Fully homomorphic encryption over the integers M Van Dijk, C Gentry, S Halevi, V Vaikuntanathan Annual International Conference on the Theory and Applications of …, 2010 | 1983 | 2010 |
Silicon physical random functions B Gassend, D Clarke, M Van Dijk, S Devadas Proceedings of the 9th ACM Conference on Computer and Communications …, 2002 | 1556 | 2002 |
Extracting secret keys from integrated circuits D Lim, JW Lee, B Gassend, GE Suh, M Van Dijk, S Devadas IEEE Transactions on Very Large Scale Integration (VLSI) Systems 13 (10 …, 2005 | 964 | 2005 |
A technique to build a secret key in integrated circuits for identification and authentication applications JW Lee, D Lim, B Gassend, GE Suh, M Van Dijk, S Devadas 2004 Symposium on VLSI Circuits. Digest of Technical Papers (IEEE Cat. No …, 2004 | 812 | 2004 |
Path ORAM: an extremely simple oblivious RAM protocol E Stefanov, M Van Dijk, E Shi, C Fletcher, L Ren, X Yu, S Devadas Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013 | 766 | 2013 |
AEGIS: Architecture for tamper-evident and tamper-resistant processing GE Suh, D Clarke, B Gassend, M Van Dijk, S Devadas ACM International Conference on Supercomputing 25th Anniversary Volume, 357-368, 2003 | 728 | 2003 |
Controlled physical random functions B Gassend, D Clarke, M Van Dijk, S Devadas 18th Annual Computer Security Applications Conference, 2002. Proceedings …, 2002 | 431 | 2002 |
Efficient memory integrity verification and encryption for secure processors GE Suh, D Clarke, B Gasend, M Van Dijk, S Devadas Proceedings. 36th Annual IEEE/ACM International Symposium on …, 2003 | 341 | 2003 |
Identification and authentication of integrated circuits B Gassend, D Lim, D Clarke, M Van Dijk, S Devadas Concurrency and Computation: Practice and Experience 16 (11), 1077-1098, 2004 | 306 | 2004 |
On the impossibility of cryptography alone for privacy-preserving cloud computing. M Van Dijk, A Juels HotSec 10, 1-8, 2010 | 305 | 2010 |
Caches and hash trees for efficient memory integrity verification B Gassend, GE Suh, D Clarke, M Van Dijk, S Devadas The Ninth International Symposium on High-Performance Computer Architecture …, 2003 | 283 | 2003 |
FlipIt: The game of “stealthy takeover” M Van Dijk, A Juels, A Oprea, RL Rivest Journal of Cryptology 26 (4), 655-713, 2013 | 223 | 2013 |
Authentication of integrated circuits D Clarke, B Gassend, M Van Dijk, S Devadas US Patent 7,840,803, 2010 | 219 | 2010 |
Iris: A scalable cloud file system with efficient integrity checks E Stefanov, M van Dijk, A Juels, A Oprea Proceedings of the 28th Annual Computer Security Applications Conference …, 2012 | 214 | 2012 |
Analysis of the sensitivity attack against electronic watermarks in images JPMG Linnartz, M Van Dijk International Workshop on Information Hiding, 258-272, 1998 | 199 | 1998 |
A secure processor architecture for encrypted computation on untrusted programs CW Fletcher, M Dijk, S Devadas Proceedings of the seventh ACM workshop on Scalable trusted computing, 3-8, 2012 | 195 | 2012 |
On the information rate of perfect secret sharing schemes M Van Dijk Designs, Codes and Cryptography 6 (2), 143-169, 1995 | 195 | 1995 |
Optical disc system for digital video recording T Narahara, S Kobayashi, M Hattori, Y Shimpuku, GJ van den Enden, ... Japanese Journal of Applied Physics 39 (2S), 912, 2000 | 176 | 2000 |
Onion ORAM: A constant bandwidth blowup oblivious RAM S Devadas, M van Dijk, CW Fletcher, L Ren, E Shi, D Wichs Theory of Cryptography Conference, 145-174, 2016 | 143 | 2016 |
Constants Count: Practical Improvements to Oblivious {RAM} L Ren, C Fletcher, A Kwon, E Stefanov, E Shi, M Van Dijk, S Devadas 24th {USENIX} Security Symposium ({USENIX} Security 15), 415-430, 2015 | 139 | 2015 |