Cryptographers' World
 

Marten van Dijk



11 papers in database with 201 citations 

H-number: 6

Journal Papers

[Sort papers chronologically] [Sort papers by citations count]

 
1. Marten van Dijk,  Dwaine E. Clarke,  Blaise Gassend,  G. Edward Suh,  Srinivas Devadas,  Speeding up Exponentiation using an Untrusted Computational Resource, Designs, Codes and Cryptography, Volume 39(2), pp. 253 - 273, Springer, 2006.

[Electronic Edition][Cited 5 times ]

2. Shengli Liu,  Henk C. A. van Tilborg,  Marten van Dijk,  A Practical Protocol for Advantage Distillation and Information Reconciliation, Designs, Codes and Cryptography, Volume 30(1), pp. 39 - 62, Springer, 2003.

[Electronic Edition][Cited 6 times ]

3. Marten van Dijk,  Wen-Ai Jackson,  Keith M. Martin,  A General Decomposition Construction for Incomplete Secret Sharing Schemes, Designs, Codes and Cryptography, Volume 15(3), pp. 301 - 321, Springer, 1998.

[Electronic Edition][Cited 5 times ]

4. Marten van Dijk,  Christian Gehrmann,  Ben J. M. Smeets,  Unconditionally Secure Group Authentication, Designs, Codes and Cryptography, Volume 14(3), pp. 281 - 296, Springer, 1998.

[Electronic Edition][Cited 6 times ]

5. Marten van Dijk,  A Linear Construction of Secret Sharing Schemes, Designs, Codes and Cryptography, Volume 12(2), pp. 161 - 201, Springer, 1997.

[Electronic Edition][Cited 19 times ]

6. Marten van Dijk,  On the Information Rate of Perfect Secret Sharing Schemes, Designs, Codes and Cryptography, Volume 6(2), pp. 143 - 169, Springer, 1995.

[Electronic Edition][Cited 50 times Red Star]

Conference Papers

[Sort papers chronologically] [Sort papers by citations count]

1. Marten van Dijk,  Robert Granger,  Dan Page,  Karl Rubin,  Alice Silverberg,  Martijn Stam,  David P. Woodruff,  Practical Cryptography in High Dimensional Tori, pp. 234 - 250, EUROCRYPT 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 28 times ]

2. Marten van Dijk,  David P. Woodruff,  Asymptotically Optimal Communication for Torus-Based Cryptography, pp. 157 - 178, CRYPTO 2004.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 21 times ]

3. Dwaine E. Clarke,  Srinivas Devadas,  Marten van Dijk,  Blaise Gassend,  G. Edward Suh,  Incremental Multiset Hash Functions and Their Application to Memory Integrity Checking, pp. 188 - 207, ASIACRYPT 2003.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 43 times ]

4. David P. Woodruff,  Marten van Dijk,  Cryptography in an Unbounded Computational Model, pp. 149 - 164, EUROCRYPT 2002.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 3 times ]

5. Marten van Dijk,  A Linear Construction of Perfect Secret Sharing Schemes, pp. 23 - 34, EUROCRYPT 1994.

[Electronic Edition][Cited 15 times ]



Database status:
3755 authors,
5428 conference papers from 177 conference proceedings,
559 journal papers from 8 journals
Highly Cited...