Marten van Dijk
Orcid: 0000-0001-9388-8050
According to our database1,
Marten van Dijk
authored at least 163 papers
between 1994 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
IEEE Trans. Dependable Secur. Comput., 2024
ERCIM News, 2024
Proceedings of the Forty-first International Conference on Machine Learning, 2024
Proceedings of the IEEE International Symposium on Hardware Oriented Security and Trust, 2024
PG: Byzantine Fault-Tolerant and Privacy-Preserving Sensor Fusion with Guaranteed Output Delivery.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
2023
A Theoretical Framework for the Analysis of Physical Unclonable Function Interfaces and Its Relation to the Random Oracle Model.
J. Cryptol., October, 2023
CoRR, 2023
Batch Clipping and Adaptive Layerwise Clipping for Differential Private Stochastic Gradient Descent.
CoRR, 2023
CoRR, 2023
2022
TREVERSE: TRial-and-Error Lightweight Secure ReVERSE Authentication With Simulatable PUFs.
IEEE Trans. Dependable Secur. Comput., 2022
J. Cryptogr. Eng., 2022
CoRR, 2022
CoRR, 2022
IEEE Access, 2022
Back in Black: A Comparative Evaluation of Recent State-Of-The-Art Black-Box Attacks.
IEEE Access, 2022
Proceedings of the 2022 Workshop on Attacks and Solutions in Hardware Security, 2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
2021
J. Mach. Learn. Res., 2021
IACR Cryptol. ePrint Arch., 2021
Autonomous Secure Remote Attestation even when all Used and to be Used Digital Keys Leak.
IACR Cryptol. ePrint Arch., 2021
Entropy, 2021
Proceedings of the 2021 IEEE/CVF International Conference on Computer Vision, 2021
Proceedings of the 24th International Conference on Artificial Intelligence and Statistics, 2021
2020
IEEE Trans. Dependable Secur. Comput., 2020
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2020
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2020
Asynchronous Federated Learning with Reduced Number of Rounds and with Differential Privacy from Less Aggregated Gaussian Noise.
CoRR, 2020
CoRR, 2020
Proceedings of the 2020 Design, Automation & Test in Europe Conference & Exhibition, 2020
Proceedings of the 4th ACM Workshop on Attacks and Solutions in Hardware Security Workshop, 2020
Proceedings of the 23rd International Conference on Artificial Intelligence and Statistics, 2020
2019
IEEE Trans. Dependable Secur. Comput., 2019
IEEE Trans. Dependable Secur. Comput., 2019
IEEE Trans. Dependable Secur. Comput., 2019
IEEE Trans. Dependable Secur. Comput., 2019
The Interpose PUF: Secure PUF Design against State-of-the-art Machine Learning Attacks.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2019
J. Mach. Learn. Res., 2019
Cryptogr., 2019
CoRR, 2019
On the Convergence Rates of Learning-based Signature Generation Schemes to Contain Self-propagating Malware.
CoRR, 2019
Tight Dimension Independent Lower Bound on the Expected Convergence Rate for Diminishing Step Sizes in SGD.
Proceedings of the Advances in Neural Information Processing Systems 32: Annual Conference on Neural Information Processing Systems 2019, 2019
Proceedings of the 20th International Workshop on Microprocessor/SoC Test, 2019
Characterization of Convex Objective Functions and Optimal Expected Convergence Rates for SGD.
Proceedings of the 36th International Conference on Machine Learning, 2019
Proceedings of the 2019 ACM SIGSAC Conference on Cloud Computing Security Workshop, 2019
Proceedings of the 35th Annual Computer Security Applications Conference, 2019
2018
IACR Cryptol. ePrint Arch., 2018
IACR Cryptol. ePrint Arch., 2018
IACR Cryptol. ePrint Arch., 2018
Tight Dimension Independent Lower Bound on Optimal Expected Convergence Rate for Diminishing Step Sizes in SGD.
CoRR, 2018
TREVERSE: Trial-and-Error Lightweight Secure Reverse Authentication with Simulatable PUFs.
