Author of the publication

Quantum Circuit Implementations of AES with Fewer Qubits.

, , , , and . ASIACRYPT (2), volume 12492 of Lecture Notes in Computer Science, page 697-726. Springer, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Robust Single-Step Adversarial Training with Regularizer., , , and . PRCV (4), volume 13022 of Lecture Notes in Computer Science, page 29-41. Springer, (2021)Further results on several classes of optimal ternary cyclic codes with minimum distance four., , , and . IACR Cryptol. ePrint Arch., (2023)Blockchain-Based Dynamic Time-Encapsulated Data Auditing for Outsourcing Storage., , , , , and . IEEE Trans. Inf. Forensics Secur., (2024)SOCI: A Toolkit for Secure Outsourced Computation on Integers., , , , , and . IEEE Trans. Inf. Forensics Secur., (2022)AMAD: Improving Adversarial Robustness Without Reducing Accuracy., , and . ML4CS (2), volume 13656 of Lecture Notes in Computer Science, page 1-14. Springer, (2022)Research on Information Coordination Mechanism of Multi-participants in Community-based Elderly Care by Blockchain., , and . DASC/PiCom/CBDCom/CyberSciTech, page 1-4. IEEE, (2022)Attacking Network Isolation in Software-Defined Networks: New Attacks and Countermeasures., , , , , and . ICCCN, page 1-9. IEEE, (2018)Graph Unlearning Using Knowledge Distillation., , , and . ICICS, volume 14252 of Lecture Notes in Computer Science, page 485-501. Springer, (2023)Enhance Transferability of Adversarial Examples with Model Architecture., , , and . ICASSP, page 1-5. IEEE, (2023)Combating False Sense of Security: Breaking the Defense of Adversarial Training Via Non-Gradient Adversarial Attack., , , , , and . ICASSP, page 3293-3297. IEEE, (2022)