Marten van Dijk

Orcid: 0000-0001-9388-8050

According to our database1, Marten van Dijk authored at least 158 papers between 1994 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Quantifying and Mitigating Privacy Risks for Tabular Generative Models.
CoRR, 2024

2023
A Theoretical Framework for the Analysis of Physical Unclonable Function Interfaces and Its Relation to the Random Oracle Model.
J. Cryptol., October, 2023

Recursive Augmented Fernet (RAF) Token: Alleviating the Pain of Stolen Tokens.
CoRR, 2023

Breaking XOR Arbiter PUFs without Reliability Information.
CoRR, 2023

Batch Clipping and Adaptive Layerwise Clipping for Differential Private Stochastic Gradient Descent.
CoRR, 2023

Considerations on the Theory of Training Models with Differential Privacy.
CoRR, 2023

2022
TREVERSE: TRial-and-Error Lightweight Secure ReVERSE Authentication With Simulatable PUFs.
IEEE Trans. Dependable Secur. Comput., 2022

Programmable access-controlled and generic erasable PUF design and its applications.
J. Cryptogr. Eng., 2022

Generalizing DP-SGD with Shuffling and Batching Clipping.
CoRR, 2022

Game Theoretic Mixed Experts for Combinational Adversarial Machine Learning.
CoRR, 2022

Finite-Sum Optimization: A New Perspective for Convergence to a Global Solution.
CoRR, 2022

Secure Remote Attestation with Strong Key Insulation Guarantees.
CoRR, 2022

Finite-sum smooth optimization with SARAH.
Comput. Optim. Appl., 2022

Besting the Black-Box: Barrier Zones for Adversarial Example Defense.
IEEE Access, 2022

Back in Black: A Comparative Evaluation of Recent State-Of-The-Art Black-Box Attacks.
IEEE Access, 2022

Towards Remote Verifiable Computation without Digital Secrets.
Proceedings of the 2022 Workshop on Attacks and Solutions in Hardware Security, 2022

CCSW '22: The 2022 Cloud Computing Security Workshop.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
A Unified Convergence Analysis for Shuffling-Type Gradient Methods.
J. Mach. Learn. Res., 2021

Bilinear Map Based One-Time Signature Scheme with Secret Key Exposure.
IACR Cryptol. ePrint Arch., 2021

Autonomous Secure Remote Attestation even when all Used and to be Used Digital Keys Leak.
IACR Cryptol. ePrint Arch., 2021

Beware the Black-Box: On the Robustness of Recent Defenses to Adversarial Examples.
Entropy, 2021

Differential Private Hogwild! over Distributed Local Data Sets.
CoRR, 2021

On the Robustness of Vision Transformers to Adversarial Examples.
Proceedings of the 2021 IEEE/CVF International Conference on Computer Vision, 2021

Hogwild! over Distributed Local Data Sets with Linearly Increasing Mini-Batch Sizes.
Proceedings of the 24th International Conference on Artificial Intelligence and Statistics, 2021

2020
Connecting the Dots: Privacy Leakage via Write-Access Patterns to the Main Memory.
IEEE Trans. Dependable Secur. Comput., 2020

Splitting the Interpose PUF: A Novel Modeling Attack Strategy.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2020

A Retrospective on Path ORAM.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2020

Asynchronous Federated Learning with Reduced Number of Rounds and with Differential Privacy from Less Aggregated Gaussian Noise.
CoRR, 2020

Beware the Black-Box: on the Robustness of Recent Defenses to Adversarial Examples.
CoRR, 2020

Using Universal Composition to Design and Analyze Secure Complex Hardware Systems.
Proceedings of the 2020 Design, Automation & Test in Europe Conference & Exhibition, 2020

Erasable PUFs: Formal Treatment and Generic Design.
Proceedings of the 4th ACM Workshop on Attacks and Solutions in Hardware Security Workshop, 2020

A Hybrid Stochastic Policy Gradient Algorithm for Reinforcement Learning.
Proceedings of the 23rd International Conference on Artificial Intelligence and Statistics, 2020

