2008 | ||
---|---|---|
40 | EE | Victor Costan, Luis F. G. Sarmenta, Marten van Dijk, Srinivas Devadas: The Trusted Execution Module: Commodity General-Purpose Trusted Computing. CARDIS 2008: 133-148 |
39 | EE | Luis F. G. Sarmenta, Marten van Dijk, Jonathan Rhodes, Srinivas Devadas: Offline count-limited certificates. SAC 2008: 2145-2152 |
38 | EE | Blaise Gassend, Marten van Dijk, Dwaine E. Clarke, Emina Torlak, Srinivas Devadas, Pim Tuyls: Controlled physical random functions and applications. ACM Trans. Inf. Syst. Secur. 10(4): (2008) |
2007 | ||
37 | EE | Marten van Dijk, Jonathan Rhodes, Luis F. G. Sarmenta, Srinivas Devadas: Offline untrusted storage with immediate detection of forking and replay attacks. STC 2007: 41-48 |
2006 | ||
36 | EE | Blaise Gassend, Charles W. O'Donnell, William Thies, Andrew Lee, Marten van Dijk, Srinivas Devadas: Predicting Secondary Structure of All-Helical Proteins Using Hidden Markov Support Vector Machines. PRIB 2006: 93-104 |
35 | EE | Luis F. G. Sarmenta, Marten van Dijk, Charles W. O'Donnell, Jonathan Rhodes, Srinivas Devadas: Virtual monotonic counters and count-limited objects using a TPM without a trusted OS. STC 2006: 27-42 |
34 | EE | Marten van Dijk, Emina Torlak, Blaise Gassend, Srinivas Devadas: A Generalized Two-Phase Analysis of Knowledge Flows in Security Protocols CoRR abs/cs/0605097: (2006) |
33 | EE | Emina Torlak, Marten van Dijk, Blaise Gassend, Daniel Jackson, Srinivas Devadas: Knowledge Flow Analysis for Security Protocols CoRR abs/cs/0605109: (2006) |
32 | EE | Marten van Dijk, Dwaine E. Clarke, Blaise Gassend, G. Edward Suh, Srinivas Devadas: Speeding up Exponentiation using an Untrusted Computational Resource. Des. Codes Cryptography 39(2): 253-273 (2006) |
31 | EE | Marten van Dijk, Tom A. M. Kevenaar, Geert Jan Schrijen, Pim Tuyls: Improved constructions of secret sharing schemes by applying (lambda, omega)-decompositions. Inf. Process. Lett. 99(4): 154-157 (2006) |
2005 | ||
30 | EE | Marten van Dijk, Robert Granger, Dan Page, Karl Rubin, Alice Silverberg, Martijn Stam, David P. Woodruff: Practical Cryptography in High Dimensional Tori. EUROCRYPT 2005: 234-250 |
29 | EE | Dwaine E. Clarke, G. Edward Suh, Blaise Gassend, Ajay Sudan, Marten van Dijk, Srinivas Devadas: Towards Constant Bandwidth Overhead Integrity Checking of Untrusted Data. IEEE Symposium on Security and Privacy 2005: 139-153 |
28 | EE | Daihyun Lim, Jae W. Lee, Blaise Gassend, G. Edward Suh, Marten van Dijk, Srinivas Devadas: Extracting secret keys from integrated circuits. IEEE Trans. VLSI Syst. 13(10): 1200-1205 (2005) |
27 | EE | Marten van Dijk, Sebastian Egner, Marcus Greferath, Alfred Wassermann: On two doubly even self-dual binary codes of length 160 and minimum weight 24. IEEE Transactions on Information Theory 51(1): 408-411 (2005) |
26 | EE | Frans M. J. Willems, Marten van Dijk: Capacity and codes for embedding information in gray-scale signals. IEEE Transactions on Information Theory 51(3): 1209-1214 (2005) |
2004 | ||
25 | EE | Marten van Dijk, David P. Woodruff: Asymptotically Optimal Communication for Torus-Based Cryptography. CRYPTO 2004: 157-178 |
24 | EE | Blaise Gassend, Daihyun Lim, Dwaine E. Clarke, Marten van Dijk, Srinivas Devadas: Identification and authentication of integrated circuits. Concurrency - Practice and Experience 16(11): 1077-1098 (2004) |
2003 | ||
23 | EE | Dwaine E. Clarke, Srinivas Devadas, Marten van Dijk, Blaise Gassend, G. Edward Suh: Incremental Multiset Hash Functions and Their Application to Memory Integrity Checking. ASIACRYPT 2003: 188-207 |