CoRR, 2018
Snapshotter: Lightweight intrusion detection and prevention system for industrial control systems.
Proceedings of the IEEE Industrial Cyber-Physical Systems, 2018
Proceedings of the 35th International Conference on Machine Learning, 2018
Proceedings of the 36th IEEE International Conference on Computer Design, 2018
2017
Trapdoor Computational Fuzzy Extractors and Stateless Cryptographically-Secure Physical Unclonable Functions.
IEEE Trans. Dependable Secur. Comput., 2017
IACR Cryptol. ePrint Arch., 2017
IACR Cryptol. ePrint Arch., 2017
FPGA Implementation of a Cryptographically-Secure PUF Based on Learning Parity with Noise.
Cryptogr., 2017
Revisiting Definitional Foundations of Oblivious RAM for Secure Processor Implementations.
CoRR, 2017
Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies, 2017
Proceedings of the IEEE 60th International Midwest Symposium on Circuits and Systems, 2017
Proceedings of the 2017 IEEE International Symposium on Hardware Oriented Security and Trust, 2017
Proceedings of the 2nd Workshop on Cyber-Physical Security and Resilience in Smart Grids, 2017
Proceedings of the 2017 Workshop on Attacks and Solutions in Hardware Security, 2017
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
2016
LightSource: Ultra Lightweight Clone Detection of RFID Tags from Software Unclonable Responses.
IACR Cryptol. ePrint Arch., 2016
Flat ORAM: A Simplified Write-Only Oblivious RAM Construction for Secure Processor Architectures.
CoRR, 2016
Proceedings of the Theory of Cryptography - 13th International Conference, 2016
Proceedings of the 2016 ACM Workshop on Moving Target Defense, 2016
2015
PLayPUF: Programmable Logically Erasable PUFs for Forward and Backward Secure Key Management.
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
Onion ORAM: A Constant Bandwidth and Constant Client Storage ORAM (without FHE or SWHE).
IACR Cryptol. ePrint Arch., 2015
Proceedings of the 24th USENIX Security Symposium, 2015
Proceedings of the 42nd Annual International Symposium on Computer Architecture, 2015
Exploring the performance implications of memory safety primitives in many-core processors executing multi-threaded workloads.
Proceedings of the Fourth Workshop on Hardware and Architectural Support for Security and Privacy, 2015
Virtual Fingerprint - Image-Based Authentication Increases Privacy for Users of Mouse-Replacement Interfaces.
Proceedings of the Universal Access in Human-Computer Interaction. Access to the Human Environment and Culture, 2015
Proceedings of the 23rd IEEE Annual International Symposium on Field-Programmable Custom Computing Machines, 2015
Proceedings of the 5th International Workshop on Trustworthy Embedded Devices, 2015
Freecursive ORAM: [Nearly] Free Recursion and Integrity Verification for Position-based Oblivious RAM.
Proceedings of the Twentieth International Conference on Architectural Support for Programming Languages and Operating Systems, 2015
2014
IACR Cryptol. ePrint Arch., 2014
IACR Cryptol. ePrint Arch., 2014
IACR Cryptol. ePrint Arch., 2014
RAW Path ORAM: A Low-Latency, Low-Area Hardware ORAM Controller with Integrity Verification.
IACR Cryptol. ePrint Arch., 2014
Proceedings of the IEEE Computer Society Annual Symposium on VLSI, 2014
Author retrospective AEGIS: architecture for tamper-evident and tamper-resistant processing.
Proceedings of the ACM International Conference on Supercomputing 25th Anniversary Volume, 2014
Suppressing the Oblivious RAM timing channel while making information leakage and program efficiency trade-offs.
Proceedings of the 20th IEEE International Symposium on High Performance Computer Architecture, 2014
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2014
2013
On the practical use of physical unclonable functions in oblivious transfer and bit commitment protocols.
J. Cryptogr. Eng., 2013
IACR Cryptol. ePrint Arch., 2013
Design Space Exploration and Optimization of Path Oblivious RAM in Secure Processors.
