متابعة
Hai H. Nguyen
Hai H. Nguyen
ETH Zurich
بريد إلكتروني تم التحقق منه على purdue.edu - الصفحة الرئيسية
عنوان
عدد مرات الاقتباسات
عدد مرات الاقتباسات
السنة
Stability in matching markets with complex constraints
H Nguyen, T Nguyen, A Teytelboym
Management Science 67 (12), 7438-7454, 2021
392021
Leakage-resilience of the shamir secret-sharing scheme against physical-bit leakages
HK Maji, HH Nguyen, A Paskin-Cherniavsky, T Suad, M Wang
Annual International Conference on the Theory and Applications of …, 2021
242021
Secure computation with constant communication overhead using multiplication embeddings
AR Block, HK Maji, HH Nguyen
International Conference on Cryptology in India, 375-398, 2018
222018
Secure computation based on leaky correlations: high resilience setting
AR Block, HK Maji, HH Nguyen
Annual International Cryptology Conference, 3-32, 2017
222017
Improved bound on the local leakage-resilience of Shamir’s secret sharing
HK Maji, HH Nguyen, A Paskin-Cherniavsky, M Wang
2022 IEEE International Symposium on Information Theory (ISIT), 2678-2683, 2022
132022
Lower bounds for leakage-resilient secret-sharing schemes against probing attacks
DQ Adams, HK Maji, HH Nguyen, ML Nguyen, A Paskin-Cherniavsky, ...
2021 IEEE International Symposium on Information Theory (ISIT), 976-981, 2021
122021
Leakage-resilient linear secret-sharing against arbitrary bounded-size leakage family
HK Maji, HH Nguyen, A Paskin-Cherniavsky, T Suad, M Wang, X Ye, A Yu
Theory of Cryptography Conference, 355-383, 2022
92022
Tight Estimate of the Local Leakage Resilience of the Additive Secret-Sharing Scheme {\&} Its Consequences
HK Maji, HH Nguyen, A Paskin, T Suad, M Wang, X Ye, A Yu
3rd Conference on Information-Theoretic Cryptography, ITC, 2022
92022
Secure computation using leaky correlations (asymptotically optimal constructions)
AR Block, D Gupta, HK Maji, HH Nguyen
Theory of Cryptography Conference, 36-65, 2018
92018
Secure non-interactive simulation: Feasibility and rate
H Amini Khorasgani, HK Maji, HH Nguyen
Annual International Conference on the Theory and Applications of …, 2022
82022
Decidability of secure non-interactive simulation of doubly symmetric binary source
HA Khorasgani, HK Maji, HH Nguyen
Cryptology ePrint Archive, 2021
62021
-free Partition and Cover Numbers and Application
AR Block, S Brânzei, HK Maji, H Mehta, T Mukherjee, HH Nguyen
Cryptology ePrint Archive, 2020
62020
Constructing leakage-resilient Shamir’s secret sharing: Over composite order fields
HK Maji, HH Nguyen, A Paskin-Cherniavsky, X Ye
Annual International Conference on the Theory and Applications of …, 2024
32024
Geometry of secure two-party computation
S Basu, HA Khorasgani, HK Maji, HH Nguyen
2022 IEEE 63rd Annual Symposium on Foundations of Computer Science (FOCS …, 2022
32022
Secure Non-interactive Simulation: Hardness & Feasibility.
HA Khorasgani, HK Maji, HH Nguyen
IACR Cryptol. ePrint Arch. 2020, 252, 2020
32020
Unconditional security using (random) anonymous bulletin board
A Yu, HH Nguyen, A Kate, HK Maji
2024 IEEE International Symposium on Information Theory (ISIT), 1866-1871, 2024
22024
Secure non-interactive simulation from arbitrary joint distributions
HA Khorasgani, HK Maji, HH Nguyen
Theory of Cryptography Conference, 378-407, 2022
22022
Allocation with weak priorities and general constraints
YS Lin, H Nguyen, T Nguyen, K Altinkemer
Operations Research 70 (5), 2804-2819, 2022
22022
Randomized Functions with High Round Complexity
S Basu, HA Khorasgani, HK Maji, HH Nguyen
Theory of Cryptography Conference, 319-348, 2023
12023
Solving Linear Inequalities over Convex Sets & its Applications to Cryptography and Hydrodynamics
S Basu, HA Khorasgani, HK Maji, HH Nguyen
2024
يتعذر على النظام إجراء العملية في الوقت الحالي. عاود المحاولة لاحقًا.
مقالات 1–20