Publications

Journal Papers

M. van Dijk, On the Information Rate of Perfect Secret Sharing Schemes, Designs, Codes, and Cryptography 6(2), 143-169, 1995, preliminary versions appeared in the Proceedings of the 2nd International Winter Meeting on Coding and Information Theory, December 12 - 15, p. 27, 1993, and in the Proceedings of ISIT'94,  June 27 - July 1, p. 489, 1994.

M. van Dijk, W.-A. Jackson, and K.M. Martin, A note on duality in linear secret sharing scheme, Bull. of the Institute of Combinatorics and its Applications 19, 93-101, 1997.

M. van Dijk, On a special class of broadcast channels with confidential messages, IEEE Trans. on Inform. Theory 43(2), 712-714, 1997.

M. van Dijk, More information theoretical inequalities to be used in secret sharing, Information Processing Letters 63(1), 41-44, 1997.

M. van Dijk, A linear construction of secret sharing schemes, Designs, Codes and Cryptography 12(2), 161-201, 1997.

M. van Dijk, W.-A. Jackson, and K. Martin, A general decomposition construction for incomplete secret sharing   schemes, Designs, Codes and Cryptography 15(3), 301-321, 1998.

M. van Dijk, C. Gehrmann, and B. Smeets, Unconditionally Secure Group Authentication, Designs, Codes and Cryptography 14(3), 281-296, 1998.

M. van Dijk and L. Tolhuizen, Efficient encoding for a class of subspace subcodes, IEEE Trans. on Inform. Theory 45, 2142-2146, 1999.

T. Narahara, S. Kobayashi, M. Hattori, Y. Shimpuku, G.J. van den Enden, J.A.H.M. Kahlman, M. van Dijk, and R. van Woudenberg, Optical Disc System for Digital Video Recording, Jpn. J. Appl. Phys. Vol.39 (2000), Part 1, No. 2B,  912-919, February 2000.  An abstract has been published in the Proc. of ODS/ISOM, Hawaii, July, 1999.

W. Coene, H. Pozidis, M. van Dijk, J. Kahlman, R. van Woudenberg, and B. Stek, Channel coding and signal processing for optical recording systems beyond DVD, IEEE Trans. on Magn., Vol.37 (2001), Issue 2, Part 1,  682-688, March 2001.

S. Liu, H.C.A. van Tilborg, and M. van Dijk, A practical protocol for advantage distillation and information reconciliation, Designs, Codes and Cryptography 30(1), p. 39-62, 2003.

M. van Dijk, A.J.E.M. Janssen, and A. Koppelaar, Correcting systematic mismatches in computed log-likelihood ratios, European Transactions on Telecommunications 14, p. 227-244, 2003.

M. van Dijk, S. Egner, R. Motwani, and A. Koppelaar, Simultaneous zero-tailing of parallel concatenated codes, IEEE Trans. on Inform. Theory 49(9), p. 2236-2241, 2003. An abstract appeared in the Proceedings of ISIT 2000, June 25-30, p. 368, 2000.

B. Gassend, D. Lim, D. Clarke, M. van Dijk, and S. Devadas, Identification and authentication of integrated circuits, Concurrency and Computation: Practice and Experience 16(11), p. 1077-1098, 2004.

M. van Dijk, S. Egner, M. Greferath, and A. Wassermann, On two doubly even self-dual binary binary codes of length 160 and minimum weight 24, IEEE Trans. on Inform. Theory 51(1), p. 408-411, 2005. The abstract ``On binary linear $[160, 80, 24]$ codes'' appeared in the Proceedings of ISIT 2003, p. 162, 2003.

F.M.J. Willems and M. van Dijk, Capacity and codes for embedding information in grayscale signals, IEEE Trans. on Inform. Theory 51(3), p. 1209-1214, 2005.

D. Lim, J.W. Lee, B. Gassend, G.E. Suh, M. van Dijk, and S. Devadas, Extracting secret keys from integrated circuits, IEEE Trans. VLSI Syst. 13(10), p. 1200-1205, 2005.

M. van Dijk, D. Clarke, B. Gassend, G.E. Suh, and S. Devadas, Speeding up exponentiation using an untrusted computational resource, Designs, Codes, and Cryptography 39(2), p. 253-273, 2006.

M. van Dijk, T. Kevenaar, G.J. Schrijen, and P. Tuyls, Improved constructions of secret sharing schemes by applying $(\lambda,\omega)$-decompositions, Information Processing Letters 99(4), p. 154-157, 2006. An abstract appeared in the Proceedings of ISIT 2003, p. 282, 2003.

