Phuong Ha Nguyen
Cited by
Cited by
SGD and Hogwild! convergence without the bounded gradients assumption
LM Nguyen, PH Nguyen, M van Dijk, P Richtárik, K Scheinberg, M Takáč
arXiv preprint arXiv:1802.03801, 2018
The interpose PUF: Secure PUF design against state-of-the-art machine learning attacks
PH Nguyen, DP Sahoo, C Jin, K Mahmood, U Rührmair, M van Dijk
Cryptology ePrint Archive, 2018
A multiplexer-based arbiter PUF composition with enhanced reliability and security
DP Sahoo, D Mukhopadhyay, RS Chakraborty, PH Nguyen
IEEE Transactions on Computers 67 (3), 403-417, 2017
A case of lightweight PUF constructions: Cryptanalysis and machine learning attacks
DP Sahoo, PH Nguyen, D Mukhopadhyay, RS Chakraborty
IEEE Transactions on Computer-Aided Design of Integrated Circuits and …, 2015
A biased fault attack on the time redundancy countermeasure for AES
S Patranabis, A Chakraborty, PH Nguyen, D Mukhopadhyay
International workshop on constructive side-channel analysis and secure …, 2015
Splitting the interpose PUF: A novel modeling attack strategy
N Wisiol, C Mühl, N Pirnay, PH Nguyen, M Margraf, JP Seifert, M van Dijk, ...
IACR Transactions on Cryptographic Hardware and Embedded Systems, 97-120, 2020
Finite-sum smooth optimization with SARAH
LM Nguyen, M van Dijk, DT Phan, PH Nguyen, TW Weng, ...
Computational Optimization and Applications, 1-33, 2022
New convergence aspects of stochastic gradient algorithms
LM Nguyen, PH Nguyen, P Richtárik, K Scheinberg, M Takác, M van Dijk
arXiv, 2019
Differential attacks against stream cipher ZUC
H Wu, T Huang, PH Nguyen, H Wang, S Ling
International Conference on the Theory and Application of Cryptology and …, 2012
On 3-share threshold implementations for 4-bit s-boxes
S Kutzner, PH Nguyen, A Poschmann, H Wang
International Workshop on Constructive Side-Channel Analysis and Secure …, 2013
A unified convergence analysis for shuffling-type gradient methods
LM Nguyen, Q Tran-Dinh, DT Phan, PH Nguyen, M Van Dijk
The Journal of Machine Learning Research 22 (1), 9397-9440, 2021
Fpga implementation of a cryptographically-secure puf based on learning parity with noise
C Jin, C Herder, L Ren, PH Nguyen, B Fuller, S Devadas, M Van Dijk
Cryptography 1 (3), 23, 2017
Improving the algorithm 2 in multidimensional linear cryptanalysis
PH Nguyen, H Wu, H Wang
Australasian Conference on Information Security and Privacy, 61-74, 2011
Efficient attacks on robust ring oscillator PUF with enhanced challenge-response set
PH Nguyen, DP Sahoo, RS Chakraborty, D Mukhopadhyay
2015 Design, Automation & Test in Europe Conference & Exhibition (DATE), 641-646, 2015
Security analysis of arbiter PUF and its lightweight compositions under predictability test
PH Nguyen, DP Sahoo, RS Chakraborty, D Mukhopadhyay
ACM Transactions on Design Automation of Electronic Systems (TODAES) 22 (2 …, 2016
Architectural bias: A novel statistical metric to evaluate arbiter PUF variants.
DP Sahoo, PH Nguyen, RS Chakraborty, D Mukhopadhyay
IACR Cryptol. ePrint Arch. 2016, 57, 2016
Enabling 3-share threshold implementations for all 4-bit s-boxes
S Kutzner, PH Nguyen, A Poschmann
International Conference on Information Security and Cryptology, 91-108, 2013
Cryptanalysis of the stream cipher zuc in the 3gpp confidentiality & integrity algorithms 128-eea3 & 128-eia3
H Wu, PH Nguyen, H Wang, S Ling
Rump session of Asiacrypt 2010, 2010
Tight dimension independent lower bound on the expected convergence rate for diminishing step sizes in SGD
P NGUYEN, L Nguyen, M van Dijk
Advances in Neural Information Processing Systems 32, 2019
Asynchronous federated learning with reduced number of rounds and with differential privacy from less aggregated gaussian noise
M van Dijk, NV Nguyen, TN Nguyen, LM Nguyen, Q Tran-Dinh, ...
arXiv preprint arXiv:2007.09208, 2020
The system can't perform the operation now. Try again later.
Articles 1–20