Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Improving Bert Model Accuracy for Uni-modal Aspect-Based Sentiment Analysis Task., and . Scalable Comput. Pract. Exp., 24 (3): 277-286 (September 2023)Relay feedback-based Critical parameter estimation for First order plus dead Time Type plant in Networked control System Configuration., , , and . Int. J. Model. Simul. Sci. Comput., (2011)Alexa Teacher Model: Pretraining and Distilling Multi-Billion-Parameter Encoders for Natural Language Understanding Systems., , , , , , , , , and 31 other author(s). KDD, page 2893-2902. ACM, (2022)Quantum Resource Estimates of Grover's Key Search on ARIA., and . SPACE, volume 12586 of Lecture Notes in Computer Science, page 238-258. Springer, (2020)PQC Acceleration Using GPUs: FrodoKEM, NewHope, and Kyber., , , and . IEEE Trans. Parallel Distributed Syst., 32 (3): 575-586 (2021)Exploiting the Leakage: Analysis of Some Authenticated Encryption Schemes., , , , and . SPACE, volume 10076 of Lecture Notes in Computer Science, page 383-401. Springer, (2016)Quantum Security of FOX Construction based on Lai-Massey Scheme., and . IACR Cryptol. ePrint Arch., (2022)Apollo: End-to-End Verifiable Voting Protocol Using Mixnet and Hidden Tweaks., , , and . ICISC, volume 9558 of Lecture Notes in Computer Science, page 194-209. Springer, (2015)Implementing Grover Oracle for Lightweight Block Ciphers Under Depth Constraints., , and . ACISP, volume 13494 of Lecture Notes in Computer Science, page 85-105. Springer, (2022)Revocable Identity-Based Encryption from Codes with Rank Metric., , , and . CT-RSA, volume 10808 of Lecture Notes in Computer Science, page 435-451. Springer, (2018)