Privacy for Users of Mouse-Replacement Interfaces}, booktitle = {Universal Access in Human-Computer Interaction. Access to the Human Environment and Culture - 9th International Conference, {UAHCI} 2015, Held as Part of {HCI} International 2015, Los Angeles, CA, USA, August 2-7, 2015 Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {9178}, pages = {182--191}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-20687-5\_18}, doi = {10.1007/978-3-319-20687-5\_18}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/hci/GrindleHMD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccd/HaiderAHPJSKD15, author = {Syed Kamran Haider and Masab Ahmad and Farrukh Hijaz and Astha Patni and Ethan Johnson and Matthew Seita and Omer Khan and Marten van Dijk}, title = {{M-MAP:} Multi-factor memory authentication for secure embedded processors}, booktitle = {33rd {IEEE} International Conference on Computer Design, {ICCD} 2015, New York City, NY, USA, October 18-21, 2015}, pages = {471--474}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/ICCD.2015.7357151}, doi = {10.1109/ICCD.2015.7357151}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iccd/HaiderAHPJSKD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isca/AhmadHHDK15, author = {Masab Ahmad and Syed Kamran Haider and Farrukh Hijaz and Marten van Dijk and Omer Khan}, editor = {Ruby B. Lee and Weidong Shi and Jakub Szefer}, title = {Exploring the performance implications of memory safety primitives in many-core processors executing multi-threaded workloads}, booktitle = {Proceedings of the Fourth Workshop on Hardware and Architectural Support for Security and Privacy, HASP@ISCA 2015, Portland, OR, USA, June 14, 2015}, pages = {6:1--6:8}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2768566.2768572}, doi = {10.1145/2768566.2768572}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isca/AhmadHHDK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isca/YuHRFKDD15, author = {Xiangyao Yu and Syed Kamran Haider and Ling Ren and Christopher W. Fletcher and Albert Kwon and Marten van Dijk and Srinivas Devadas}, editor = {Deborah T. Marr and David H. Albonesi}, title = {PrORAM: dynamic prefetcher for oblivious {RAM}}, booktitle = {Proceedings of the 42nd Annual International Symposium on Computer Architecture, Portland, OR, USA, June 13-17, 2015}, pages = {616--628}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2749469.2750413}, doi = {10.1145/2749469.2750413}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isca/YuHRFKDD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/RenFKSSDD15, author = {Ling Ren and Christopher W. Fletcher and Albert Kwon and Emil Stefanov and Elaine Shi and Marten van Dijk and Srinivas Devadas}, editor = {Jaeyeon Jung and Thorsten Holz}, title = {Constants Count: Practical Improvements to Oblivious {RAM}}, booktitle = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington, D.C., USA, August 12-14, 2015}, pages = {415--430}, publisher = {{USENIX} Association}, year = {2015}, url = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/ren-ling}, timestamp = {Mon, 01 Feb 2021 08:42:57 +0100}, biburl = {https://dblp.org/rec/conf/uss/RenFKSSDD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DevadasDFR15, author = {Srinivas Devadas and Marten van Dijk and Christopher W. Fletcher and Ling Ren}, title = {Onion {ORAM:} {A} Constant Bandwidth and Constant Client Storage {ORAM} (without {FHE} or {SWHE)}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {5}, year = {2015}, url = {http://eprint.iacr.org/2015/005}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DevadasDFR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JinD15, author = {Chenglu Jin and Marten van Dijk}, title = {Secure and Efficient Initialization and Authentication Protocols for {SHIELD}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {210}, year = {2015}, url = {http://eprint.iacr.org/2015/210}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JinD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HaiderAHPJSKD15, author = {Syed Kamran Haider and Masab Ahmad and Farrukh Hijaz and Astha Patni and Ethan Johnson and Matthew Seita and Omer Khan and Marten van Dijk}, title = {{M-MAP:} Multi-Factor Memory Authentication for Secure Embedded Processors}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {831}, year = {2015}, url = {http://eprint.iacr.org/2015/831}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HaiderAHPJSKD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JinXBRD15, author = {Chenglu Jin and Xiaolin Xu and Wayne P. Burleson and Ulrich R{\"{u}}hrmair and Marten van Dijk}, title = {PLayPUF: Programmable Logically Erasable PUFs for Forward and Backward Secure Key Management}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1052}, year = {2015}, url = {http://eprint.iacr.org/2015/1052}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JinXBRD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/date/DijkR14, author = {Marten van Dijk and Ulrich R{\"{u}}hrmair}, editor = {Gerhard P. Fettweis and Wolfgang Nebel}, title = {Protocol attacks on advanced {PUF} protocols and countermeasures}, booktitle = {Design, Automation {\&} Test in Europe Conference {\&} Exhibition, {DATE} 2014, Dresden, Germany, March 24-28, 2014}, pages = {1--6}, publisher = {European Design and Automation Association}, year = {2014}, url = {https://doi.org/10.7873/DATE.2014.364}, doi = {10.7873/DATE.2014.364}, timestamp = {Wed, 16 Oct 2019 14:14:53 +0200}, biburl = {https://dblp.org/rec/conf/date/DijkR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hpca/FletcherRYDKD14, author = {Christopher W. Fletcher and Ling Ren and Xiangyao Yu and Marten van Dijk and Omer Khan and Srinivas Devadas}, title = {Suppressing the Oblivious {RAM} timing channel while making information leakage and program efficiency trade-offs}, booktitle = {20th {IEEE} International Symposium on High Performance Computer Architecture, {HPCA} 2014, Orlando, FL, USA, February 15-19, 2014}, pages = {213--224}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/HPCA.2014.6835932}, doi = {10.1109/HPCA.2014.6835932}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hpca/FletcherRYDKD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ics/SuhFCGDD14, author = {G. Edward Suh and Christopher W. Fletcher and Dwaine E. Clarke and Blaise Gassend and Marten van Dijk and Srinivas Devadas}, editor = {Utpal Banerjee}, title = {Author retrospective {AEGIS:} architecture for tamper-evident and tamper-resistant processing}, booktitle = {{ACM} International Conference on Supercomputing 25th Anniversary Volume}, pages = {68--70}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2591635.2591665}, doi = {10.1145/2591635.2591665}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ics/SuhFCGDD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isvlsi/DijkR14, author = {Marten van Dijk and Uli R{\"{u}}hrmair}, title = {{PUF} Interfaces and their Security}, booktitle = {{IEEE} Computer Society Annual Symposium on VLSI, {ISVLSI} 2014, Tampa, FL, USA, July 9-11, 2014}, pages = {25--28}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/ISVLSI.2014.90}, doi = {10.1109/ISVLSI.2014.90}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isvlsi/DijkR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/RenFYKDD14, author = {Ling Ren and Christopher W. Fletcher and Xiangyao Yu and Albert Kwon and Marten van Dijk and Srinivas Devadas}, title = {Unified Oblivious-RAM: Improving Recursive {ORAM} with Locality and Pseudorandomness}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {205}, year = {2014}, url = {http://eprint.iacr.org/2014/205}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/RenFYKDD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/YuRFKDD14, author = {Xiangyao Yu and Ling Ren and Christopher W. Fletcher and Albert Kwon and Marten van Dijk and Srinivas Devadas}, title = {Enhancing Oblivious {RAM} Performance Using Dynamic Prefetching}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {234}, year = {2014}, url = {http://eprint.iacr.org/2014/234}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/YuRFKDD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FletcherRKDSD14, author = {Christopher W. Fletcher and Ling Ren and Albert Kwon and Marten van Dijk and Emil Stefanov and Srinivas Devadas}, title = {{RAW} Path {ORAM:} {A} Low-Latency, Low-Area Hardware {ORAM} Controller with Integrity Verification}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {431}, year = {2014}, url = {http://eprint.iacr.org/2014/431}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FletcherRKDSD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HerderRDYD14, author = {Charles Herder and Ling Ren and Marten van Dijk and Meng{-}Day (Mandel) Yu and Srinivas Devadas}, title = {Trapdoor Computational Fuzzy Extractors}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {938}, year = {2014}, url = {http://eprint.iacr.org/2014/938}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HerderRDYD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HaiderJASKD14, author = {Syed Kamran Haider and Chenglu Jin and Masab Ahmad and Devu Manikantan Shila and Omer Khan and Marten van Dijk}, title = {HaTCh: Hardware Trojan Catcher}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {943}, year = {2014}, url = {http://eprint.iacr.org/2014/943}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HaiderJASKD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/RenFKSSDD14, author = {Ling Ren and Christopher W. Fletcher and Albert Kwon and Emil Stefanov and Elaine Shi and Marten van Dijk and Srinivas Devadas}, title = {Ring {ORAM:} Closing the Gap Between Small and Large Client Storage Oblivious {RAM}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {997}, year = {2014}, url = {http://eprint.iacr.org/2014/997}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/RenFKSSDD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/RuhrmairD13, author = {Ulrich R{\"{u}}hrmair and Marten van Dijk}, title = {On the practical use of physical unclonable functions in oblivious transfer and bit commitment protocols}, journal = {J. Cryptogr. Eng.}, volume = {3}, number = {1}, pages = {17--28}, year = {2013}, url = {https://doi.org/10.1007/s13389-013-0052-8}, doi = {10.1007/S13389-013-0052-8}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/RuhrmairD13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/DijkJOR13, author = {Marten van Dijk and Ari Juels and Alina Oprea and Ronald L. Rivest}, title = {FlipIt: The Game of "Stealthy Takeover"}, journal = {J. Cryptol.}, volume = {26}, number = {4}, pages = {655--713}, year = {2013}, url = {https://doi.org/10.1007/s00145-012-9134-5}, doi = {10.1007/S00145-012-9134-5}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/DijkJOR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/YuFRDD13, author = {Xiangyao Yu and Christopher W. Fletcher and Ling Ren and Marten van Dijk and Srinivas Devadas}, editor = {Ari Juels and Bryan Parno}, title = {Generalized external interaction with tamper-resistant hardware with bounded information leakage}, booktitle = {CCSW'13, Proceedings of the 2013 {ACM} Cloud Computing Security Workshop, Co-located with {CCS} 2013, Berlin, Germany, November 4, 2013}, pages = {23--34}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2517488.2517498}, doi = {10.1145/2517488.2517498}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/YuFRDD13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/StefanovDSFRYD13, author = {Emil Stefanov and Marten van Dijk and Elaine Shi and Christopher W. Fletcher and Ling Ren and Xiangyao Yu and Srinivas Devadas}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {Path {ORAM:} an extremely simple oblivious {RAM} protocol}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {299--310}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2516660}, doi = {10.1145/2508859.2516660}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/StefanovDSFRYD13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hpec/RenFYDD13, author = {Ling Ren and Christopher