Phuong Ha Nguyen
TitleCited byYear
SGD and Hogwild! convergence without the bounded gradients assumption
LM Nguyen, PH Nguyen, M van Dijk, P Richtárik, K Scheinberg, M Takáč
arXiv preprint arXiv:1802.03801, 2018
332018
A case of lightweight PUF constructions: Cryptanalysis and machine learning attacks
DP Sahoo, PH Nguyen, D Mukhopadhyay, RS Chakraborty
IEEE Transactions on Computer-Aided Design of Integrated Circuits and …, 2015
332015
A biased fault attack on the time redundancy countermeasure for AES
S Patranabis, A Chakraborty, PH Nguyen, D Mukhopadhyay
International workshop on constructive side-channel analysis and secure …, 2015
292015
Differential attacks against stream cipher ZUC
H Wu, T Huang, PH Nguyen, H Wang, S Ling
International Conference on the Theory and Application of Cryptology and …, 2012
282012
On 3-share threshold implementations for 4-bit S-boxes
S Kutzner, PH Nguyen, A Poschmann, H Wang
International Workshop on Constructive Side-Channel Analysis and Secure …, 2013
222013
Improving the algorithm 2 in multidimensional linear cryptanalysis
PH Nguyen, H Wu, H Wang
Australasian Conference on Information Security and Privacy, 61-74, 2011
222011
Enabling 3-share threshold implementations for all 4-bit s-boxes
S Kutzner, PH Nguyen, A Poschmann
International Conference on Information Security and Cryptology, 91-108, 2013
162013
Cryptanalysis of the stream cipher zuc in the 3gpp confidentiality & integrity algorithms 128-eea3 & 128-eia3
H Wu, PH Nguyen, H Wang, S Ling
Rump session of Asiacrypt 2010, 2010
162010
A multiplexer-based Arbiter PUF composition with enhanced reliability and security
DP Sahoo, D Mukhopadhyay, RS Chakraborty, PH Nguyen
IEEE Transactions on Computers 67 (3), 403-417, 2017
122017
Security analysis of arbiter PUF and its lightweight compositions under predictability test
PH Nguyen, DP Sahoo, RS Chakraborty, D Mukhopadhyay
ACM Transactions on Design Automation of Electronic Systems (TODAES) 22 (2), 20, 2017
122017
Efficient attacks on robust ring oscillator PUF with enhanced challenge-response set
PH Nguyen, DP Sahoo, RS Chakraborty, D Mukhopadhyay
Proceedings of the 2015 Design, Automation & Test in Europe Conference …, 2015
122015
Fpga implementation of a cryptographically-secure puf based on learning parity with noise
C Jin, C Herder, L Ren, P Nguyen, B Fuller, S Devadas, M van Dijk
Cryptography 1 (3), 23, 2017
102017
Architectural Bias: a Novel Statistical Metric to Evaluate Arbiter PUF Variants.
DP Sahoo, PH Nguyen, RS Chakraborty, D Mukhopadhyay
IACR Cryptology ePrint Archive 2016, 57, 2016
92016
Optimal finite-sum smooth non-convex optimization with SARAH
LM Nguyen, M van Dijk, DT Phan, PH Nguyen, TW Weng, ...
arXiv preprint arXiv:1901.07648, 2019
82019
On multidimensional linear cryptanalysis
PH Nguyen, L Wei, H Wang, S Ling
Australasian Conference on Information Security and Privacy, 37-52, 2010
82010
Improved differential cache attacks on SMS4
PH Nguyen, C Rebeiro, D Mukhopadhyay, H Wang
International Conference on Information Security and Cryptology, 29-45, 2012
72012
The interpose puf: Secure puf design against state-of-the-art machine learning attacks
PH Nguyen, DP Sahoo, C Jin, K Mahmood, U Rührmair, M van Dijk
IACR Transactions on Cryptographic Hardware and Embedded Systems, 243-290, 2019
62019
Enabling 3-share Threshold Implementations for any 4-bit S-box.
S Kutzner, PH Nguyen, A Poschmann
IACR Cryptology ePrint Archive 2012, 510, 2012
62012
MXPUF: Secure PUF Design against State-of-the-art Modeling Attacks.
PH Nguyen, DP Sahoo, C Jin, K Mahmood, M van Dijk
IACR Cryptology ePrint Archive 2017, 572, 2017
52017
Formalizing the Effect of Feistel cipher structures on differential cache attacks
C Rebeiro, PH Nguyen, D Mukhopadhyay, A Poschmann
IEEE Transactions on Information Forensics and Security 8 (8), 1274-1279, 2013
52013
The system can't perform the operation now. Try again later.
Articles 1–20