2019
Design and Implementation of the Ascend Secure Processor.
IEEE Trans. Dependable Secur. Comput., 2019

Advancing the State-of-the-Art in Hardware Trojans Detection.
IEEE Trans. Dependable Secur. Comput., 2019

Emerging Attacks and Solutions for Secure Hardware in the Internet of Things.
IEEE Trans. Dependable Secur. Comput., 2019

The Interpose PUF: Secure PUF Design against State-of-the-art Machine Learning Attacks.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2019

New Convergence Aspects of Stochastic Gradient Algorithms.
J. Mach. Learn. Res., 2019

Flat ORAM: A Simplified Write-Only Oblivious RAM Construction for Secure Processors.
Cryptogr., 2019

BUZz: BUffer Zones for defending adversarial examples in image classification.
CoRR, 2019

On the Convergence Rates of Learning-based Signature Generation Schemes to Contain Self-propagating Malware.
CoRR, 2019

Optimal Finite-Sum Smooth Non-Convex Optimization with SARAH.
CoRR, 2019

Toward a Theory of Cyber Attacks.
CoRR, 2019

Tight Dimension Independent Lower Bound on the Expected Convergence Rate for Diminishing Step Sizes in SGD.
Proceedings of the Advances in Neural Information Processing Systems 32: Annual Conference on Neural Information Processing Systems 2019, 2019

Multilayer Camouflaged Secure Boot for SoCs.
Proceedings of the 20th International Workshop on Microprocessor/SoC Test, 2019

Characterization of Convex Objective Functions and Optimal Expected Convergence Rates for SGD.
Proceedings of the 36th International Conference on Machine Learning, 2019

MalPro: A Learning-based Malware Propagation and Containment Modeling.
Proceedings of the 2019 ACM SIGSAC Conference on Cloud Computing Security Workshop, 2019

Proof of aliveness.
Proceedings of the 35th Annual Computer Security Applications Conference, 2019

2018
Path ORAM: An Extremely Simple Oblivious RAM Protocol.
J. ACM, 2018

PwoP: Intrusion-Tolerant and Privacy-Preserving Sensor Fusion.
IACR Cryptol. ePrint Arch., 2018

On the Universally Composable Security of OpenStack.
IACR Cryptol. ePrint Arch., 2018

Efficient Erasable PUFs from Programmable Logic and Memristors.
IACR Cryptol. ePrint Arch., 2018

Tight Dimension Independent Lower Bound on Optimal Expected Convergence Rate for Diminishing Step Sizes in SGD.
CoRR, 2018

TREVERSE: Trial-and-Error Lightweight Secure Reverse Authentication with Simulatable PUFs.
CoRR, 2018

Comments on "Defeating HaTCh: Building Malicious IP Cores".
CoRR, 2018

Snapshotter: Lightweight intrusion detection and prevention system for industrial control systems.
Proceedings of the IEEE Industrial Cyber-Physical Systems, 2018

SGD and Hogwild! Convergence Without the Bounded Gradients Assumption.
Proceedings of the 35th International Conference on Machine Learning, 2018

Breaking the Oblivious-RAM Bandwidth Wall.
Proceedings of the 36th IEEE International Conference on Computer Design, 2018

2017
Trapdoor Computational Fuzzy Extractors and Stateless Cryptographically-Secure Physical Unclonable Functions.
IEEE Trans. Dependable Secur. Comput., 2017

MXPUF: Secure PUF Design against State-of-the-art Modeling Attacks.
IACR Cryptol. ePrint Arch., 2017

Public Key Cryptosystems with Noisy Secret Keys.
IACR Cryptol. ePrint Arch., 2017

Weak-Unforgeable Tags for Secure Supply Chain Management.
IACR Cryptol. ePrint Arch., 2017

FPGA Implementation of a Cryptographically-Secure PUF Based on Learning Parity with Noise.
Cryptogr., 2017

Intrinsically Reliable and Lightweight Physical Obfuscated Keys.
CoRR, 2017

Revisiting Definitional Foundations of Oblivious RAM for Secure Processor Implementations.
CoRR, 2017

Leveraging Hardware Isolation for Process Level Access Control & Authentication.
Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies, 2017

