关注
Phuong Ha Nguyen
标题
引用次数
引用次数
年份
SGD and Hogwild! convergence without the bounded gradients assumption
LM Nguyen, PH Nguyen, M van Dijk, P Richtárik, K Scheinberg, M Takáč
arXiv preprint arXiv:1802.03801, 2018
2312018
The interpose PUF: Secure PUF design against state-of-the-art machine learning attacks
PH Nguyen, DP Sahoo, C Jin, K Mahmood, U Rührmair, M Van Dijk
Cryptology ePrint Archive, 2018
1812018
A multiplexer-based arbiter PUF composition with enhanced reliability and security
DP Sahoo, D Mukhopadhyay, RS Chakraborty, PH Nguyen
IEEE Transactions on Computers 67 (3), 403-417, 2017
1562017
Splitting the interpose PUF: A novel modeling attack strategy
N Wisiol, C Mühl, N Pirnay, PH Nguyen, M Margraf, JP Seifert, M Van Dijk, ...
IACR Transactions on Cryptographic Hardware and Embedded Systems, 97-120, 2020
972020
A case of lightweight PUF constructions: Cryptanalysis and machine learning attacks
DP Sahoo, PH Nguyen, D Mukhopadhyay, RS Chakraborty
IEEE Transactions on Computer-Aided Design of Integrated Circuits and …, 2015
972015
A biased fault attack on the time redundancy countermeasure for AES
S Patranabis, A Chakraborty, PH Nguyen, D Mukhopadhyay
International workshop on constructive side-channel analysis and secure …, 2015
702015
Finite-sum smooth optimization with SARAH
LM Nguyen, M van Dijk, DT Phan, PH Nguyen, TW Weng, ...
Computational Optimization and Applications 82 (3), 561-593, 2022
69*2022
A unified convergence analysis for shuffling-type gradient methods
LM Nguyen, Q Tran-Dinh, DT Phan, PH Nguyen, M Van Dijk
Journal of Machine Learning Research 22 (207), 1-44, 2021
692021
New convergence aspects of stochastic gradient algorithms
LM Nguyen, PH Nguyen, P Richtárik, K Scheinberg, M Takáč, M van Dijk
Journal of Machine Learning Research 20 (176), 1-49, 2019
652019
Differential attacks against stream cipher ZUC
H Wu, T Huang, PH Nguyen, H Wang, S Ling
International Conference on the Theory and Application of Cryptology and …, 2012
472012
On 3-share threshold implementations for 4-bit s-boxes
S Kutzner, PH Nguyen, A Poschmann, H Wang
Constructive Side-Channel Analysis and Secure Design: 4th International …, 2013
422013
Security analysis of arbiter PUF and its lightweight compositions under predictability test
PH Nguyen, DP Sahoo, RS Chakraborty, D Mukhopadhyay
ACM Transactions on Design Automation of Electronic Systems (TODAES) 22 (2 …, 2016
372016
Fpga implementation of a cryptographically-secure puf based on learning parity with noise
C Jin, C Herder, L Ren, PH Nguyen, B Fuller, S Devadas, M Van Dijk
Cryptography 1 (3), 23, 2017
362017
Improving the algorithm 2 in multidimensional linear cryptanalysis
PH Nguyen, H Wu, H Wang
Australasian Conference on Information Security and Privacy, 61-74, 2011
342011
Asynchronous federated learning with reduced number of rounds and with differential privacy from less aggregated gaussian noise
M van Dijk, NV Nguyen, TN Nguyen, LM Nguyen, Q Tran-Dinh, ...
arXiv preprint arXiv:2007.09208, 2020
332020
Tight dimension independent lower bound on the expected convergence rate for diminishing step sizes in SGD
PH Nguyen, L Nguyen, M van Dijk
Advances in Neural Information Processing Systems 32, 2019
272019
Efficient attacks on robust ring oscillator PUF with enhanced challenge-response set
PH Nguyen, DP Sahoo, RS Chakraborty, D Mukhopadhyay
2015 Design, Automation & Test in Europe Conference & Exhibition (DATE), 641-646, 2015
272015
Architectural bias: A novel statistical metric to evaluate arbiter PUF variants.
DP Sahoo, PH Nguyen, RS Chakraborty, D Mukhopadhyay
IACR Cryptol. ePrint Arch. 2016, 57, 2016
262016
A hybrid stochastic policy gradient algorithm for reinforcement learning
N Pham, L Nguyen, D Phan, PH Nguyen, M Dijk, Q Tran-Dinh
International Conference on Artificial Intelligence and Statistics, 374-385, 2020
252020
Enabling 3-share threshold implementations for all 4-bit s-boxes
S Kutzner, PH Nguyen, A Poschmann
Information Security and Cryptology--ICISC 2013: 16th International …, 2014
232014
系统目前无法执行此操作,请稍后再试。
文章 1–20