What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Marten van Dijk
Google Scholar
42
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/tifs
Breaking XOR Arbiter PUFs With Chosen Challenge Attack.
Niloufar Sayadi
Phuong Ha Nguyen
Marten van Dijk
Chenglu Jin
2024
conf/ccs
PG: Byzantine Fault-Tolerant and Privacy-Preserving Sensor Fusion with Guaranteed Output Delivery.
Chenglu Jin
Chao Yin
Marten van Dijk
Sisi Duan
Fabio Massacci
Michael K. Reiter
Haibin Zhang
2024
conf/host
Masked Memory Primitive for Key Insulated Schemes.
Zachary DiMeglio
Jenna Bustami
Deniz Gurevin
Chenglu Jin
Marten van Dijk
Omer Khan
2023
journals/joc
A Theoretical Framework for the Analysis of Physical Unclonable Function Interfaces and Its Relation to the Random Oracle Model.
Marten van Dijk
Chenglu Jin
2022
conf/ccs
Towards Remote Verifiable Computation without Digital Secrets.
Marten van Dijk
2022
conf/ccs
CCSW '22: The 2022 Cloud Computing Security Workshop.
Marten van Dijk
Francesco Regazzoni
2020
journals/tches
Splitting the Interpose PUF: A Novel Modeling Attack Strategy.
Nils Wisiol
Christopher Mühl
Niklas Pirnay
Phuong Ha Nguyen
Marian Margraf
Jean-Pierre Seifert
Marten van Dijk
Ulrich Rührmair
2020
conf/ccs
Erasable PUFs: Formal Treatment and Generic Design.
Chenglu Jin
Wayne P. Burleson
Marten van Dijk
Ulrich Rührmair
2019
journals/tches
The Interpose PUF: Secure PUF Design against State-of-the-art Machine Learning Attacks.
Phuong Ha Nguyen
Durga Prasad Sahoo
Chenglu Jin
Kaleel Mahmood
Ulrich Rührmair
Marten van Dijk
2019
conf/ccs
MalPro: A Learning-based Malware Propagation and Containment Modeling.
Saeed Valizadeh
Marten van Dijk
2019
conf/acsac
Proof of aliveness.
Chenglu Jin
Zheng Yang
Marten van Dijk
Jianying Zhou
2018
conf/fc
Weak-Unforgeable Tags for Secure Supply Chain Management.
Marten van Dijk
Chenglu Jin
Hoda Maleki
Phuong Ha Nguyen
Reza Rahaeimehr
2017
conf/ccs
ASHES 2017: Workshop on Attacks and Solutions in Hardware Security.
Chip-Hong Chang
Marten van Dijk
Farinaz Koushanfar
Ulrich Rührmair
Mark M. Tehranipoor
2017
conf/ccs
SoK: RFID-based Clone Detection Mechanisms for Supply Chains.
Hoda Maleki
Reza Rahaeimehr
Marten van Dijk
2017
conf/host
New clone-detection approach for RFID-based supply chains.
Hoda Maleki
Reza Rahaeimehr
Chenglu Jin
Marten van Dijk
2017
conf/host
Connecting the dots: Privacy leakage via write-access patterns to the main memory.
Tara Merin John
Syed Kamran Haider
Hamza Omar
Marten van Dijk
2016
conf/ccs
Markov Modeling of Moving Target Defense Games.
Hoda Maleki
Saeed Valizadeh
William Koch
Azer Bestavros
Marten van Dijk
2016
conf/tcc
Onion ORAM: A Constant Bandwidth Blowup Oblivious RAM.
Srinivas Devadas
Marten van Dijk
Christopher W. Fletcher
Ling Ren
Elaine Shi
Daniel Wichs
2015
conf/ccs
Hardware Security and its Adversaries.
Marten van Dijk
2015
conf/uss
Constants Count: Practical Improvements to Oblivious RAM.
Ling Ren
Christopher W. Fletcher
Albert Kwon
Emil Stefanov
Elaine Shi
Marten van Dijk
Srinivas Devadas
2013
journals/joc
FlipIt: The Game of "Stealthy Takeover".
Marten van Dijk
Ari Juels
Alina Oprea
Ronald L. Rivest
2013
conf/ccs
Path ORAM: an extremely simple oblivious RAM protocol.
Emil Stefanov
Marten van Dijk
Elaine Shi
Christopher W. Fletcher
Ling Ren
Xiangyao Yu
Srinivas Devadas
2013
conf/ccs
Generalized external interaction with tamper-resistant hardware with bounded information leakage.
Xiangyao Yu
Christopher W. Fletcher
Ling Ren
Marten van Dijk
Srinivas Devadas
2013
conf/sp
PUFs in Security Protocols: Attack Models and Security Evaluations.
Ulrich Rührmair
Marten van Dijk
2012
conf/ccs
Hourglass schemes: how to prove that cloud files are encrypted.
Marten van Dijk
Ari Juels
Alina Oprea
Ronald L. Rivest
Emil Stefanov
Nikos Triandopoulos
2012
conf/ccs
Towards an interpreter for efficient encrypted computation.
