Phuong Ha Nguyen
タイトル引用先
A case of lightweight PUF constructions: Cryptanalysis and machine learning attacks
DP Sahoo, PH Nguyen, D Mukhopadhyay, RS Chakraborty
IEEE Transactions on Computer-Aided Design of Integrated Circuits and …, 2015
282015
A biased fault attack on the time redundancy countermeasure for AES
S Patranabis, A Chakraborty, PH Nguyen, D Mukhopadhyay
International workshop on constructive side-channel analysis and secure …, 2015
282015
Differential attacks against stream cipher ZUC
H Wu, T Huang, PH Nguyen, H Wang, S Ling
International Conference on the Theory and Application of Cryptology and …, 2012
282012
SGD and Hogwild! convergence without the bounded gradients assumption
LM Nguyen, PH Nguyen, M van Dijk, P Richtárik, K Scheinberg, M Takáč
arXiv preprint arXiv:1802.03801, 2018
272018
On 3-share threshold implementations for 4-bit S-boxes
S Kutzner, PH Nguyen, A Poschmann, H Wang
International Workshop on Constructive Side-Channel Analysis and Secure …, 2013
222013
Improving the algorithm 2 in multidimensional linear cryptanalysis
PH Nguyen, H Wu, H Wang
Australasian Conference on Information Security and Privacy, 61-74, 2011
222011
Cryptanalysis of the stream cipher zuc in the 3gpp confidentiality & integrity algorithms 128-eea3 & 128-eia3
H Wu, PH Nguyen, H Wang, S Ling
Rump session of Asiacrypt 2010, 2010
162010
Enabling 3-share threshold implementations for all 4-bit s-boxes
S Kutzner, PH Nguyen, A Poschmann
International Conference on Information Security and Cryptology, 91-108, 2013
152013
Security analysis of arbiter PUF and its lightweight compositions under predictability test
PH Nguyen, DP Sahoo, RS Chakraborty, D Mukhopadhyay
ACM Transactions on Design Automation of Electronic Systems (TODAES) 22 (2), 20, 2017
102017
Efficient attacks on robust ring oscillator PUF with enhanced challenge-response set
PH Nguyen, DP Sahoo, RS Chakraborty, D Mukhopadhyay
Proceedings of the 2015 Design, Automation & Test in Europe Conference …, 2015
102015
On multidimensional linear cryptanalysis
PH Nguyen, L Wei, H Wang, S Ling
Australasian Conference on Information Security and Privacy, 37-52, 2010
82010
Fpga implementation of a cryptographically-secure puf based on learning parity with noise
C Jin, C Herder, L Ren, P Nguyen, B Fuller, S Devadas, M van Dijk
Cryptography 1 (3), 23, 2017
72017
Architectural Bias: a Novel Statistical Metric to Evaluate Arbiter PUF Variants.
DP Sahoo, PH Nguyen, RS Chakraborty, D Mukhopadhyay
IACR Cryptology ePrint Archive 2016, 57, 2016
72016
Improved differential cache attacks on SMS4
PH Nguyen, C Rebeiro, D Mukhopadhyay, H Wang
International Conference on Information Security and Cryptology, 29-45, 2012
72012
A multiplexer-based Arbiter PUF composition with enhanced reliability and security
DP Sahoo, D Mukhopadhyay, RS Chakraborty, PH Nguyen
IEEE Transactions on Computers 67 (3), 403-417, 2017
62017
Enabling 3-share Threshold Implementations for any 4-bit S-box.
S Kutzner, PH Nguyen, A Poschmann
IACR Cryptology ePrint Archive 2012, 510, 2012
62012
Formalizing the Effect of Feistel cipher structures on differential cache attacks
C Rebeiro, PH Nguyen, D Mukhopadhyay, A Poschmann
IEEE Transactions on Information Forensics and Security 8 (8), 1274-1279, 2013
52013
On related-key attacks and KASUMI: the case of A5/3
PH Nguyen, MJB Robshaw, H Wang
International Conference on Cryptology in India, 146-159, 2011
42011
An Efficient and Scalable Modeling Attack on Lightweight Secure Physically Unclonable Function.
PH Nguyen, DP Sahoo
IACR Cryptology ePrint Archive 2016, 428, 2016
32016
Minimizing s-boxes in hardware by utilizing linear transformations
S Kutzner, PH Nguyen, A Poschmann, M Stöttinger
International Conference on Cryptology in Africa, 235-250, 2014
32014
現在システムで処理を実行できません。しばらくしてからもう一度お試しください。
論文 1–20