IACR Cryptol. ePrint Arch., 2013
Proceedings of the 2013 IEEE Symposium on Security and Privacy, 2013
Proceedings of the IEEE High Performance Extreme Computing Conference, 2013
Generalized external interaction with tamper-resistant hardware with bounded information leakage.
Proceedings of the CCSW'13, 2013
2012
IACR Cryptol. ePrint Arch., 2012
Physical Unclonable Functions in Cryptographic Protocols: Security Proofs and Impossibility Results.
IACR Cryptol. ePrint Arch., 2012
IACR Cryptol. ePrint Arch., 2012
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2012, 2012
Proceedings of the 2012 ACM Workshop on Cloud computing security, 2012
Proceedings of the ACM Conference on Computer and Communications Security, 2012
2011
IACR Cryptol. ePrint Arch., 2011
Proceedings of the International Conference on Human Factors in Computing Systems, 2011
2010
IACR Cryptol. ePrint Arch., 2010
IACR Cryptol. ePrint Arch., 2010
2009
Proceedings of the 36th International Symposium on Computer Architecture (ISCA 2009), 2009
2008
ACM Trans. Inf. Syst. Secur., 2008
Proceedings of the 2008 ACM Symposium on Applied Computing (SAC), 2008
Proceedings of the Smart Card Research and Advanced Applications, 2008
2007
BMC Bioinform., 2007
Proceedings of the 2nd ACM Workshop on Scalable Trusted Computing, 2007
2006
Improved constructions of secret sharing schemes by applying (lambda, omega)-decompositions.
Inf. Process. Lett., 2006
Des. Codes Cryptogr., 2006
Predicting Secondary Structure of All-Helical Proteins Using Hidden Markov Support Vector Machines.
Proceedings of the Pattern Recognition in Bioinformatics, International Workshop, 2006
Virtual monotonic counters and count-limited objects using a TPM without a trusted OS.
Proceedings of the 1st ACM Workshop on Scalable Trusted Computing, 2006
2005
IEEE Trans. Very Large Scale Integr. Syst., 2005
IEEE Trans. Inf. Theory, 2005
IEEE Trans. Inf. Theory, 2005
Proceedings of the 2005 IEEE Symposium on Security and Privacy (S&P 2005), 2005
Proceedings of the 13th European Signal Processing Conference, 2005
2004
Proceedings of the Advances in Cryptology, 2004
2003
IEEE Trans. Inf. Theory, 2003
IACR Cryptol. ePrint Arch., 2003
Eur. Trans. Telecommun., 2003
Des. Codes Cryptogr., 2003
Proceedings of the 2003 ACM Symposium on Applied Computing (SAC), 2003
Proceedings of the 36th Annual International Symposium on Microarchitecture, 2003
Proceedings of the 17th Annual International Conference on Supercomputing, 2003
Proceedings of the Ninth International Symposium on High-Performance Computer Architecture (HPCA'03), 2003
Incremental Multiset Hash Functions and Their Application to Memory Integrity Checking.
Proceedings of the Advances in Cryptology - ASIACRYPT 2003, 9th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, November 30, 2003
2002
Proceedings of the Pervasive Computing, 2002
Proceedings of the Advances in Cryptology - EUROCRYPT 2002, International Conference on the Theory and Applications of Cryptographic Techniques, Amsterdam, The Netherlands, April 28, 2002
Proceedings of the 9th ACM Conference on Computer and Communications Security, 2002
Proceedings of the 18th Annual Computer Security Applications Conference (ACSAC 2002), 2002
2001
Proceedings of the Applied Algebra, 2001
1999
1998
Des. Codes Cryptogr., 1998
Proceedings of the Information Hiding, 1998
Proceedings of the 1998 IEEE International Conference on Image Processing, 1998
1997
IEEE Trans. Inf. Theory, 1997
Inf. Process. Lett., 1997
1995
Des. Codes Cryptogr., 1995
1994
Proceedings of the Advances in Cryptology, 1994