Ivan Tjuawinata

Orcid: 0000-0002-4731-1426

According to our database1, Ivan Tjuawinata authored at least 23 papers between 2015 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Explicit Construction of q-Ary 2-Deletion Correcting Codes With Low Redundancy.
IEEE Trans. Inf. Theory, June, 2024

On Information-Theoretic Secure Multiparty Computation with Local Repairability.
IACR Cryptol. ePrint Arch., 2024

Local differential privacy and its applications: A comprehensive survey.
Comput. Stand. Interfaces, 2024

Privacy-Preserving Federated Unlearning with Certified Client Removal.
CoRR, 2024

2023
A Lower Bound on the List-Decodability of Insdel Codes.
IEEE Trans. Inf. Theory, November, 2023

Differentially Private Distributed Frequency Estimation.
IEEE Trans. Dependable Secur. Comput., 2023

2022
Secure Hot Path Crowdsourcing With Local Differential Privacy Under Fog Computing Architecture.
IEEE Trans. Serv. Comput., 2022

Leakage-Resilient Secret Sharing With Constant Share Size.
IEEE Trans. Inf. Theory, 2022

K-Means Clustering With Local dᵪ-Privacy for Privacy-Preserving Data Analysis.
IEEE Trans. Inf. Forensics Secur., 2022

2021
Efficiently List-Decodable Insertion and Deletion Codes via Concatenation.
IEEE Trans. Inf. Theory, 2021

Explicit Constructions of Two-Dimensional Reed-Solomon Codes in High Insertion and Deletion Noise Regime.
IEEE Trans. Inf. Theory, 2021

List Decodability of Linear Subcodes of Gabidulin Codes.
IEEE Commun. Lett., 2021

On 2-dimensional insertion-deletion Reed-Solomon codes with optimal asymptotic error-correcting capability.
Finite Fields Their Appl., 2021

Fair and Differentially Private Distributed Frequency Estimation.
CoRR, 2021

Protecting Big Data Privacy Using Randomized Tensor Network Decomposition and Dispersed Tensor Computation.
CoRR, 2021

2020
MPC-enabled Privacy-Preserving Neural Network Training against Malicious Attack.
CoRR, 2020

2019
Explicit Constructions of Two-Dimensional Reed-Solomon Codes in High Insertion and Deletion Noise Regime.
CoRR, 2019

On List Decoding of Insertion and Deletion Errors.
CoRR, 2019

2018
Reducing the Average Delay in Gradient Coding.
Proceedings of the International Symposium on Information Theory and Its Applications, 2018

2017
Improved Differential Cryptanalysis on Generalized Feistel Schemes.
IACR Cryptol. ePrint Arch., 2017

Cryptanalysis of Simpira v2.
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017

2015
Cryptanalysis of the Authenticated Encryption Algorithm COFFE.
IACR Cryptol. ePrint Arch., 2015

Differential-Linear Cryptanalysis of ICEPOLE.
IACR Cryptol. ePrint Arch., 2015


  Loading...