W. Fletcher and Xiangyao Yu and Marten van Dijk and Srinivas Devadas}, title = {Integrity verification for path Oblivious-RAM}, booktitle = {{IEEE} High Performance Extreme Computing Conference, {HPEC} 2013, Waltham, MA, USA, September 10-12, 2013}, pages = {1--6}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/HPEC.2013.6670339}, doi = {10.1109/HPEC.2013.6670339}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/hpec/RenFYDD13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isca/RenYFDD13, author = {Ling Ren and Xiangyao Yu and Christopher W. Fletcher and Marten van Dijk and Srinivas Devadas}, editor = {Avi Mendelson}, title = {Design space exploration and optimization of path oblivious {RAM} in secure processors}, booktitle = {The 40th Annual International Symposium on Computer Architecture, ISCA'13, Tel-Aviv, Israel, June 23-27, 2013}, pages = {571--582}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2485922.2485971}, doi = {10.1145/2485922.2485971}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isca/RenYFDD13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/RuhrmairD13, author = {Ulrich R{\"{u}}hrmair and Marten van Dijk}, title = {PUFs in Security Protocols: Attack Models and Security Evaluations}, booktitle = {2013 {IEEE} Symposium on Security and Privacy, {SP} 2013, Berkeley, CA, USA, May 19-22, 2013}, pages = {286--300}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/SP.2013.27}, doi = {10.1109/SP.2013.27}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/RuhrmairD13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/RenYFDD13, author = {Ling Ren and Xiangyao Yu and Christopher W. Fletcher and Marten van Dijk and Srinivas Devadas}, title = {Design Space Exploration and Optimization of Path Oblivious {RAM} in Secure Processors}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {76}, year = {2013}, url = {http://eprint.iacr.org/2013/076}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/RenYFDD13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/StefanovDSFRYD13, author = {Emil Stefanov and Marten van Dijk and Elaine Shi and Christopher W. Fletcher and Ling Ren and Xiangyao Yu and Srinivas Devadas}, title = {Path {ORAM:} An Extremely Simple Oblivious {RAM} Protocol}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {280}, year = {2013}, url = {http://eprint.iacr.org/2013/280}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/StefanovDSFRYD13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/StefanovDJO12, author = {Emil Stefanov and Marten van Dijk and Ari Juels and Alina Oprea}, editor = {Robert H'obbes' Zakon}, title = {Iris: a scalable cloud file system with efficient integrity checks}, booktitle = {28th Annual Computer Security Applications Conference, {ACSAC} 2012, Orlando, FL, USA, 3-7 December 2012}, pages = {229--238}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2420950.2420985}, doi = {10.1145/2420950.2420985}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/StefanovDJO12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/FletcherDD12, author = {Christopher W. Fletcher and Marten van Dijk and Srinivas Devadas}, editor = {Ting Yu and Srdjan Capkun and Seny Kamara}, title = {Towards an interpreter for efficient encrypted computation}, booktitle = {Proceedings of the 2012 {ACM} Workshop on Cloud computing security, {CCSW} 2012, Raleigh, NC, USA, October 19, 2012}, pages = {83--94}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2381913.2381928}, doi = {10.1145/2381913.2381928}, timestamp = {Tue, 12 Apr 2022 13:28:49 +0200}, biburl = {https://dblp.org/rec/conf/ccs/FletcherDD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/DijkJORST12, author = {Marten van Dijk and Ari Juels and Alina Oprea and Ronald L. Rivest and Emil Stefanov and Nikos Triandopoulos}, editor = {Ting Yu and George Danezis and Virgil D. Gligor}, title = {Hourglass schemes: how to prove that cloud files are encrypted}, booktitle = {the {ACM} Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012}, pages = {265--280}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2382196.2382227}, doi = {10.1145/2382196.2382227}, timestamp = {Tue, 12 Apr 2022 13:28:49 +0200}, biburl = {https://dblp.org/rec/conf/ccs/DijkJORST12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/RuhrmairD12, author = {Ulrich R{\"{u}}hrmair and Marten van Dijk}, editor = {Emmanuel Prouff and Patrick Schaumont}, title = {Practical Security Analysis of PUF-Based Two-Player Protocols}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2012 - 14th International Workshop, Leuven, Belgium, September 9-12, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7428}, pages = {251--267}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33027-8\_15}, doi = {10.1007/978-3-642-33027-8\_15}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/RuhrmairD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/BowersDGJORT12, author = {Kevin D. Bowers and Marten van Dijk and Robert Griffin and Ari Juels and Alina Oprea and Ronald L. Rivest and Nikos Triandopoulos}, editor = {Jens Grossklags and Jean C. Walrand}, title = {Defending against the Unknown Enemy: Applying FlipIt to System Security}, booktitle = {Decision and Game Theory for Security - Third International Conference, GameSec 2012, Budapest, Hungary, November 5-6, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7638}, pages = {248--263}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34266-0\_15}, doi = {10.1007/978-3-642-34266-0\_15}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/BowersDGJORT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DijkJOR12, author = {Marten van Dijk and Ari Juels and Alina Oprea and Ronald L. Rivest}, title = {FlipIt: The Game of "Stealthy Takeover"}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {103}, year = {2012}, url = {http://eprint.iacr.org/2012/103}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DijkJOR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DijkR12, author = {Marten van Dijk and Ulrich R{\"{u}}hrmair}, title = {Physical