Volgen
Marten van Dijk
Marten van Dijk
Computer Security, CWI, Amsterdam; Vrije Universiteit van Amsterdam; ECE Department UConn
Geen geverifieerd e-mailadres - Homepage
Titel
Geciteerd door
Geciteerd door
Jaar
Fully homomorphic encryption over the integers
M Van Dijk, C Gentry, S Halevi, V Vaikuntanathan
Advances in Cryptology–EUROCRYPT 2010: 29th Annual International Conference …, 2010
25332010
Silicon physical random functions
B Gassend, D Clarke, M Van Dijk, S Devadas
Proceedings of the 9th ACM Conference on Computer and Communications …, 2002
20922002
Extracting secret keys from integrated circuits
D Lim, JW Lee, B Gassend, GE Suh, M Van Dijk, S Devadas
IEEE Transactions on Very Large Scale Integration (VLSI) Systems 13 (10 …, 2005
12722005
Path ORAM: an extremely simple oblivious RAM protocol
E Stefanov, M Dijk, E Shi, THH Chan, C Fletcher, L Ren, X Yu, S Devadas
Journal of the ACM (JACM) 65 (4), 1-26, 2018
11862018
A technique to build a secret key in integrated circuits for identification and authentication applications
JW Lee, D Lim, B Gassend, GE Suh, M Van Dijk, S Devadas
2004 Symposium on VLSI Circuits. Digest of Technical Papers (IEEE Cat. No …, 2004
11252004
AEGIS: Architecture for tamper-evident and tamper-resistant processing
GE Suh, D Clarke, B Gassend, M Van Dijk, S Devadas
ACM International Conference on Supercomputing 25th Anniversary Volume, 357-368, 2003
8532003
Controlled physical random functions
B Gassend, D Clarke, M Van Dijk, S Devadas
18th Annual Computer Security Applications Conference, 2002. Proceedings …, 2002
5422002
Efficient memory integrity verification and encryption for secure processors
GE Suh, D Clarke, B Gasend, M Van Dijk, S Devadas
Proceedings. 36th Annual IEEE/ACM International Symposium on …, 2003
4072003
Identification and authentication of integrated circuits
B Gassend, D Lim, D Clarke, M Van Dijk, S Devadas
Concurrency and Computation: Practice and Experience 16 (11), 1077-1098, 2004
4012004
Caches and hash trees for efficient memory integrity verification
B Gassend, GE Suh, D Clarke, M Van Dijk, S Devadas
The Ninth International Symposium on High-Performance Computer Architecture …, 2003
3962003
On the impossibility of cryptography alone for {Privacy-Preserving} cloud computing
M Van Dijk, A Juels
5th USENIX Workshop on Hot Topics in Security (HotSec 10), 2010
3562010
FlipIt: The Game of “Stealthy Takeover”
M Van Dijk, A Juels, A Oprea, RL Rivest
Journal of Cryptology 26, 655-713, 2013
3182013
Authentication of integrated circuits
D Clarke, B Gassend, M Van Dijk, S Devadas
US Patent 7,840,803, 2010
2632010
Iris: A scalable cloud file system with efficient integrity checks
E Stefanov, M van Dijk, A Juels, A Oprea
Proceedings of the 28th Annual Computer Security Applications Conference …, 2012
2452012
A secure processor architecture for encrypted computation on untrusted programs
CW Fletcher, M Dijk, S Devadas
Proceedings of the seventh ACM workshop on Scalable trusted computing, 3-8, 2012
2342012
SGD and Hogwild! convergence without the bounded gradients assumption
L Nguyen, PH Nguyen, M Dijk, P Richtárik, K Scheinberg, M Takác
International Conference on Machine Learning, 3750-3758, 2018
2232018
On the information rate of perfect secret sharing schemes
M Van Dijk
Designs, codes and cryptography 6 (2), 143-169, 1995
2131995
Analysis of the sensitivity attack against electronic watermarks in images
JPMG Linnartz, M Van Dijk
Information Hiding: Second International Workshop, IH’98 Portland, Oregon …, 1998
2111998
Constants count: Practical improvements to oblivious {RAM}
L Ren, C Fletcher, A Kwon, E Stefanov, E Shi, M Van Dijk, S Devadas
24th USENIX Security Symposium (USENIX Security 15), 415-430, 2015
2082015
Optical disc system for digital video recording
T Narahara, S Kobayashi, M Hattori, Y Shimpuku, ...
Japanese Journal of Applied Physics 39 (2S), 912, 2000
2072000
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20