B. Gassend, C.W. O'Donnell, G.E. Suh, W. Thies, A. Lee, M. van Dijk, and S. Devadas, Learning biophysically-motivated parameters for alpha helix prediction, BMC Bioinformatics 8(5), p. S3, 2007. Poster at 10th Annual International Conference on Research in Computational Molecular Biology (RECOMB 2006), 2006.

B. Gassend, M. van Dijk, D. Clarke, E. Torlak, S. Devadas, and P. Tuyls, Controlled physical random functions and applications, ACM Transactions on Information and System Security (TISSEC) 10(4), p. 15:1-15:22, 2008.

Ulrich Ruhrmair and Marten van Dijk, On the practical use of physical unclonable functions in oblivious transfer and bit commitment protocols. J. Cryptographic Engineering 3(1): p. 17-28, 2013.

M. van Dijk, A. Juels, A. Oprea, and R. L. Rivest, FlipIt: The Game of "Stealthy Takeover", Journal of Cryptology 26(4): p. 655-713, 2013. IACR Cryptology ePrint Archive 2012: 103, 2012.


Conference Contributions

M. van Dijk, A linear construction of perfect secret sharing schemes, Advances in Cryptology - Eurocrypt'94, LNCS 950,  p. 23-34, 1995.

M. van Dijk, Coding Gain Strategies for the Binary Symmetric Broadcast Channel with Confidential Messages, Proceedings of the 16th Symposium on Information Theory in the Benelux, May 18 - 19, 53-60, 1995.

M. van Dijk, The binary symmetric broadcast channel with confidential messages with tampering, Proceedings of the EIDMA Winter Meeting on Coding Theory, Information Theory and Cryptology, December 19-21, p. 42, 1994, and in the Proceedings of ISIT'95, September 17-22, p. 487, 1995.

M. van Dijk and A. Koppelaar, Quantum key agreement, Proc. of the 18th Symposium on Information Theory in the Benelux, May 15-16, 97-104, 1997, Proc. of ISIT'98, August 16-21,  p. 350, 1998.

M. van Dijk and A. Koppelaar, High rate reconciliation, Proc. of ISIT'97, June 28 - July 4, p. 92, 1997.

M. van Dijk, The optimal linear worst-case information rate, Proc. of ISIT'97, June 28 - July 4, p. 89, 1997.

J.P. Linnartz and M. van Dijk, Analysis of the sensitivity attack against electronic watermarks in images, Proceeding of the Workshop on Information Hiding, Portland, 15-17 April 1998,  LNCS 1525, Springer-Verlag, 258-272, 1998.

T. Kalker, J.P. Linnartz, and M. van Dijk, Watermark estimation through detector analysis, Proc. of the ICIP, Volume I, Chicago, October 4-7,  425-429, 1998.

M. van Dijk and J. Keunig, A quaternary BCH-code based binary quasi-cyclic code construction, Proc. of the 19th Symposium on Information Theory in the Benelux, 83-90, 1998.

M. van Dijk and H. van Tilborg, The art of distilling [secret key generation], invited contribution, Proc. of the ITW'98, Killarney, June 22-26, 1998, 158-159, 1998.

A.G.C. Koppelaar and M. van Dijk, Symbol by symbol APP decoding with a generalized Viterbi decoder, Proc. of the ITW'99, Kruger National Park, South Africa, June 20-25, 1999, p. 95, 1999.

M. van Dijk and R. Motwani, Generalised Trellis Termination, $2^{nd}$ International Symposium on Turbo Codes and Related Topics, Brest, France, September 2000, 255-258, 2000.

M. van Dijk, S. Baggen, and L. Tolhuizen, Coding for Informed Decoders, Proc. of ISIT 2001, p. 202, 2001.

M. van Dijk and F.M.J. Willems, Embedding information in gray-scale images, Proc. 22nd Symp. on Information Theory in the Benelux, 147-154, 2001.

F.M.J. Willems and M. van Dijk, Codes for embedding information in gray-scale signals, cdrom Proceedings 39th Annual Allerton Conference on Communication, Control and Computing, Allerton House, Monticello, IL, USA, October 3-5, 2001, SPS-30 [06.11], 2001.

A. Gorokhov and M. van Dijk, Optimised labelings for bit-interleaved transmission with iterative demodulation, Proc. 22nd Symp. on Information Theory in the Benelux, 2001.