Unclonable Functions in Cryptographic Protocols: Security Proofs and Impossibility Results}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {228}, year = {2012}, url = {http://eprint.iacr.org/2012/228}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DijkR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FletcherDD12, author = {Christopher W. Fletcher and Marten van Dijk and Srinivas Devadas}, title = {Compilation Techniques for Efficient Encrypted Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {266}, year = {2012}, url = {http://eprint.iacr.org/2012/266}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FletcherDD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BowersDGJORT12, author = {Kevin D. Bowers and Marten van Dijk and Robert Griffin and Ari Juels and Alina Oprea and Ronald L. Rivest and Nikos Triandopoulos}, title = {Defending Against the Unknown Enemy: Applying FlipIt to System Security}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {579}, year = {2012}, url = {http://eprint.iacr.org/2012/579}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BowersDGJORT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BowersDJOR11, author = {Kevin D. Bowers and Marten van Dijk and Ari Juels and Alina Oprea and Ronald L. Rivest}, editor = {Yan Chen and George Danezis and Vitaly Shmatikov}, title = {How to tell if your cloud files are vulnerable to drive crashes}, booktitle = {Proceedings of the 18th {ACM} Conference on Computer and Communications Security, {CCS} 2011, Chicago, Illinois, USA, October 17-21, 2011}, pages = {501--514}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2046707.2046766}, doi = {10.1145/2046707.2046766}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/BowersDJOR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/chi/DenningBDJ11, author = {Tamara Denning and Kevin D. Bowers and Marten van Dijk and Ari Juels}, editor = {Desney S. Tan and Saleema Amershi and Bo Begole and Wendy A. Kellogg and Manas Tungare}, title = {Exploring implicit memory for painless password recovery}, booktitle = {Proceedings of the International Conference on Human Factors in Computing Systems, {CHI} 2011, Vancouver, BC, Canada, May 7-12, 2011}, pages = {2615--2618}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/1978942.1979323}, doi = {10.1145/1978942.1979323}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/chi/DenningBDJ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/StefanovDOJ11, author = {Emil Stefanov and Marten van Dijk and Alina Oprea and Ari Juels}, title = {Iris: {A} Scalable Cloud File System with Efficient Integrity Checks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {585}, year = {2011}, url = {http://eprint.iacr.org/2011/585}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/StefanovDOJ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/DijkGHV10, author = {Marten van Dijk and Craig Gentry and Shai Halevi and Vinod Vaikuntanathan}, editor = {Henri Gilbert}, title = {Fully Homomorphic Encryption over the Integers}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Monaco / French Riviera, May 30 - June 3, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6110}, pages = {24--43}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13190-5\_2}, doi = {10.1007/978-3-642-13190-5\_2}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/DijkGHV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/DijkJ10, author = {Marten van Dijk and Ari Juels}, editor = {Wietse Z. Venema}, title = {On the Impossibility of Cryptography Alone for Privacy-Preserving Cloud Computing}, booktitle = {5th {USENIX} Workshop on Hot Topics in Security, HotSec'10, Washington, D.C., USA, August 10, 2010}, publisher = {{USENIX} Association}, year = {2010}, url = {https://www.usenix.org/conference/hotsec10/impossibility-cryptography-alone-privacy-preserving-cloud-computing}, timestamp = {Mon, 01 Feb 2021 08:43:16 +0100}, biburl = {https://dblp.org/rec/conf/uss/DijkJ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BowersDJOR10, author = {Kevin D. Bowers and Marten van Dijk and Ari Juels and Alina Oprea and Ronald L. Rivest}, title = {How to Tell if Your Cloud Files Are Vulnerable to Drive Crashes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {214}, year = {2010}, url = {http://eprint.iacr.org/2010/214}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BowersDJOR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DijkJ10, author = {Marten van Dijk and Ari Juels}, title = {On the Impossibility of Cryptography Alone for Privacy-Preserving Cloud Computing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {305}, year = {2010}, url = {http://eprint.iacr.org/2010/305}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DijkJ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isca/KinsyCWSDD09, author = {Michel A. Kinsy and Myong Hyon Cho and Tina Wen and G. Edward Suh and Marten van Dijk and Srinivas Devadas}, editor = {Stephen W. Keckler and Luiz Andr{\'{e}} Barroso}, title = {Application-aware deadlock-free oblivious routing}, booktitle = {36th International Symposium on Computer Architecture {(ISCA} 2009), June 20-24, 2009, Austin, TX, {USA}}, pages = {208--219}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1555754.1555782}, doi = {10.1145/1555754.1555782}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isca/KinsyCWSDD09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DijkGHV09, author = {Marten van Dijk and Craig Gentry and Shai Halevi and Vinod Vaikuntanathan}, title = {Fully Homomorphic Encryption over the Integers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {616}, year = {2009}, url = {http://eprint.iacr.org/2009/616}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DijkGHV09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/GassendDCTDT08, author = {Blaise Gassend and Marten van Dijk and Dwaine E. Clarke and Emina Torlak and Srinivas Devadas and Pim Tuyls}, title = {Controlled physical random functions and applications}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {10}, number = {4}, pages = {3:1--3:22}, year = {2008}, url = {https://doi.org/10.1145/1284680.1284683}, doi = {10.1145/1284680.1284683}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/GassendDCTDT08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cardis/CostanSDD08, author = {Victor Costan and Luis F. G. Sarmenta and Marten van Dijk and Srinivas Devadas}, editor = {Gilles Grimaud and Fran{\c{c}}ois{-}Xavier Standaert}, title = {The Trusted Execution Module: Commodity General-Purpose Trusted Computing}, booktitle = {Smart Card Research and Advanced Applications, 8th {IFIP} {WG} 8.8/11.2 International Conference, {CARDIS} 2008, London, UK, September 8-11, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5189}, pages = {133--148}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85893-5\_10}, doi = {10.1007/978-3-540-85893-5\_10}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cardis/CostanSDD08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/SarmentaDRD08, author = {Luis F. G. Sarmenta and Marten van Dijk and Jonathan Rhodes and Srinivas Devadas}, editor = {Roger L. Wainwright and Hisham Haddad}, title = {Offline count-limited certificates}, booktitle = {Proceedings of the 2008 {ACM} Symposium on Applied Computing (SAC), Fortaleza, Ceara, Brazil, March 16-20, 2008}, pages = {2145--2152}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1363686.1364200}, doi = {10.1145/1363686.1364200}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sac/SarmentaDRD08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bmcbi/GassendOTLDD07, author = {Blaise Gassend and Charles W. O'Donnell and William Thies and Andrew Lee and Marten van Dijk and Srinivas Devadas}, title = {Learning biophysically-motivated parameters for alpha helix prediction}, journal = {{BMC} Bioinform.}, volume = {8}, number = {{S-5}}, year = {2007}, url = {https://doi.org/10.1186/1471-2105-8-S5-S3}, doi = {10.1186/1471-2105-8-S5-S3}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/bmcbi/GassendOTLDD07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/DijkRSD07, author = {Marten van Dijk and Jonathan Rhodes and Luis F. G. Sarmenta and Srinivas Devadas}, editor = {Peng Ning and Vijay Atluri and Shouhuai Xu and Moti Yung}, title = {Offline untrusted storage with immediate detection of forking and replay attacks}, booktitle = {Proceedings of the 2nd {ACM} Workshop on Scalable Trusted Computing, {STC} 2007, Alexandria, VA, USA, November 2, 2007}, pages = {41--48}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1314354.1314364}, doi = {10.1145/1314354.1314364}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/DijkRSD07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/DijkCGSD06, author = {Marten van Dijk and Dwaine E. Clarke and Blaise Gassend and G. Edward Suh and Srinivas Devadas}, title = {Speeding up Exponentiation using an Untrusted Computational Resource}, journal = {Des. Codes Cryptogr.}, volume = {39}, number = {2}, pages = {253--273}, year = {2006}, url = {https://doi.org/10.1007/s10623-005-3710-8}, doi = {10.1007/S10623-005-3710-8}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/DijkCGSD06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipl/DijkKST06, author = {Marten van Dijk and Tom A. M. Kevenaar and Geert Jan Schrijen and Pim Tuyls}, title = {Improved constructions of secret sharing schemes by applying (lambda, omega)-decompositions}, journal = {Inf. Process. Lett.}, volume = {99}, number = {4}, pages = {154--157}, year = {2006}, url = {https://doi.org/10.1016/j.ipl.2006.01.016}, doi = {10.1016/J.IPL.2006.01.016}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ipl/DijkKST06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/SarmentaDORD06, author = {Luis F. G. Sarmenta and Marten van Dijk and Charles W. O'Donnell and Jonathan Rhodes and Srinivas Devadas}, editor = {Ari Juels and Gene Tsudik and Shouhuai Xu and Moti Yung}, title = {Virtual monotonic counters and count-limited objects using a {TPM} without a trusted {OS}}, booktitle = {Proceedings of the 1st {ACM} Workshop on Scalable Trusted Computing, {STC} 2006, Alexandria, VA, USA, November 3, 2006}, pages = {27--42}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1179474.1179485}, doi = {10.1145/1179474.1179485}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/SarmentaDORD06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/prib/GassendOTLDD06, author = {Blaise Gassend and Charles W. O'Donnell and William Thies and Andrew Lee and Marten van Dijk and Srinivas Devadas}, editor = {Jagath C. Rajapakse and Limsoon Wong and Raj Acharya}, title = {Predicting Secondary Structure of All-Helical Proteins Using Hidden Markov Support Vector Machines}, booktitle = {Pattern Recognition in Bioinformatics, International Workshop, {PRIB} 2006, Hong Kong, China, August 20, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4146}, pages = {93--104}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11818564\_11}, doi = {10.1007/11818564\_11}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/prib/GassendOTLDD06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-cs-0605097, author = {Marten van Dijk and Emina Torlak and Blaise Gassend and Srinivas Devadas}, title = {A Generalized Two-Phase Analysis of Knowledge Flows in Security Protocols}, journal = {CoRR}, volume = {abs/cs/0605097}, year = {2006}, url = {http://arxiv.org/abs/cs/0605097}, eprinttype = {arXiv}, eprint = {cs/0605097}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-cs-0605097.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-cs-0605109, author = {Emina Torlak and Marten van Dijk and Blaise Gassend and Daniel Jackson and Srinivas Devadas}, title = {Knowledge Flow Analysis for Security Protocols}, journal = {CoRR}, volume = {abs/cs/0605109}, year = {2006}, url = {http://arxiv.org/abs/cs/0605109}, eprinttype = {arXiv}, eprint = {cs/0605109}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-cs-0605109.