| 1 | 2011 | Crypto | pc |
| year | title | booktitle | pages | |
|---|---|---|---|---|
| 1 | 2012 | Practical Security Analysis of PUF-Based Two-Player Protocols | ches | 251-267 |
| 2 | 2010 | How to Tell if Your Cloud Files Are Vulnerable to Drive Crashes | eprint | online |
| 3 | 2010 | On the Impossibility of Cryptography Alone for Privacy-Preserving Cloud Computing | eprint | online |
| 4 | 2010 | Fully Homomorphic Encryption over the Integers | eurocrypt | 24-43 |
| 5 | 2005 | Practical Cryptography in High Dimensional Tori | eurocrypt | online |
| 6 | 2004 | Practical Cryptography in High Dimensional Tori | eprint | online |
| 7 | 2004 | Asymptotically Optimal Communication for Torus-Based Cryptography | crypto | online |
| 8 | 2003 | Visual Crypto Displays Enabling Secure Communications | eprint | online |
| 9 | 2003 | Incremental Multiset Hash Functions and Their Application to Memory Integrity Checking | asiacrypt | online |
| 10 | 2002 | Cryptography in an Unbounded Computational Model | eurocrypt | online |
| 11 | 1994 | A Linear Construction of Perfect Secret Sharing Schemes | eurocrypt | 23-34 |
Coauthors of Marten van Dijk |