2008 |
40 | EE | Victor Costan,
Luis F. G. Sarmenta,
Marten van Dijk,
Srinivas Devadas:
The Trusted Execution Module: Commodity General-Purpose Trusted Computing.
CARDIS 2008: 133-148 |
39 | EE | Luis F. G. Sarmenta,
Marten van Dijk,
Jonathan Rhodes,
Srinivas Devadas:
Offline count-limited certificates.
SAC 2008: 2145-2152 |
38 | EE | Blaise Gassend,
Marten van Dijk,
Dwaine E. Clarke,
Emina Torlak,
Srinivas Devadas,
Pim Tuyls:
Controlled physical random functions and applications.
ACM Trans. Inf. Syst. Secur. 10(4): (2008) |
2007 |
37 | EE | Marten van Dijk,
Jonathan Rhodes,
Luis F. G. Sarmenta,
Srinivas Devadas:
Offline untrusted storage with immediate detection of forking and replay attacks.
STC 2007: 41-48 |
2006 |
36 | EE | Blaise Gassend,
Charles W. O'Donnell,
William Thies,
Andrew Lee,
Marten van Dijk,
Srinivas Devadas:
Predicting Secondary Structure of All-Helical Proteins Using Hidden Markov Support Vector Machines.
PRIB 2006: 93-104 |
35 | EE | Luis F. G. Sarmenta,
Marten van Dijk,
Charles W. O'Donnell,
Jonathan Rhodes,
Srinivas Devadas:
Virtual monotonic counters and count-limited objects using a TPM without a trusted OS.
STC 2006: 27-42 |
34 | EE | Marten van Dijk,
Emina Torlak,
Blaise Gassend,
Srinivas Devadas:
A Generalized Two-Phase Analysis of Knowledge Flows in Security Protocols
CoRR abs/cs/0605097: (2006) |
33 | EE | Emina Torlak,
Marten van Dijk,
Blaise Gassend,
Daniel Jackson,
Srinivas Devadas:
Knowledge Flow Analysis for Security Protocols
CoRR abs/cs/0605109: (2006) |
32 | EE | Marten van Dijk,
Dwaine E. Clarke,
Blaise Gassend,
G. Edward Suh,
Srinivas Devadas:
Speeding up Exponentiation using an Untrusted Computational Resource.
Des. Codes Cryptography 39(2): 253-273 (2006) |
31 | EE | Marten van Dijk,
Tom A. M. Kevenaar,
Geert Jan Schrijen,
Pim Tuyls:
Improved constructions of secret sharing schemes by applying (lambda, omega)-decompositions.
Inf. Process. Lett. 99(4): 154-157 (2006) |
2005 |
30 | EE | Marten van Dijk,
Robert Granger,
Dan Page,
Karl Rubin,
Alice Silverberg,
Martijn Stam,
David P. Woodruff:
Practical Cryptography in High Dimensional Tori.
EUROCRYPT 2005: 234-250 |
29 | EE | Dwaine E. Clarke,
G. Edward Suh,
Blaise Gassend,
Ajay Sudan,
Marten van Dijk,
Srinivas Devadas:
Towards Constant Bandwidth Overhead Integrity Checking of Untrusted Data.
IEEE Symposium on Security and Privacy 2005: 139-153 |
28 | EE | Daihyun Lim,
Jae W. Lee,
Blaise Gassend,
G. Edward Suh,
Marten van Dijk,
Srinivas Devadas:
Extracting secret keys from integrated circuits.
IEEE Trans. VLSI Syst. 13(10): 1200-1205 (2005) |
27 | EE | Marten van Dijk,
Sebastian Egner,
Marcus Greferath,
Alfred Wassermann:
On two doubly even self-dual binary codes of length 160 and minimum weight 24.
IEEE Transactions on Information Theory 51(1): 408-411 (2005) |
26 | EE | Frans M. J. Willems,
Marten van Dijk:
Capacity and codes for embedding information in gray-scale signals.
IEEE Transactions on Information Theory 51(3): 1209-1214 (2005) |
2004 |
25 | EE | Marten van Dijk,
David P. Woodruff:
Asymptotically Optimal Communication for Torus-Based Cryptography.
CRYPTO 2004: 157-178 |
24 | EE | Blaise Gassend,
Daihyun Lim,
Dwaine E. Clarke,
Marten van Dijk,
Srinivas Devadas:
Identification and authentication of integrated circuits.
Concurrency - Practice and Experience 16(11): 1077-1098 (2004) |
2003 |
23 | EE | Dwaine E. Clarke,
Srinivas Devadas,
Marten van Dijk,
Blaise Gassend,
G. Edward Suh:
Incremental Multiset Hash Functions and Their Application to Memory Integrity Checking.