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/DijkEGW05, author = {Marten van Dijk and Sebastian Egner and Marcus Greferath and Alfred Wassermann}, title = {On two doubly even self-dual binary codes of length 160 and minimum weight 24}, journal = {{IEEE} Trans. Inf. Theory}, volume = {51}, number = {1}, pages = {408--411}, year = {2005}, url = {https://doi.org/10.1109/TIT.2004.839535}, doi = {10.1109/TIT.2004.839535}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tit/DijkEGW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/WillemsD05, author = {Frans M. J. Willems and Marten van Dijk}, title = {Capacity and codes for embedding information in gray-scale signals}, journal = {{IEEE} Trans. Inf. Theory}, volume = {51}, number = {3}, pages = {1209--1214}, year = {2005}, url = {https://doi.org/10.1109/TIT.2004.842707}, doi = {10.1109/TIT.2004.842707}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tit/WillemsD05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tvlsi/LimLGSDD05, author = {Daihyun Lim and Jae W. Lee and Blaise Gassend and G. Edward Suh and Marten van Dijk and Srinivas Devadas}, title = {Extracting secret keys from integrated circuits}, journal = {{IEEE} Trans. Very Large Scale Integr. Syst.}, volume = {13}, number = {10}, pages = {1200--1205}, year = {2005}, url = {https://doi.org/10.1109/TVLSI.2005.859470}, doi = {10.1109/TVLSI.2005.859470}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tvlsi/LimLGSDD05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/DijkGPRSSW05, author = {Marten van Dijk and Robert Granger and Dan Page and Karl Rubin and Alice Silverberg and Martijn Stam and David P. Woodruff}, editor = {Ronald Cramer}, title = {Practical Cryptography in High Dimensional Tori}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2005, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3494}, pages = {234--250}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11426639\_14}, doi = {10.1007/11426639\_14}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/DijkGPRSSW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eusipco/DijkT05, author = {Marten van Dijk and Pim Tuyls}, title = {Secure biometrics}, booktitle = {13th European Signal Processing Conference, {EUSIPCO} 2005, Antalya, Turkey, September 4-8, 2005}, pages = {1--4}, publisher = {{IEEE}}, year = {2005}, url = {https://ieeexplore.ieee.org/document/7077980/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eusipco/DijkT05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/ClarkeSGSDD05, author = {Dwaine E. Clarke and G. Edward Suh and Blaise Gassend and Ajay Sudan and Marten van Dijk and Srinivas Devadas}, title = {Towards Constant Bandwidth Overhead Integrity Checking of Untrusted Data}, booktitle = {2005 {IEEE} Symposium on Security and Privacy (S{\&}P 2005), 8-11 May 2005, Oakland, CA, {USA}}, pages = {139--153}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/SP.2005.24}, doi = {10.1109/SP.2005.24}, timestamp = {Thu, 21 Sep 2023 15:57:31 +0200}, biburl = {https://dblp.org/rec/conf/sp/ClarkeSGSDD05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/concurrency/GassendLCDD04, author = {Blaise Gassend and Daihyun Lim and Dwaine E. Clarke and Marten van Dijk and Srinivas Devadas}, title = {Identification and authentication of integrated circuits}, journal = {Concurr. Pract. Exp.}, volume = {16}, number = {11}, pages = {1077--1098}, year = {2004}, url = {https://doi.org/10.1002/cpe.805}, doi = {10.1002/CPE.805}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/concurrency/GassendLCDD04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DijkW04, author = {Marten van Dijk and David P. Woodruff}, editor = {Matthew K. Franklin}, title = {Asymptotically Optimal Communication for Torus-Based Cryptography}, booktitle = {Advances in Cryptology - {CRYPTO} 2004, 24th Annual International CryptologyConference, Santa Barbara, California, USA, August 15-19, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3152}, pages = {157--178}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-28628-8\_10}, doi = {10.1007/978-3-540-28628-8\_10}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/DijkW04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DijkGPRSSW04, author = {Marten van Dijk and Robert Granger and Dan Page and Karl Rubin and Alice Silverberg and Martijn Stam and David P. Woodruff}, title = {Practical Cryptography in High Dimensional Tori}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {352}, year = {2004}, url = {http://eprint.iacr.org/2004/352}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DijkGPRSSW04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/LiuTD03, author = {Shengli Liu and Henk C. A. van Tilborg and Marten van Dijk}, title = {A Practical Protocol for Advantage Distillation and Information Reconciliation}, journal = {Des. Codes Cryptogr.}, volume = {30}, number = {1}, pages = {39--62}, year = {2003}, url = {https://doi.org/10.1023/A:1024755209150}, doi = {10.1023/A:1024755209150}, timestamp = {Fri, 06 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/LiuTD03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ett/DijkJK03, author = {Marten van Dijk and Augustus J. E. M. Janssen and Arie G. C. Koppelaar}, title = {Correcting systematic mismatches in computed log-likelihood ratios}, journal = {Eur. Trans. Telecommun.