From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Survey and Guideline on Privacy Enhancing Technologies for Collaborative Machine Learning., , , и . IEEE Access, (2022)A Security-Friendly Privacy Solution for Federated Learning., , , , , и . AI6G@WCCI, том 3189 из CEUR Workshop Proceedings, CEUR-WS.org, (2022)Secure Aggregation Against Malicious Users., , и . SACMAT, стр. 115-124. ACM, (2021)Cryptanalysis of QTL Block Cipher., , и . LightSec, том 10098 из Lecture Notes in Computer Science, стр. 60-68. Springer, (2016)Biclique Cryptanalysis of TWINE., , и . CANS, 7712, стр. 43-55. Springer, (2012)Biclique cryptanalysis of LBlock and TWINE., , и . Inf. Process. Lett., 113 (12): 423-429 (2013)A Guess-and-Determine Attack on Reduced-Round Khudra and Weak Keys of Full Cipher., , и . IACR Cryptol. ePrint Arch., (2015)ITUbee: A Software Oriented Lightweight Block Cipher., , и . LightSec, том 8162 из Lecture Notes in Computer Science, стр. 16-27. Springer, (2013)Multidimensional Meet-in-the-Middle Attacks on Reduced-Round TWINE-128., , и . LightSec, том 8162 из Lecture Notes in Computer Science, стр. 55-67. Springer, (2013)Linear Complexity Private Set Intersection for Secure Two-Party Protocols., и . CANS, том 12579 из Lecture Notes in Computer Science, стр. 409-429. Springer, (2020)