A. Gorokhov and M. van Dijk, Optimised labeling maps for bit-interleaved transmission with turbo  demodulation, VTC 2001, IEEE VTS 53rd, Vol. 2, 2001, 1459-1463, 2001.

M. Kuijper, M. van Dijk, H. Hollmann, and J. Oostveen, A unifying system theoretic framework for errors-and erasures Reed-Solomon decoding, 14th International Symposium on Applied Algebra and Error-Correcting Codes (AAECC) 2001, 343-352, 2001.

D. Woodruff and M. van Dijk, Cryptography in an unbounded computational model, Advances in Cryptology - Eurocrypt 2002, LNCS 2332, 149-164, 2002.

D. Clarke, B. Gassend, T. Kotwal, M. Burnside, M. van Dijk, S. Devadas, and R. Rivest, The untrusted computer problem and camera-based authentication, Proceedings of Pervasive 2002, 114-124, 2002.

B. Gassend, D. Clarke, M. van Dijk, and S. Devadas, Silicon physical random functions, Proceedings of the 9th ACM Conference on Computer and Communications Security (CCS'02), November 2002.

B. Gassend, D. Clarke, M. van Dijk, and S. Devadas, Controlled Physical Random Functions, Proceedings of the 18th Annual Computer Security Applications Conference (ACSAC'02), best student paper award, 149-160, December 2002.

B. Gassend, D. Clarke, G.E. Suh, M. van Dijk, and S. Devadas, Caches and hash trees for efficient memory integrity verification, Proceedings of the Ninth International Symposium on High Performance Computer Architecture (HPCA-9), 295-306, 2003.

P. Tuyls, T. Kevenaar, G.J. Schrijen, A.A.M. Staring, and M. van Dijk, Visual crypto displays enabling secure communications, Proceedings of the First International Conference on Security in Pervasive Computing, LNCS 2802, 271-284, 2003.

B. Gassend, D. Clarke, M. van Dijk, and S. Devadas, Delay-based circuit authentication and applications, Proceedings of the 2003 ACM Symposium on Applied Computing (SAC'03), 294-301, 2003.

G.E. Suh, D. Clarke, B. Gassend, M. van Dijk, and S. Devadas, The AEGIS processor architecture for tamper-evident and tamper-resistant processing, Proceedings of the 17th Annual ACM International Conference on Supercomputing (ICS'03), June 2003.

D. Clarke, S. Devadas, M. van Dijk, B. Gassend, and G.E. Suh, Incremental multiset hashes and their application to integrity checking, Advances in Cryptology - Asiacrypt 2003, LNCS 2894, 188-207, 2003.

G.E. Suh, D. Clarke, B. Gassend, M. van Dijk, and S. Devadas, Efficient memory integrity verification and encryption for secure processors, Proceedings of the 36th Annual IEEE/ACM International Symposium on Microarchitecture, 339-351, 2003.

J.W. Lee, D. Lim, B. Gassend, G.E. Suh, M. van Dijk, and S. Devadas, A technique to build a secret key in integrated circuits for identification and authentication applications, 2004 Symposium on VLSI Circuits, p. 176-179, 2004.

M. van Dijk and D. Woodruff, Asymptotical optimal communication for torus based cryptography, Advances in Cryptology - Crypto 2004, LNCS 3152, p. 157-178, 2004.

D. Clarke, G.E. Suh, B. Gassend, A. Sudan, M. van Dijk, and S. Devadas, Towards constant bandwidth overhead integrity checking of untrusted data, IEEE Symposium on Privacy and Security 2005.

M. van Dijk, R. Granger, D. Page, K. Rubin, A. Silverberg, M. Stam, and D. Woodruff, Practical cryptography in high dimensional tori, Advances in Cryptology - Eurocrypt 2005, p. 234-250, 2005.

M. van Dijk and P. Tuyls, Robustness, reliability and security of biometric key distillation in the information theoretical setting, Proc. of the 26th Symposium on Information Theory in the Benelux, 2005.

M. van Dijk and P. Tuyls, Secure biometrics, European Signal Processing Conference (EUSIPCO 2005), 2005.

B. Gassend, C.W. O'Donnell, W. Thies, A. Lee, M. van Dijk, and S. Devadas, Predicting secondary structure of all-helical proteins using hidden Markov support vector machines, PRIB 2006, p. 93-104, 2006.

