Author of the publication

Finding Impossible Differentials in ARX Ciphers under Weak Keys.

, , , , , , and . IACR Trans. Symmetric Cryptol., 2024 (1): 326-356 (2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Piecewise Patching for Time-shifted TV Over HFC Networks., , , and . IEEE Trans. Consumer Electron., 53 (3): 891-897 (2007)HierTrain: Fast Hierarchical Edge AI Learning with Hybrid Parallelism in Mobile-Edge-Cloud Computing., , , and . CoRR, (2020)Stochastic Alternating Direction Method of Multipliers for Byzantine-Robust Distributed Learning., , and . CoRR, (2021)Video error concealment via total variation regularized matrix completion., , , , and . ICIP, page 1633-1636. IEEE, (2012)Learning Deep ℓ0 Encoders., , and . AAAI, page 2194-2200. AAAI Press, (2016)Conditional Augmentation for Aspect Term Extraction via Masked Sequence-to-Sequence Generation., , , , and . ACL, page 7056-7066. Association for Computational Linguistics, (2020)Stochastic Admm For Byzantine-Robust Distributed Learning., , , and . ICASSP, page 3172-3176. IEEE, (2020)Robust Decentralized Dynamic Optimization., , and . ICASSP, page 3639-3643. IEEE, (2018)An Online Convex Optimization Approach to Proactive Network Resource Allocation., , and . IEEE Trans. Signal Process., 65 (24): 6350-6364 (2017)Distributed Constrained Optimization Over Cloud-Based Multi-agent Networks., , , and . WASA, volume 9798 of Lecture Notes in Computer Science, page 91-102. Springer, (2016)