Advancing the state-of-the-art in hardware Trojans design.
Proceedings of the IEEE 60th International Midwest Symposium on Circuits and Systems, 2017

New clone-detection approach for RFID-based supply chains.
Proceedings of the 2017 IEEE International Symposium on Hardware Oriented Security and Trust, 2017

Mitigating Synchronized Hardware Trojan Attacks in Smart Grids.
Proceedings of the 2nd Workshop on Cyber-Physical Security and Resilience in Smart Grids, 2017

SoK: RFID-based Clone Detection Mechanisms for Supply Chains.
Proceedings of the 2017 Workshop on Attacks and Solutions in Hardware Security, 2017

ASHES 2017: Workshop on Attacks and Solutions in Hardware Security.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2016
Markov Modeling of Moving Target Defense Games.
IACR Cryptol. ePrint Arch., 2016

LightSource: Ultra Lightweight Clone Detection of RFID Tags from Software Unclonable Responses.
IACR Cryptol. ePrint Arch., 2016

Flat ORAM: A Simplified Write-Only Oblivious RAM Construction for Secure Processor Architectures.
CoRR, 2016

Onion ORAM: A Constant Bandwidth Blowup Oblivious RAM.
Proceedings of the Theory of Cryptography - 13th International Conference, 2016

Markov Modeling of Moving Target Defense Games.
Proceedings of the 2016 ACM Workshop on Moving Target Defense, 2016

2015
PLayPUF: Programmable Logically Erasable PUFs for Forward and Backward Secure Key Management.
IACR Cryptol. ePrint Arch., 2015

Secure and Efficient Initialization and Authentication Protocols for SHIELD.
IACR Cryptol. ePrint Arch., 2015

M-MAP: Multi-Factor Memory Authentication for Secure Embedded Processors.
IACR Cryptol. ePrint Arch., 2015

Onion ORAM: A Constant Bandwidth and Constant Client Storage ORAM (without FHE or SWHE).
IACR Cryptol. ePrint Arch., 2015

Constants Count: Practical Improvements to Oblivious RAM.
Proceedings of the 24th USENIX Security Symposium, 2015

PrORAM: dynamic prefetcher for oblivious RAM.
Proceedings of the 42nd Annual International Symposium on Computer Architecture, 2015

Exploring the performance implications of memory safety primitives in many-core processors executing multi-threaded workloads.
Proceedings of the Fourth Workshop on Hardware and Architectural Support for Security and Privacy, 2015

Virtual Fingerprint - Image-Based Authentication Increases Privacy for Users of Mouse-Replacement Interfaces.
Proceedings of the Universal Access in Human-Computer Interaction. Access to the Human Environment and Culture, 2015

A Low-Latency, Low-Area Hardware Oblivious RAM Controller.
Proceedings of the 23rd IEEE Annual International Symposium on Field-Programmable Custom Computing Machines, 2015

Hardware Security and its Adversaries.
Proceedings of the 5th International Workshop on Trustworthy Embedded Devices, 2015

Freecursive ORAM: [Nearly] Free Recursion and Integrity Verification for Position-based Oblivious RAM.
Proceedings of the Twentieth International Conference on Architectural Support for Programming Languages and Operating Systems, 2015

2014
Enhancing Oblivious RAM Performance Using Dynamic Prefetching.
IACR Cryptol. ePrint Arch., 2014

Unified Oblivious-RAM: Improving Recursive ORAM with Locality and Pseudorandomness.
IACR Cryptol. ePrint Arch., 2014

Ring ORAM: Closing the Gap Between Small and Large Client Storage Oblivious RAM.
IACR Cryptol. ePrint Arch., 2014

Trapdoor Computational Fuzzy Extractors.
IACR Cryptol. ePrint Arch., 2014

HaTCh: Hardware Trojan Catcher.
IACR Cryptol. ePrint Arch., 2014

RAW Path ORAM: A Low-Latency, Low-Area Hardware ORAM Controller with Integrity Verification.
IACR Cryptol. ePrint Arch., 2014

PUF Interfaces and their Security.
Proceedings of the IEEE Computer Society Annual Symposium on VLSI, 2014