L.F.G. Sarmenta, M. van Dijk, C.W. O'Donnell, J. Rhodes, and S. Devadas, Virtual monotonic counters and count-limited objects using a TPM without a trusted OS, The First ACM Workshop on Scalable Trusted Computing (ACM STC'06),  2006.

C.W. O'Donnell, G.E. Suh, M. van Dijk, and S. Devadas, Memoization attacks and copy protection in partitioned applications, Proceedings of the 2007 IEEE Workshop on Information Assurance (IAW 2007), 2007.

M. van Dijk, J. Rhodes, L.F.G. Sarmenta, and S. Devadas, Offline untrusted storage with immediate detection of forking and replay attacks, The 2nd ACM Workshop on Scalable Trusted Computing (ACM STC'07), 2007.

L.F.G. Sarmenta, M. van Dijk, J. Rhodes, and S. Devadas, Offline count-limited certificates, Proceedings of the 2008 ACM Symposium on Applied Computing (SAC'08), 2008.

V. Costan, L.F.G. Sarmenta, M. van Dijk, and S. Devadas, The trusted execution module: commodity general purpose trusted computing, CARDIS 2008.

M.A. Kinsy, M.H. Cho, T. Wen, E. Suh, M. van Dijk, and S. Devadas, Bandwidth-sensitive deadlock-free oblivious routing, ISCA 2009.

M. van Dijk, C. Gentry, S. Halevi and V. Vaikuntanathan, Fully homomorphic encryption over the integers,  Eurocrypt 2010, 24-43, 2010.

M. van Dijk and A. Juels, On the impossibility of cryptography alone for privacy-preserving cloud computing, HotSec 2010.

T. Denning, K. D. Bowers, M. van Dijk and A. Juels: Exploring implicit memory for painless password recovery, CHI 2011, 2615-2618, 2011.

K. D. Bowers, M. van Dijk, A. Juels, A. Oprea, R. L. Rivest, How to tell if your cloud files are vulnerable to drive crashes, ACM Conference on Computer and Communications Security 2011, 501-514, 2011.

U. Ruhrmair and M. van Dijk: Practical security analysis of PUF-based two-player protocols, CHES 2012, 251-267, 2012.

Marten van Dijk, Ari Juels, Alina Oprea, Ronald L. Rivest, Emil Stefanov, Nikos Triandopoulos, Hourglass schemes: how to prove that cloud files are encrypted. ACM Conference on Computer and Communications Security 2012, 265-280, 2012.

C. Fletcher, M. van Dijk and S. Devadas, Secure processor architecture for encrypted computation on untrusted programs, STC'12, 2012.

C. Fletcher, M. van Dijk and S. Devadas, Towards an interpreter for efficient encrypted computation, CCSW'12, 2012.

K. D. Bowers, M. van Dijk, R. Griffin, A. Juels, A. Oprea, R. L. Rivest and N. Triandopoulos, Defending against the unknown enemy: Applying FlipIt to system security, GameSec'12, 2012.

E. Stefanov, M. van Dijk, A. Oprea and A. Juels, Iris: A scalable cloud file system with efficient integrity checks, ACSAC'12, 2012.

Ulrich Ruhrmair and Marten van Dijk. PUFs in Security Protocols: Attack Models and Security Evaluations. IEEE Symposium on Security and Privacy 2013: p. 286-300, 2013.

L. Ren, X. Yu, C. Fletcher, M. van Dijk, and S. Devadas. Design Space Exploration and Optimization of Path Oblivious RAM in Secure Processors. In Proceedings of the International Symposium on Computer Architecture (ISCA) 2013, pp 571–-582. Available at IACR Cryptology ePrint Archive, Report 2012/76.

L. Ren, C.W. Fletcher, X. Yu, M. van Dijk and S. Devadas. Integrity Verification for Path Oblivious-RAM.Accepted for publication in IEEE High Performance Extreme Computing Conference (HPEC) 2013.

E. Stefanov, M. van Dijk, E. Shi, C.W. Fletcher, L. Ren, X. Yu, and S. Devadas. Path ORAM: An Extremely Simple Oblivious RAM Protocol. Accepted for publication in the Proceedings of the ACM Conference on Computer and Communications Security (CCS) 2013. Available at IACR Cryptology ePrint Archive, Report 2013/280.

X. Yu,  C.W. Fletcher, L. Ren, M. van Dijk and S. Devadas. Generalized External Interaction with Tamper-Resistant Hardware with Bounded Information Leakage. Accepted for publication in CCSW'13, 2013.


