Follow
Hai H. Nguyen
Hai H. Nguyen
ETH Zurich
Verified email at purdue.edu - Homepage
Title
Cited by
Cited by
Year
Stability in matching markets with complex constraints
H Nguyen, T Nguyen, A Teytelboym
Management Science 67 (12), 7438-7454, 2021
362021
Leakage-resilience of the shamir secret-sharing scheme against physical-bit leakages
HK Maji, HH Nguyen, A Paskin-Cherniavsky, T Suad, M Wang
Annual International Conference on the Theory and Applications of …, 2021
232021
Secure computation with constant communication overhead using multiplication embeddings
AR Block, HK Maji, HH Nguyen
International Conference on Cryptology in India, 375-398, 2018
212018
Secure computation based on leaky correlations: high resilience setting
AR Block, HK Maji, HH Nguyen
Annual International Cryptology Conference, 3-32, 2017
212017
Lower bounds for leakage-resilient secret-sharing schemes against probing attacks
DQ Adams, HK Maji, HH Nguyen, ML Nguyen, A Paskin-Cherniavsky, ...
2021 IEEE International Symposium on Information Theory (ISIT), 976-981, 2021
122021
Improved bound on the local leakage-resilience of Shamir’s secret sharing
HK Maji, HH Nguyen, A Paskin-Cherniavsky, M Wang
2022 IEEE International Symposium on Information Theory (ISIT), 2678-2683, 2022
112022
Tight Estimate of the Local Leakage Resilience of the Additive Secret-Sharing Scheme {\&} Its Consequences
HK Maji, HH Nguyen, A Paskin, T Suad, M Wang, X Ye, A Yu
3rd Conference on Information-Theoretic Cryptography, ITC, 2022
92022
Leakage-resilient linear secret-sharing against arbitrary bounded-size leakage family
HK Maji, HH Nguyen, A Paskin-Cherniavsky, T Suad, M Wang, X Ye, A Yu
Theory of Cryptography Conference, 355-383, 2022
82022
Secure non-interactive simulation: feasibility and rate
H Amini Khorasgani, HK Maji, HH Nguyen
Annual International Conference on the Theory and Applications of …, 2022
82022
Secure computation using leaky correlations (asymptotically optimal constructions)
AR Block, D Gupta, HK Maji, HH Nguyen
Theory of Cryptography Conference, 36-65, 2018
72018
Decidability of secure non-interactive simulation of doubly symmetric binary source
HA Khorasgani, HK Maji, HH Nguyen
Cryptology ePrint Archive, 2021
62021
-free Partition and Cover Numbers and Application
AR Block, S Brânzei, HK Maji, H Mehta, T Mukherjee, HH Nguyen
Cryptology ePrint Archive, 2020
32020
Secure Non-interactive Simulation: Hardness & Feasibility.
HA Khorasgani, HK Maji, HH Nguyen
IACR Cryptol. ePrint Arch. 2020, 252, 2020
32020
Secure non-interactive simulation from arbitrary joint distributions
HA Khorasgani, HK Maji, HH Nguyen
Theory of Cryptography Conference, 378-407, 2022
22022
Geometry of secure two-party computation
S Basu, HA Khorasgani, HK Maji, HH Nguyen
2022 IEEE 63rd Annual Symposium on Foundations of Computer Science (FOCS …, 2022
22022
Constructing Leakage-Resilient Shamir’s Secret Sharing: Over Composite Order Fields
HK Maji, HH Nguyen, A Paskin-Cherniavsky, X Ye
Annual International Conference on the Theory and Applications of …, 2024
12024
Unconditional Security using (Random) Anonymous Bulletin Board
A Yu, HH Nguyen, A Kate, HK Maji
Cryptology ePrint Archive, 2024
12024
Allocation with Weak Priorities and General Constraints
YS Lin, H Nguyen, T Nguyen, K Altinkemer
Operations Research 70 (5), 2804-2819, 2022
12022
Towards Breaking the Half-Barrier of Local Leakage-Resilient Shamir’s Secret Sharing
HH Nguyen
Annual International Cryptology Conference, 257-285, 2024
2024
Learning Non-parametric Choice Models with Discrete Fourier Analysis
H Song, HH Nguyen, T Nguyen
2024
The system can't perform the operation now. Try again later.
Articles 1–20