}, volume = {14}, number = {3}, pages = {227--244}, year = {2003}, url = {https://doi.org/10.1002/ett.917}, doi = {10.1002/ETT.917}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ett/DijkJK03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/DijkEMK03, author = {Marten van Dijk and Sebastian Egner and Ravi Motwani and Arie G. C. Koppelaar}, title = {Simultaneous zero-tailing of parallel concatenated codes}, journal = {{IEEE} Trans. Inf. Theory}, volume = {49}, number = {9}, pages = {2236--2241}, year = {2003}, url = {https://doi.org/10.1109/TIT.2003.815807}, doi = {10.1109/TIT.2003.815807}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tit/DijkEMK03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/ClarkeDDGS03, author = {Dwaine E. Clarke and Srinivas Devadas and Marten van Dijk and Blaise Gassend and G. Edward Suh}, editor = {Chi{-}Sung Laih}, title = {Incremental Multiset Hash Functions and Their Application to Memory Integrity Checking}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2003, 9th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, November 30 - December 4, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2894}, pages = {188--207}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-40061-5\_12}, doi = {10.1007/978-3-540-40061-5\_12}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/ClarkeDDGS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hpca/GassendSCDD03, author = {Blaise Gassend and G. Edward Suh and Dwaine E. Clarke and Marten van Dijk and Srinivas Devadas}, title = {Caches and Hash Trees for Efficient Memory Integrity Verification}, booktitle = {Proceedings of the Ninth International Symposium on High-Performance Computer Architecture (HPCA'03), Anaheim, California, USA, February 8-12, 2003}, pages = {295--306}, publisher = {{IEEE} Computer Society}, year = {2003}, url = {https://doi.org/10.1109/HPCA.2003.1183547}, doi = {10.1109/HPCA.2003.1183547}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hpca/GassendSCDD03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ics/SuhCGDD03, author = {G. Edward Suh and Dwaine E. Clarke and Blaise Gassend and Marten van Dijk and Srinivas Devadas}, editor = {Utpal Banerjee and Kyle A. Gallivan and Antonio Gonz{\'{a}}lez}, title = {{AEGIS:} architecture for tamper-evident and tamper-resistant processing}, booktitle = {Proceedings of the 17th Annual International Conference on Supercomputing, {ICS} 2003, San Francisco, CA, USA, June 23-26, 2003}, pages = {160--171}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/782814.782838}, doi = {10.1145/782814.782838}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ics/SuhCGDD03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/micro/SuhCGDD03, author = {G. Edward Suh and Dwaine E. Clarke and Blaise Gassend and Marten van Dijk and Srinivas Devadas}, title = {Efficient Memory Integrity Verification and Encryption for Secure Processors}, booktitle = {Proceedings of the 36th Annual International Symposium on Microarchitecture, San Diego, CA, USA, December 3-5, 2003}, pages = {339--350}, publisher = {{IEEE} Computer Society}, year = {2003}, url = {https://doi.org/10.1109/MICRO.2003.1253207}, doi = {10.1109/MICRO.2003.1253207}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/micro/SuhCGDD03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/GassendCDD03, author = {Blaise Gassend and Dwaine E. Clarke and Marten van Dijk and Srinivas Devadas}, editor = {Gary B. Lamont and Hisham Haddad and George A. Papadopoulos and Brajendra Panda}, title = {Delay-Based Circuit Authentication and Applications}, booktitle = {Proceedings of the 2003 {ACM} Symposium on Applied Computing (SAC), March 9-12, 2003, Melbourne, FL, {USA}}, pages = {294--301}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/952532.952593}, doi = {10.1145/952532.952593}, timestamp = {Tue, 06 Nov 2018 11:06:45 +0100}, biburl = {https://dblp.org/rec/conf/sac/GassendCDD03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spc/TuylsKSSD03, author = {Pim Tuyls and Tom A. M. Kevenaar and Geert Jan Schrijen and Toine Staring and Marten van Dijk}, editor = {Dieter Hutter and G{\"{u}}nter M{\"{u}}ller and Werner Stephan and Markus Ullmann}, title = {Visual Crypto Displays Enabling Secure Communications}, booktitle = {Security in Pervasive Computing, First International Conference, Boppard, Germany, March 12-14, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2802}, pages = {271--284}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-39881-3\_23}, doi = {10.1007/978-3-540-39881-3\_23}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spc/TuylsKSSD03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/TuylsKSSD03, author = {Pim Tuyls and Tom A. M. Kevenaar and Geert Jan Schrijen and Toine Staring and Marten van Dijk}, title = {Visual Crypto Displays Enabling Secure Communications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {118}, year = {2003}, url = {http://eprint.iacr.org/2003/118}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/TuylsKSSD03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/GassendCDD02, author = {Blaise Gassend and Dwaine E. Clarke and Marten van Dijk and Srinivas Devadas}, title = {Controlled Physical Random Functions}, booktitle = {18th Annual Computer Security Applications Conference {(ACSAC} 2002), 9-13 December 2002, Las Vegas, NV, {USA}}, pages = {149--160}, publisher = {{IEEE} Computer Society}, year = {2002}, url = {https://doi.org/10.1109/CSAC.2002.1176287}, doi = {10.1109/CSAC.2002.1176287}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/GassendCDD02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/GassendCDD02, author = {Blaise Gassend and Dwaine E. Clarke and Marten van Dijk and Srinivas Devadas}, editor = {Vijayalakshmi Atluri}, title = {Silicon physical random functions}, booktitle = {Proceedings of the 9th {ACM} Conference on Computer and Communications Security, {CCS} 2002, Washington, DC, USA, November 18-22, 2002}, pages = {148--160}, publisher = {{ACM}}, year = {2002}, url = {https://doi.org/10.1145/586110.586132}, doi = {10.1145/586110.586132}, timestamp = {Tue, 10 Nov 2020 20:00:47 +0100}, biburl = {https://dblp.org/rec/conf/ccs/GassendCDD02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/WoodruffD02, author = {David P. Woodruff and Marten van Dijk}, editor = {Lars R. Knudsen}, title = {Cryptography in an Unbounded Computational Model}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2002, International Conference on the Theory and Applications of Cryptographic Techniques, Amsterdam, The Netherlands, April 28 - May 2, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2332}, pages = {149--164}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-46035-7\_10}, doi = {10.1007/3-540-46035-7\_10}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/WoodruffD02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pervasive/ClarkeGKBDDR02, author = {Dwaine E. Clarke and Blaise Gassend and Thomas Kotwal and Matt Burnside and Marten van Dijk and Srinivas Devadas and Ronald L. Rivest}, editor = {Friedemann Mattern and Mahmoud Naghshineh}, title = {The Untrusted Computer Problem and Camera-Based Authentication}, booktitle = {Pervasive Computing, First International Conference, Pervasive 2002, Z{\"{u}}rich, Switzerland, August 26-28, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2414}, pages = {114--124}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45866-2\_10}, doi = {10.1007/3-540-45866-2\_10}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pervasive/ClarkeGKBDDR02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aaecc/KuijperDHO01, author = {Margreta Kuijper and Marten van Dijk and Henk D. L. Hollmann and Job Oostveen}, editor = {Serdar Boztas and Igor E. Shparlinski}, title = {A Unifying System-Theoretic Framework for Errors-and-Erasures Reed-Solomon Decoding}, booktitle = {Applied Algebra, Algebraic Algorithms and Error-Correcting Codes, 14th International Symposium, AAECC-14, Melbourne, Australia November 26-30, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2227}, pages = {343--352}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45624-4\_36}, doi = {10.1007/3-540-45624-4\_36}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aaecc/KuijperDHO01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/DijkT99, author = {Marten van Dijk and Ludo M. G. M. Tolhuizen}, title = {Efficient encoding for a class of subspace subcodes}, journal = {{IEEE} Trans. Inf. Theory}, volume = {45}, number = {6}, pages = {2142--2146}, year = {1999}, url = {https://doi.org/10.1109/18.782162}, doi = {10.1109/18.782162}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tit/DijkT99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/DijkGS98, author = {Marten van Dijk and Christian Gehrmann and Ben J. M. Smeets}, title = {Unconditionally Secure Group Authentication}, journal = {Des. Codes Cryptogr.}, volume = {14}, number = {3}, pages = {281--296}, year = {1998}, url = {https://doi.org/10.1023/A:1008261021505}, doi = {10.1023/A:1008261021505}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/DijkGS98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/DijkJM98, author = {Marten van Dijk and Wen{-}Ai Jackson and Keith M. Martin}, title = {A General Decomposition Construction for Incomplete Secret Sharing Schemes}, journal = {Des. Codes Cryptogr.}, volume = {15}, number = {3}, pages = {301--321}, year = {1998}, url = {https://doi.org/10.1023/A:1008381427667}, doi = {10.1023/A:1008381427667}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/DijkJM98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icip/KalkerLD98, author = {Ton Kalker and Jean{-}Paul M. G. Linnartz and Marten van Dijk}, title = {Watermark Estimation through Detector Analysis}, booktitle = {Proceedings of the 1998 {IEEE} International Conference on Image Processing, ICIP-98, Chicago, Illinois, USA, October 4-7, 1998}, pages = {425--429}, publisher = {{IEEE} Computer Society}, year = {1998}, url = {https://doi.org/10.1109/ICIP.1998.723516}, doi = {10.1109/ICIP.1998.723516}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icip/KalkerLD98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/LinnartzD98, author = {Jean{-}Paul M. G. Linnartz and Marten van Dijk}, editor = {David Aucsmith}, title = {Analysis of the Sensitivity Attack against Electronic Watermarks in Images}, booktitle = {Information Hiding, Second International Workshop, Portland, Oregon, USA, April 14-17, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1525}, pages = {258--272}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-49380-8\_18}, doi = {10.1007/3-540-49380-8\_18}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/LinnartzD98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Dijk97, author = {Marten van Dijk}, title = {A Linear Construction of Secret Sharing Schemes}, journal = {Des. Codes Cryptogr.}, volume = {12}, number = {2}, pages = {161--201}, year = {1997}, url = {https://doi.org/10.1023/A:1008259214236}, doi = {10.1023/A:1008259214236}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Dijk97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipl/Dijk97, author = {Marten van Dijk}, title = {More Information Theoretical Inequalities to be Used in Secret Sharing?}, journal = {Inf. Process. Lett.}, volume = {63}, number = {1}, pages = {41--44}, year = {1997}, url = {https://doi.org/10.1016/S0020-0190(97)00086-0}, doi = {10.1016/S0020-0190(97)00086-0}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ipl/Dijk97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/Dijk97, author = {Marten van Dijk}, title = {On a special class of broadcast channels with confidential messages}, journal = {{IEEE} Trans. Inf. Theory}, volume = {43}, number = {2}, pages = {712--714}, year = {1997}, url = {https://doi.org/10.1109/18.556128}, doi = {10.1109/18.556128}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tit/Dijk97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Dijk95, author = {Marten van Dijk}, title = {On the Information Rate of Perfect Secret Sharing Schemes}, journal = {Des. Codes Cryptogr.}, volume = {6}, number = {2}, pages = {143--169}, year = {1995}, url = {https://doi.org/10.1007/BF01398012}, doi = {10.1007/BF01398012}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Dijk95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Dijk94, author = {Marten van Dijk}, editor = {Alfredo De Santis}, title = {A Linear Construction of Perfect Secret Sharing Schemes}, booktitle = {Advances in Cryptology - {EUROCRYPT} '94, Workshop on the Theory and Application of Cryptographic Techniques, Perugia, Italy, May 9-12, 1994, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {950}, pages = {23--34}, publisher = {Springer}, year = {1994}, url = {https://doi.org/10.1007/BFb0053421}, doi = {10.1007/BFB0053421}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Dijk94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.