ASIACRYPT 2003: 188-207 |
22 | EE | Blaise Gassend,
G. Edward Suh,
Dwaine E. Clarke,
Marten van Dijk,
Srinivas Devadas:
Caches and Hash Trees for Efficient Memory Integrity.
HPCA 2003: 295-306 |
21 | EE | G. Edward Suh,
Dwaine E. Clarke,
Blaise Gassend,
Marten van Dijk,
Srinivas Devadas:
AEGIS: architecture for tamper-evident and tamper-resistant processing.
ICS 2003: 160-171 |
20 | EE | G. Edward Suh,
Dwaine E. Clarke,
Blaise Gassend,
Marten van Dijk,
Srinivas Devadas:
Efficient Memory Integrity Verification and Encryption for Secure Processors.
MICRO 2003: 339-350 |
19 | | Blaise Gassend,
Dwaine E. Clarke,
Marten van Dijk,
Srinivas Devadas:
Delay-Based Circuit Authentication and Applications.
SAC 2003: 294-301 |
18 | EE | Pim Tuyls,
Tom A. M. Kevenaar,
Geert Jan Schrijen,
Toine Staring,
Marten van Dijk:
Visual Crypto Displays Enabling Secure Communications.
SPC 2003: 271-284 |
17 | EE | Shengli Liu,
Henk C. A. van Tilborg,
Marten van Dijk:
A Practical Protocol for Advantage Distillation and Information Reconciliation.
Des. Codes Cryptography 30(1): 39-62 (2003) |
16 | | Marten van Dijk,
Sebastian Egner,
Ravi Motwani,
Arie G. C. Koppelaar:
Simultaneous zero-tailing of parallel concatenated codes.
IEEE Transactions on Information Theory 49(9): 2236-2241 (2003) |
2002 |
15 | EE | Blaise Gassend,
Dwaine E. Clarke,
Marten van Dijk,
Srinivas Devadas:
Silicon physical random functions.
ACM Conference on Computer and Communications Security 2002: 148-160 |
14 | EE | Blaise Gassend,
Dwaine E. Clarke,
Marten van Dijk,
Srinivas Devadas:
Controlled Physical Random Functions.
ACSAC 2002: 149-160 |
13 | EE | David P. Woodruff,
Marten van Dijk:
Cryptography in an Unbounded Computational Model.
EUROCRYPT 2002: 149-164 |
12 | EE | Dwaine E. Clarke,
Blaise Gassend,
Thomas Kotwal,
Matt Burnside,
Marten van Dijk,
Srinivas Devadas,
Ronald L. Rivest:
The Untrusted Computer Problem and Camera-Based Authentication.
Pervasive 2002: 114-124 |
2001 |
11 | EE | Margreta Kuijper,
Marten van Dijk,
Henk D. L. Hollmann,
Job Oostveen:
A Unifying System-Theoretic Framework for Errors-and-Erasures Reed-Solomon Decoding.
AAECC 2001: 343-352 |
1999 |
10 | | Marten van Dijk,
Ludo M. G. M. Tolhuizen:
Efficient encoding for a class of subspace subcodes.
IEEE Transactions on Information Theory 45(6): 2142-2146 (1999) |
1998 |
9 | | Ton Kalker,
Jean-Paul M. G. Linnartz,
Marten van Dijk:
Watermark Estimation through Detector Analysis.
ICIP (1) 1998: 425-429 |
8 | EE | Jean-Paul M. G. Linnartz,
Marten van Dijk:
Analysis of the Sensitivity Attack against Electronic Watermarks in Images.
Information Hiding 1998: 258-272 |
7 | | Marten van Dijk,
Christian Gehrmann,
Ben J. M. Smeets:
Unconditionally Secure Group Authentication.
Des. Codes Cryptography 14(3): 281-296 (1998) |
6 | | Marten van Dijk,
Wen-Ai Jackson,
Keith M. Martin:
A General Decomposition Construction for Incomplete Secret Sharing Schemes.
Des. Codes Cryptography 15(3): 301-321 (1998) |
1997 |
5 | | Marten van Dijk:
A Linear Construction of Secret Sharing Schemes.
Des. Codes Cryptography 12(2): 161-201 (1997) |
4 | | Marten van Dijk:
On a special class of broadcast channels with confidential messages.
IEEE Transactions on Information Theory 43(2): 712-714 (1997) |
3 | EE | Marten van Dijk:
More Information Theoretical Inequalities to be Used in Secret Sharing?
Inf. Process. Lett. 63(1): 41-44 (1997) |
1995 |
2 | | Marten van Dijk:
On the Information Rate of Perfect Secret Sharing Schemes.
Des. Codes Cryptography 6(2): 143-169 (1995) |
1994 |
1 | EE | Marten van Dijk:
A Linear Construction of Perfect Secret Sharing Schemes.
EUROCRYPT 1994: 23-34 |