Follow
Phuong Ha Nguyen
Title
Cited by
Cited by
Year
SGD and Hogwild! convergence without the bounded gradients assumption
LM Nguyen, PH Nguyen, M van Dijk, P Richtárik, K Scheinberg, M Takáč
arXiv preprint arXiv:1802.03801, 2018
2452018
The interpose PUF: Secure PUF design against state-of-the-art machine learning attacks
PH Nguyen, DP Sahoo, C Jin, K Mahmood, U Rührmair, M Van Dijk
Cryptology ePrint Archive, 2018
1962018
A multiplexer-based arbiter PUF composition with enhanced reliability and security
DP Sahoo, D Mukhopadhyay, RS Chakraborty, PH Nguyen
IEEE Transactions on Computers 67 (3), 403-417, 2017
1662017
Splitting the interpose PUF: A novel modeling attack strategy
N Wisiol, C Mühl, N Pirnay, PH Nguyen, M Margraf, JP Seifert, M Van Dijk, ...
IACR Transactions on Cryptographic Hardware and Embedded Systems, 97-120, 2020
1062020
A case of lightweight PUF constructions: Cryptanalysis and machine learning attacks
DP Sahoo, PH Nguyen, D Mukhopadhyay, RS Chakraborty
IEEE Transactions on Computer-Aided Design of Integrated Circuits and …, 2015
1012015
A unified convergence analysis for shuffling-type gradient methods
LM Nguyen, Q Tran-Dinh, DT Phan, PH Nguyen, M Van Dijk
Journal of Machine Learning Research 22 (207), 1-44, 2021
822021
Finite-sum smooth optimization with SARAH
LM Nguyen, M van Dijk, DT Phan, PH Nguyen, TW Weng, ...
Computational Optimization and Applications 82 (3), 561-593, 2022
71*2022
A biased fault attack on the time redundancy countermeasure for AES
S Patranabis, A Chakraborty, PH Nguyen, D Mukhopadhyay
International workshop on constructive side-channel analysis and secure …, 2015
712015
New convergence aspects of stochastic gradient algorithms
LM Nguyen, PH Nguyen, P Richtárik, K Scheinberg, M Takáč, M van Dijk
Journal of Machine Learning Research 20 (176), 1-49, 2019
682019
Differential attacks against stream cipher ZUC
H Wu, T Huang, PH Nguyen, H Wang, S Ling
International Conference on the Theory and Application of Cryptology and …, 2012
492012
On 3-share threshold implementations for 4-bit s-boxes
S Kutzner, PH Nguyen, A Poschmann, H Wang
Constructive Side-Channel Analysis and Secure Design: 4th International …, 2013
422013
Security analysis of arbiter PUF and its lightweight compositions under predictability test
PH Nguyen, DP Sahoo, RS Chakraborty, D Mukhopadhyay
ACM Transactions on Design Automation of Electronic Systems (TODAES) 22 (2 …, 2016
412016
Asynchronous federated learning with reduced number of rounds and with differential privacy from less aggregated gaussian noise
M van Dijk, NV Nguyen, TN Nguyen, LM Nguyen, Q Tran-Dinh, ...
arXiv preprint arXiv:2007.09208, 2020
402020
Fpga implementation of a cryptographically-secure puf based on learning parity with noise
C Jin, C Herder, L Ren, PH Nguyen, B Fuller, S Devadas, M Van Dijk
Cryptography 1 (3), 23, 2017
362017
Improving the algorithm 2 in multidimensional linear cryptanalysis
PH Nguyen, H Wu, H Wang
Australasian Conference on Information Security and Privacy, 61-74, 2011
362011
Tight dimension independent lower bound on the expected convergence rate for diminishing step sizes in SGD
PH Nguyen, L Nguyen, M van Dijk
Advances in Neural Information Processing Systems 32, 2019
312019
A hybrid stochastic policy gradient algorithm for reinforcement learning
N Pham, L Nguyen, D Phan, PH Nguyen, M Dijk, Q Tran-Dinh
International Conference on Artificial Intelligence and Statistics, 374-385, 2020
282020
Efficient attacks on robust ring oscillator PUF with enhanced challenge-response set
PH Nguyen, DP Sahoo, RS Chakraborty, D Mukhopadhyay
2015 Design, Automation & Test in Europe Conference & Exhibition (DATE), 641-646, 2015
282015
Architectural bias: A novel statistical metric to evaluate arbiter PUF variants.
DP Sahoo, PH Nguyen, RS Chakraborty, D Mukhopadhyay
IACR Cryptol. ePrint Arch. 2016, 57, 2016
262016
Enabling 3-share threshold implementations for all 4-bit s-boxes
S Kutzner, PH Nguyen, A Poschmann
Information Security and Cryptology--ICISC 2013: 16th International …, 2014
232014
The system can't perform the operation now. Try again later.
Articles 1–20