Author retrospective AEGIS: architecture for tamper-evident and tamper-resistant processing.
Proceedings of the ACM International Conference on Supercomputing 25th Anniversary Volume, 2014

Suppressing the Oblivious RAM timing channel while making information leakage and program efficiency trade-offs.
Proceedings of the 20th IEEE International Symposium on High Performance Computer Architecture, 2014

Protocol attacks on advanced PUF protocols and countermeasures.
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2014

2013
FlipIt: The Game of "Stealthy Takeover".
J. Cryptol., 2013

On the practical use of physical unclonable functions in oblivious transfer and bit commitment protocols.
J. Cryptogr. Eng., 2013

Path ORAM: An Extremely Simple Oblivious RAM Protocol.
IACR Cryptol. ePrint Arch., 2013

Design Space Exploration and Optimization of Path Oblivious RAM in Secure Processors.
IACR Cryptol. ePrint Arch., 2013

PUFs in Security Protocols: Attack Models and Security Evaluations.
Proceedings of the 2013 IEEE Symposium on Security and Privacy, 2013

Integrity verification for path Oblivious-RAM.
Proceedings of the IEEE High Performance Extreme Computing Conference, 2013

Generalized external interaction with tamper-resistant hardware with bounded information leakage.
Proceedings of the CCSW'13, 2013

2012
Compilation Techniques for Efficient Encrypted Computation.
IACR Cryptol. ePrint Arch., 2012

Physical Unclonable Functions in Cryptographic Protocols: Security Proofs and Impossibility Results.
IACR Cryptol. ePrint Arch., 2012

Defending Against the Unknown Enemy: Applying FlipIt to System Security.
IACR Cryptol. ePrint Arch., 2012

Practical Security Analysis of PUF-Based Two-Player Protocols.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2012, 2012

Towards an interpreter for efficient encrypted computation.
Proceedings of the 2012 ACM Workshop on Cloud computing security, 2012

Hourglass schemes: how to prove that cloud files are encrypted.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

2011
Iris: A Scalable Cloud File System with Efficient Integrity Checks.
IACR Cryptol. ePrint Arch., 2011

Exploring implicit memory for painless password recovery.
Proceedings of the International Conference on Human Factors in Computing Systems, 2011

2010
On the Impossibility of Cryptography Alone for Privacy-Preserving Cloud Computing.
IACR Cryptol. ePrint Arch., 2010

How to Tell if Your Cloud Files Are Vulnerable to Drive Crashes.
IACR Cryptol. ePrint Arch., 2010

2009
Fully Homomorphic Encryption over the Integers.
IACR Cryptol. ePrint Arch., 2009

Application-aware deadlock-free oblivious routing.
Proceedings of the 36th International Symposium on Computer Architecture (ISCA 2009), 2009

2008
Controlled physical random functions and applications.
ACM Trans. Inf. Syst. Secur., 2008

Offline count-limited certificates.
Proceedings of the 2008 ACM Symposium on Applied Computing (SAC), 2008

The Trusted Execution Module: Commodity General-Purpose Trusted Computing.
Proceedings of the Smart Card Research and Advanced Applications, 2008

2007
Learning biophysically-motivated parameters for alpha helix prediction.
BMC Bioinform., 2007

Offline untrusted storage with immediate detection of forking and replay attacks.
Proceedings of the 2nd ACM Workshop on Scalable Trusted Computing, 2007

2006
Improved constructions of secret sharing schemes by applying (lambda, omega)-decompositions.
Inf. Process. Lett., 2006

Speeding up Exponentiation using an Untrusted Computational Resource.
Des. Codes Cryptogr., 2006

Knowledge Flow Analysis for Security Protocols
CoRR, 2006

A Generalized Two-Phase Analysis of Knowledge Flows in Security Protocols
CoRR, 2006

Predicting Secondary Structure of All-Helical Proteins Using Hidden Markov Support Vector Machines.
Proceedings of the Pattern Recognition in Bioinformatics, International Workshop, 2006

Virtual monotonic counters and count-limited objects using a TPM without a trusted OS.
Proceedings of the 1st ACM Workshop on Scalable Trusted Computing, 2006

