From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Secure Aggregation Against Malicious Users., , и . SACMAT, стр. 115-124. ACM, (2021)A Security-Friendly Privacy Solution for Federated Learning., , , , , и . AI6G@WCCI, том 3189 из CEUR Workshop Proceedings, CEUR-WS.org, (2022)A Survey and Guideline on Privacy Enhancing Technologies for Collaborative Machine Learning., , , и . IEEE Access, (2022)Biclique Cryptanalysis of TWINE., , и . CANS, 7712, стр. 43-55. Springer, (2012)Cryptanalysis of QTL Block Cipher., , и . LightSec, том 10098 из Lecture Notes in Computer Science, стр. 60-68. Springer, (2016)Linear Complexity Private Set Intersection for Secure Two-Party Protocols., и . CANS, том 12579 из Lecture Notes in Computer Science, стр. 409-429. Springer, (2020)Impossible Differential Cryptanalysis of Reduced-Round LBlock., , и . WISTP, том 7322 из Lecture Notes in Computer Science, стр. 179-188. Springer, (2012)Combined Differential and Linear Cryptanalysis of Reduced-Round PRINTcipher., , и . Selected Areas in Cryptography, том 7118 из Lecture Notes in Computer Science, стр. 169-184. Springer, (2011)Biclique cryptanalysis of LBlock and TWINE., , и . Inf. Process. Lett., 113 (12): 423-429 (2013)A Guess-and-Determine Attack on Reduced-Round Khudra and Weak Keys of Full Cipher., , и . IACR Cryptol. ePrint Arch., (2015)