Book Chapters

B. Gassend, M. van Dijk, D. Clarke, and S. Devadas. Controlled physical random functions. Chapter 14 in {\em Security with Noisy Data: On Private Biometrics, Secure Key Storage and Anti-Counterfeiting}, eds. P. Tuyls, B. Skoric, and T. Kevenaar, Springer, 235-254, 2007.


Reports

E. Torlak, M. van Dijk, B. Gassend, D. Jackson, and S. Devadas, Knowledge flow analysis for security protocols, http://arxiv.org/abs/cs/0605109, 2006.

M. van Dijk, E. Torlak, B. Gassend, and S. Devadas, A generalized two-phase analysis of knowledge flows in security protocols, http://arxiv.org/abs/cs/0605097, 2006.

M. van Dijk and U. Ruhrmair, Physical unclonable functions in cryptographic protocols: Security proofs and impossibility results. IACR Cryptology ePrint Archive 2012: 228,  2012.


Issued Patents

M.E. van Dijk, W.M.J.M. Coene, and C.P.M.J. Baggen, Method of decoding a stream of channel bits of a signal relating to a binary channel signal into a stream of source bits of a signal relating to a binary source signal, US 6362754,  2002.

H.D.L. Hollmann, M.E. van Dijk, and P.J. Lenoir, Method and device for executing a decrypting mechanism through calculating a standardized modular exponentiation for thwarting timing attacks, US 6366673, 2002.

M.E. van Dijk, L.M.G.M. Tolhuizen, J.A.H.M. Kahlman, C.P.M.J. Baggen, M. Hattori, K. Yamamoto, T. Narahara, and S. Senshu, Encoding multiword information by wordwise interleaving, US 6367049, 2002.

M.E. van Dijk, L.M.G.M. Tolhuizen, and C.P.M.J. Baggen, Method and apparatus for encoding  multiword information with error locative clues directed to low protectivity words, US 6378100, 2002.

J.P.M.G. Linnartz, M.J.J.J.-B. Maes, A.A.C.M. Kalker, G.F.G. Depovere, P.M.J. Rongen, C.W.F. Vriens, M.E. van Dijk, Device for optically scanning a record carrier, US 6415040, 2002.

M.E. van Dijk, W.M.J.M. Coene, and C.P.M.J. Baggen, Information carrier, device for encoding, method for encoding, device for decoding and method for decoding, US 6529147,  2003.

M.E. van Dijk, W.M.J.M. Coene, and C.P.M.J. Baggen, Information carrier, device for encoding, method for encoding, device for decoding and method for decoding, US 6650257, 2003.

M.E. van Dijk, C.P.M.J. Baggen, and L.M.G.M. Tolhuizen, Coding for informed decoders, US 7103829, 2006.

C.P.M.J. Baggen, M.E. van Dijk, and W.M.J.M Coene, Method of storing or decoding a stream of bits, US 7174497, 2007.

M.E. van Dijk and K. Yamamoto, Method and apparatus for embedding an additional layer of error correction into an error correcting code, US 7188295, 2007.

M.E. van Dijk, , K. Yamamoto, and M. Hattori, Method and apparatus for embedding an additional layer of error correction into an error correcting code, US 7340663, 2008.

M.E. van Dijk and F.M.J. Willems, Embedding auxiliary data in an information signal, US 7392453, 2008.

M.E. van Dijk, System and method of reliable forward secret key sharing with physical random functions, US 7653197, 2010.

D. Clarke,  B. Gassend, M. van Dijk and S. Devadas, Authentication of integrated circuits, US 7840803, 2010.

M.E. van Dijk and P.T. Tuyls, Proof of execution using random function, US 7877604, 2011.

P.T. Tuyls, E. Verbitskiy, B. Schoenmakers, and M.E. van Dijk, Securely computing a similarity measure, US 8281148, 2012.


Theses

M. van Dijk, Graph algorithms, Master's thesis, Eindhoven University of Technology, The Netherlands, 1991. Anne Kaldewaij, advisor.

M. van Dijk, Wyner's wire-tap channel and its cryptographic application, Master's thesis, Eindhoven University of Technology, The Netherlands, 1993. Henk van Tilborg, advisor.

M. van Dijk, Secret key sharing and secret key generation, PhD Thesis, Eindhoven University of Technology, The Netherlands, 1997. Henk van Tilborg, advisor.


© Marten van Dijk 2013 (web site created using Sandvox)