Christopher W. Fletcher
Marten van Dijk
Srinivas Devadas
2012
conf/ches
Practical Security Analysis of PUF-Based Two-Player Protocols.
Ulrich Rührmair
Marten van Dijk
2012
conf/acsac
Iris: a scalable cloud file system with efficient integrity checks.
Emil Stefanov
Marten van Dijk
Ari Juels
Alina Oprea
2011
conf/ccs
How to tell if your cloud files are vulnerable to drive crashes.
Kevin D. Bowers
Marten van Dijk
Ari Juels
Alina Oprea
Ronald L. Rivest
2010
conf/uss
On the Impossibility of Cryptography Alone for Privacy-Preserving Cloud Computing.
Marten van Dijk
Ari Juels
2010
conf/eurocrypt
Fully Homomorphic Encryption over the Integers.
Marten van Dijk
Craig Gentry
Shai Halevi
Vinod Vaikuntanathan
2007
conf/ccs
Offline untrusted storage with immediate detection of forking and replay attacks.
Marten van Dijk
Jonathan Rhodes
Luis F. G. Sarmenta
Srinivas Devadas
2006
conf/ccs
Virtual monotonic counters and count-limited objects using a TPM without a trusted OS.
Luis F. G. Sarmenta
Marten van Dijk
Charles W. O'Donnell
Jonathan Rhodes
Srinivas Devadas
2005
conf/sp
Towards Constant Bandwidth Overhead Integrity Checking of Untrusted Data.
Dwaine E. Clarke
G. Edward Suh
Blaise Gassend
Ajay Sudan
Marten van Dijk
Srinivas Devadas
2005
conf/eurocrypt
Practical Cryptography in High Dimensional Tori.
Marten van Dijk
Robert Granger
Dan Page
Karl Rubin
Alice Silverberg
Martijn Stam
David P. Woodruff
2004
conf/crypto
Asymptotically Optimal Communication for Torus-Based Cryptography.
Marten van Dijk
David P. Woodruff
2003
conf/asiacrypt
Incremental Multiset Hash Functions and Their Application to Memory Integrity Checking.
Dwaine E. Clarke
Srinivas Devadas
Marten van Dijk
Blaise Gassend
G. Edward Suh
2002
conf/ccs
Silicon physical random functions.
Blaise Gassend
Dwaine E. Clarke
Marten van Dijk
Srinivas Devadas
2002
conf/eurocrypt
Cryptography in an Unbounded Computational Model.
David P. Woodruff
Marten van Dijk
2002
conf/acsac
Controlled Physical Random Functions.
Blaise Gassend
Dwaine E. Clarke
Marten van Dijk
Srinivas Devadas
1998
conf/ih
Analysis of the Sensitivity Attack against Electronic Watermarks in Images.
Jean-Paul M. G. Linnartz
Marten van Dijk
1994
conf/eurocrypt
A Linear Construction of Perfect Secret Sharing Schemes.
Marten van Dijk
Coauthors
Ajay Sudan
(1)
Albert Kwon
(1)
Alice Silverberg
(1)
Alina Oprea
(4)
Ari Juels
(5)
Azer Bestavros
(1)
Blaise Gassend
(4)
Chao Yin
(1)
Charles W. O'Donnell
(1)
Chenglu Jin
(9)
Chip-Hong Chang
(1)
Christopher Mühl
(1)
Christopher W. Fletcher
(5)
Craig Gentry
(1)
Dan Page
(1)
Daniel Wichs
(1)
David P. Woodruff
(3)
Deniz Gurevin
(1)
Durga Prasad Sahoo
(1)
Dwaine E. Clarke
(4)
Elaine Shi
(3)
Emil Stefanov
(4)
Fabio Massacci
(1)
Farinaz Koushanfar
(1)
Francesco Regazzoni
(1)
G. Edward Suh
(2)
Haibin Zhang
(1)
Hamza Omar
(1)
Hoda Maleki
(4)
Jean-Paul M. G. Linnartz
(1)
Jean-Pierre Seifert
(1)
Jenna Bustami
(1)
Jianying Zhou
(1)
Jonathan Rhodes
(2)
Kaleel Mahmood
(1)
Karl Rubin
(1)
Kevin D. Bowers
(1)
Ling Ren
(4)
Luis F. G. Sarmenta
(2)
Marian Margraf
(1)
Mark M. Tehranipoor
(1)
Marten van Dijk
(42)
Martijn Stam
(1)
Michael K. Reiter
(1)
Niklas Pirnay
(1)
Nikos Triandopoulos
(1)
Niloufar Sayadi
(1)
Nils Wisiol
(1)
Omer Khan
(1)
Phuong Ha Nguyen
(4)
Reza Rahaeimehr
(3)
Robert Granger
(1)
Ronald L. Rivest
(3)
Saeed Valizadeh
(2)
Shai Halevi
(1)
Sisi Duan
(1)
Srinivas Devadas
(11)
Syed Kamran Haider
(1)
Tara Merin John
(1)
Ulrich Rührmair
(6)
Vinod Vaikuntanathan
(1)
Wayne P. Burleson
(1)
William Koch
(1)
Xiangyao Yu
(2)
Zachary DiMeglio
(1)
Zheng Yang
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to