Follow
Phuong Ha Nguyen
Title
Cited by
Cited by
Year
SGD and Hogwild! convergence without the bounded gradients assumption
LM Nguyen, PH Nguyen, M van Dijk, P Richtárik, K Scheinberg, M Takáč
arXiv preprint arXiv:1802.03801, 2018
2342018
The interpose PUF: Secure PUF design against state-of-the-art machine learning attacks
PH Nguyen, DP Sahoo, C Jin, K Mahmood, U Rührmair, M Van Dijk
Cryptology ePrint Archive, 2018
1902018
A multiplexer-based arbiter PUF composition with enhanced reliability and security
DP Sahoo, D Mukhopadhyay, RS Chakraborty, PH Nguyen
IEEE Transactions on Computers 67 (3), 403-417, 2017
1612017
Splitting the interpose PUF: A novel modeling attack strategy
N Wisiol, C Mühl, N Pirnay, PH Nguyen, M Margraf, JP Seifert, M Van Dijk, ...
IACR Transactions on Cryptographic Hardware and Embedded Systems, 97-120, 2020
1022020
A case of lightweight PUF constructions: Cryptanalysis and machine learning attacks
DP Sahoo, PH Nguyen, D Mukhopadhyay, RS Chakraborty
IEEE Transactions on Computer-Aided Design of Integrated Circuits and …, 2015
992015
A unified convergence analysis for shuffling-type gradient methods
LM Nguyen, Q Tran-Dinh, DT Phan, PH Nguyen, M Van Dijk
Journal of Machine Learning Research 22 (207), 1-44, 2021
722021
Finite-sum smooth optimization with SARAH
LM Nguyen, M van Dijk, DT Phan, PH Nguyen, TW Weng, ...
Computational Optimization and Applications 82 (3), 561-593, 2022
70*2022
A biased fault attack on the time redundancy countermeasure for AES
S Patranabis, A Chakraborty, PH Nguyen, D Mukhopadhyay
International workshop on constructive side-channel analysis and secure …, 2015
702015
New convergence aspects of stochastic gradient algorithms
LM Nguyen, PH Nguyen, P Richtárik, K Scheinberg, M Takáč, M van Dijk
Journal of Machine Learning Research 20 (176), 1-49, 2019
652019
Differential attacks against stream cipher ZUC
H Wu, T Huang, PH Nguyen, H Wang, S Ling
International Conference on the Theory and Application of Cryptology and …, 2012
472012
On 3-share threshold implementations for 4-bit s-boxes
S Kutzner, PH Nguyen, A Poschmann, H Wang
Constructive Side-Channel Analysis and Secure Design: 4th International …, 2013
422013
Security analysis of arbiter PUF and its lightweight compositions under predictability test
PH Nguyen, DP Sahoo, RS Chakraborty, D Mukhopadhyay
ACM Transactions on Design Automation of Electronic Systems (TODAES) 22 (2 …, 2016
402016
Asynchronous federated learning with reduced number of rounds and with differential privacy from less aggregated gaussian noise
M van Dijk, NV Nguyen, TN Nguyen, LM Nguyen, Q Tran-Dinh, ...
arXiv preprint arXiv:2007.09208, 2020
372020
Fpga implementation of a cryptographically-secure puf based on learning parity with noise
C Jin, C Herder, L Ren, PH Nguyen, B Fuller, S Devadas, M Van Dijk
Cryptography 1 (3), 23, 2017
362017
Improving the algorithm 2 in multidimensional linear cryptanalysis
PH Nguyen, H Wu, H Wang
Australasian Conference on Information Security and Privacy, 61-74, 2011
362011
Tight dimension independent lower bound on the expected convergence rate for diminishing step sizes in SGD
PH Nguyen, L Nguyen, M van Dijk
Advances in Neural Information Processing Systems 32, 2019
292019
Efficient attacks on robust ring oscillator PUF with enhanced challenge-response set
PH Nguyen, DP Sahoo, RS Chakraborty, D Mukhopadhyay
2015 Design, Automation & Test in Europe Conference & Exhibition (DATE), 641-646, 2015
282015
A hybrid stochastic policy gradient algorithm for reinforcement learning
N Pham, L Nguyen, D Phan, PH Nguyen, M Dijk, Q Tran-Dinh
International Conference on Artificial Intelligence and Statistics, 374-385, 2020
262020
Architectural bias: A novel statistical metric to evaluate arbiter PUF variants.
DP Sahoo, PH Nguyen, RS Chakraborty, D Mukhopadhyay
IACR Cryptol. ePrint Arch. 2016, 57, 2016
262016
Enabling 3-share threshold implementations for all 4-bit s-boxes
S Kutzner, PH Nguyen, A Poschmann
Information Security and Cryptology--ICISC 2013: 16th International …, 2014
232014
The system can't perform the operation now. Try again later.
Articles 1–20