22 | EE | Blaise Gassend, G. Edward Suh, Dwaine E. Clarke, Marten van Dijk, Srinivas Devadas: Caches and Hash Trees for Efficient Memory Integrity. HPCA 2003: 295-306 |
21 | EE | G. Edward Suh, Dwaine E. Clarke, Blaise Gassend, Marten van Dijk, Srinivas Devadas: AEGIS: architecture for tamper-evident and tamper-resistant processing. ICS 2003: 160-171 |
20 | EE | G. Edward Suh, Dwaine E. Clarke, Blaise Gassend, Marten van Dijk, Srinivas Devadas: Efficient Memory Integrity Verification and Encryption for Secure Processors. MICRO 2003: 339-350 |
19 | Blaise Gassend, Dwaine E. Clarke, Marten van Dijk, Srinivas Devadas: Delay-Based Circuit Authentication and Applications. SAC 2003: 294-301 | |
18 | EE | Pim Tuyls, Tom A. M. Kevenaar, Geert Jan Schrijen, Toine Staring, Marten van Dijk: Visual Crypto Displays Enabling Secure Communications. SPC 2003: 271-284 |
17 | EE | Shengli Liu, Henk C. A. van Tilborg, Marten van Dijk: A Practical Protocol for Advantage Distillation and Information Reconciliation. Des. Codes Cryptography 30(1): 39-62 (2003) |
16 | Marten van Dijk, Sebastian Egner, Ravi Motwani, Arie G. C. Koppelaar: Simultaneous zero-tailing of parallel concatenated codes. IEEE Transactions on Information Theory 49(9): 2236-2241 (2003) | |
2002 | ||
15 | EE | Blaise Gassend, Dwaine E. Clarke, Marten van Dijk, Srinivas Devadas: Silicon physical random functions. ACM Conference on Computer and Communications Security 2002: 148-160 |
14 | EE | Blaise Gassend, Dwaine E. Clarke, Marten van Dijk, Srinivas Devadas: Controlled Physical Random Functions. ACSAC 2002: 149-160 |
13 | EE | David P. Woodruff, Marten van Dijk: Cryptography in an Unbounded Computational Model. EUROCRYPT 2002: 149-164 |
12 | EE | Dwaine E. Clarke, Blaise Gassend, Thomas Kotwal, Matt Burnside, Marten van Dijk, Srinivas Devadas, Ronald L. Rivest: The Untrusted Computer Problem and Camera-Based Authentication. Pervasive 2002: 114-124 |
2001 | ||
11 | EE | Margreta Kuijper, Marten van Dijk, Henk D. L. Hollmann, Job Oostveen: A Unifying System-Theoretic Framework for Errors-and-Erasures Reed-Solomon Decoding. AAECC 2001: 343-352 |
1999 | ||
10 | Marten van Dijk, Ludo M. G. M. Tolhuizen: Efficient encoding for a class of subspace subcodes. IEEE Transactions on Information Theory 45(6): 2142-2146 (1999) | |
1998 | ||
9 | Ton Kalker, Jean-Paul M. G. Linnartz, Marten van Dijk: Watermark Estimation through Detector Analysis. ICIP (1) 1998: 425-429 | |
8 | EE | Jean-Paul M. G. Linnartz, Marten van Dijk: Analysis of the Sensitivity Attack against Electronic Watermarks in Images. Information Hiding 1998: 258-272 |
7 | Marten van Dijk, Christian Gehrmann, Ben J. M. Smeets: Unconditionally Secure Group Authentication. Des. Codes Cryptography 14(3): 281-296 (1998) | |
6 | Marten van Dijk, Wen-Ai Jackson, Keith M. Martin: A General Decomposition Construction for Incomplete Secret Sharing Schemes. Des. Codes Cryptography 15(3): 301-321 (1998) | |
1997 | ||
5 | Marten van Dijk: A Linear Construction of Secret Sharing Schemes. Des. Codes Cryptography 12(2): 161-201 (1997) | |
4 | Marten van Dijk: On a special class of broadcast channels with confidential messages. IEEE Transactions on Information Theory 43(2): 712-714 (1997) | |
3 | EE | Marten van Dijk: More Information Theoretical Inequalities to be Used in Secret Sharing? Inf. Process. Lett. 63(1): 41-44 (1997) |
1995 | ||
2 | Marten van Dijk: On the Information Rate of Perfect Secret Sharing Schemes. Des. Codes Cryptography 6(2): 143-169 (1995) | |
1994 | ||
1 | EE | Marten van Dijk: A Linear Construction of Perfect Secret Sharing Schemes. EUROCRYPT 1994: 23-34 |