Volgen
Ivan Tjuawinata
Ivan Tjuawinata
Geverifieerd e-mailadres voor ntu.edu.sg
Titel
Geciteerd door
Geciteerd door
Jaar
Local differential privacy and its applications: A comprehensive survey
M Yang, T Guo, T Zhu, I Tjuawinata, J Zhao, KY Lam
Computer Standards & Interfaces, 103827, 2023
1292023
Differential-linear cryptanalysis of ICEPOLE
T Huang, I Tjuawinata, H Wu
International Workshop on Fast Software Encryption, 243-263, 2015
262015
Secure hot path crowdsourcing with local differential privacy under fog computing architecture
M Yang, I Tjuawinata, KY Lam, J Zhao, L Sun
IEEE Transactions on Services Computing 15 (4), 2188-2201, 2020
232020
K-Means Clustering With Local dᵪ-Privacy for Privacy-Preserving Data Analysis
M Yang, I Tjuawinata, KY Lam
IEEE Transactions on Information Forensics and Security 17, 2524-2537, 2022
222022
On List Decoding of Insertion and Deletion Errors
S Liu, I Tjuawinata, C Xing
arXiv preprint arXiv:1906.09705, 2019
222019
Explicit Constructions of Two-Dimensional Reed-Solomon Codes in High Insertion and Deletion Noise Regime
T Do Duc, S Liu, I Tjuawinata, C Xing
IEEE Transactions on Information Theory 67 (5), 2808-2820, 2021
162021
On 2-dimensional insertion-deletion Reed-Solomon codes with optimal asymptotic error-correcting capability
S Liu, I Tjuawinata
Finite Fields and Their Applications 73, 101841, 2021
122021
MPC-enabled Privacy-Preserving Neural Network Training against Malicious Attack
Z Liu, I Tjuawinata, C Xing, KY Lam
arXiv preprint arXiv:2007.12557, 2020
92020
Efficiently List-Decodable Insertion and Deletion Codes via Concatenation
S Liu, I Tjuawinata, C Xing
IEEE Transactions on Information Theory 67 (9), 5778-5790, 2021
72021
Improved differential cryptanalysis on generalized Feistel schemes
I Tjuawinata, T Huang, H Wu
Progress in Cryptology–INDOCRYPT 2017: 18th International Conference on …, 2017
62017
Differentially Private Distributed Frequency Estimation
M Yang, I Tjuawinata, KY Lam, T Zhu, J Zhao
IEEE Transactions on Dependable and Secure Computing, 2022
52022
Weakness in the authentication of primates-ape
I Tjuawinata, H Wu
Cryptographic Competitions Mailing List, 2014
42014
Explicit Construction of q-ary 2-deletion Correcting Codes with Low Redundancy
S Liu, I Tjuawinata, C Xing
IEEE Transactions on Information Theory, 2024
32024
List Decoding of Insertion and Deletion Codes
S Liu, I Tjuawinata, C Xing
arXiv preprint arXiv:1906.09705, 2019
32019
Leakage-Resilient Secret Sharing with Constant Share Size
I Tjuawinata, C Xing
IEEE Transactions on Information Theory 68 (12), 8228-8250, 2022
22022
Fair and Differentially Private Distributed Frequency Estimation
M Yang, I Tjuawinata, KY Lam, T Zhu, J Zhao
arXiv preprint arXiv:2104.05974, 2021
22021
Cryptanalysis of simpira v2
I Tjuawinata, T Huang, H Wu
Australasian Conference on Information Security and Privacy, 384-401, 2017
22017
Cryptanalysis of the Authenticated Encryption Algorithm COFFE
I Tjuawinata, T Huang, H Wu
Selected Areas in Cryptography–SAC 2015: 22nd International Conference …, 2016
22016
Protecting Big Data Privacy Using Randomized Tensor Network Decomposition and Dispersed Tensor Computation
JB Ong, WK Ng, I Tjuawinata, C Li, J Yang, SN Myne, H Wang, KY Lam, ...
arXiv preprint arXiv:2101.04194, 2021
12021
Practical State Recovery Attack on ICEPOLE
T Huang, H Wu, I Tjuawinata
1
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20