2005
Extracting secret keys from integrated circuits.
IEEE Trans. Very Large Scale Integr. Syst., 2005

Capacity and codes for embedding information in gray-scale signals.
IEEE Trans. Inf. Theory, 2005

On two doubly even self-dual binary codes of length 160 and minimum weight 24.
IEEE Trans. Inf. Theory, 2005

Towards Constant Bandwidth Overhead Integrity Checking of Untrusted Data.
Proceedings of the 2005 IEEE Symposium on Security and Privacy (S&P 2005), 2005

Secure biometrics.
Proceedings of the 13th European Signal Processing Conference, 2005

2004
Practical Cryptography in High Dimensional Tori.
IACR Cryptol. ePrint Arch., 2004

Identification and authentication of integrated circuits.
Concurr. Pract. Exp., 2004

Asymptotically Optimal Communication for Torus-Based Cryptography.
Proceedings of the Advances in Cryptology, 2004

2003
Simultaneous zero-tailing of parallel concatenated codes.
IEEE Trans. Inf. Theory, 2003

Visual Crypto Displays Enabling Secure Communications.
IACR Cryptol. ePrint Arch., 2003

Correcting systematic mismatches in computed log-likelihood ratios.
Eur. Trans. Telecommun., 2003

A Practical Protocol for Advantage Distillation and Information Reconciliation.
Des. Codes Cryptogr., 2003

Delay-Based Circuit Authentication and Applications.
Proceedings of the 2003 ACM Symposium on Applied Computing (SAC), 2003

Efficient Memory Integrity Verification and Encryption for Secure Processors.
Proceedings of the 36th Annual International Symposium on Microarchitecture, 2003

AEGIS: architecture for tamper-evident and tamper-resistant processing.
Proceedings of the 17th Annual International Conference on Supercomputing, 2003

Caches and Hash Trees for Efficient Memory Integrity Verification.
Proceedings of the Ninth International Symposium on High-Performance Computer Architecture (HPCA'03), 2003

Incremental Multiset Hash Functions and Their Application to Memory Integrity Checking.
Proceedings of the Advances in Cryptology - ASIACRYPT 2003, 9th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, November 30, 2003

2002
The Untrusted Computer Problem and Camera-Based Authentication.
Proceedings of the Pervasive Computing, 2002

Cryptography in an Unbounded Computational Model.
Proceedings of the Advances in Cryptology - EUROCRYPT 2002, International Conference on the Theory and Applications of Cryptographic Techniques, Amsterdam, The Netherlands, April 28, 2002

Silicon physical random functions.
Proceedings of the 9th ACM Conference on Computer and Communications Security, 2002

Controlled Physical Random Functions.
Proceedings of the 18th Annual Computer Security Applications Conference (ACSAC 2002), 2002

2001
A Unifying System-Theoretic Framework for Errors-and-Erasures Reed-Solomon Decoding.
Proceedings of the Applied Algebra, 2001

1999
Efficient encoding for a class of subspace subcodes.
IEEE Trans. Inf. Theory, 1999

1998
A General Decomposition Construction for Incomplete Secret Sharing Schemes.
Des. Codes Cryptogr., 1998

Unconditionally Secure Group Authentication.
Des. Codes Cryptogr., 1998

Analysis of the Sensitivity Attack against Electronic Watermarks in Images.
Proceedings of the Information Hiding, 1998

Watermark Estimation through Detector Analysis.
Proceedings of the 1998 IEEE International Conference on Image Processing, 1998

1997
On a special class of broadcast channels with confidential messages.
IEEE Trans. Inf. Theory, 1997

More Information Theoretical Inequalities to be Used in Secret Sharing?
Inf. Process. Lett., 1997

A Linear Construction of Secret Sharing Schemes.
Des. Codes Cryptogr., 1997

1995
On the Information Rate of Perfect Secret Sharing Schemes.
Des. Codes Cryptogr., 1995

1994
A Linear Construction of Perfect Secret Sharing Schemes.
Proceedings of the Advances in Cryptology, 1994


  Loading...