Follow
Hai H. Nguyen
Title
Cited by
Cited by
Year
Stability in matching markets with complex constraints
H Nguyen, T Nguyen, A Teytelboym
Management Science 67 (12), 7438-7454, 2021
262021
Secure computation with constant communication overhead using multiplication embeddings
AR Block, HK Maji, HH Nguyen
Progress in Cryptology–INDOCRYPT 2018: 19th International Conference on …, 2018
182018
Secure computation based on leaky correlations: High resilience setting
AR Block, HK Maji, HH Nguyen
Advances in Cryptology–CRYPTO 2017: 37th Annual International Cryptology …, 2017
182017
Leakage-resilience of the shamir secret-sharing scheme against physical-bit leakages
HK Maji, HH Nguyen, A Paskin-Cherniavsky, T Suad, M Wang
Advances in Cryptology–EUROCRYPT 2021: 40th Annual International Conference …, 2021
92021
Secure non-interactive simulation: feasibility and rate
H Amini Khorasgani, HK Maji, HH Nguyen
Advances in Cryptology–EUROCRYPT 2022: 41st Annual International Conference …, 2022
52022
Lower Bounds for Leakage-Resilient Secret-Sharing Schemes against Probing Attacks
DQ Adams, HK Maji, HH Nguyen, ML Nguyen, A Paskin-Cherniavsky, ...
2021 IEEE International Symposium on Information Theory (ISIT), 976-981, 2021
52021
Secure computation using leaky correlations (asymptotically optimal constructions)
AR Block, D Gupta, HK Maji, HH Nguyen
Theory of Cryptography: 16th International Conference, TCC 2018, Panaji …, 2018
52018
Decidability of secure non-interactive simulation of doubly symmetric binary source
HA Khorasgani, HK Maji, HH Nguyen
Cryptology ePrint Archive, 2021
42021
-free Partition and Cover Numbers and Application
AR Block, S Brânzei, HK Maji, H Mehta, T Mukherjee, HH Nguyen
Cryptology ePrint Archive, 2020
32020
Secure Non-interactive Simulation: Hardness & Feasibility.
HA Khorasgani, HK Maji, HH Nguyen
IACR Cryptol. ePrint Arch. 2020, 252, 2020
32020
Improved bound on the local leakage-resilience of Shamir’s secret sharing
HK Maji, HH Nguyen, A Paskin-Cherniavsky, M Wang
2022 IEEE International Symposium on Information Theory (ISIT), 2678-2683, 2022
12022
Tight estimate of the local leakage resilience of the additive secret-sharing scheme & its consequences
HK Maji, HH Nguyen, A Paskin-Cherniavsky, T Suad, M Wang, X Ye, A Yu
3rd Conference on Information-Theoretic Cryptography (ITC 2022), 2022
12022
Leakage-resilient Linear Secret-sharing Against Arbitrary Bounded-size Leakage Family
HK Maji, HH Nguyen, A Paskin-Cherniavsky, T Suad, M Wang, X Ye, A Yu
Theory of Cryptography: 20th International Conference, TCC 2022, Chicago, IL …, 2023
2023
Secure Non-interactive Simulation from Arbitrary Joint Distributions
HA Khorasgani, HK Maji, HH Nguyen
Theory of Cryptography: 20th International Conference, TCC 2022, Chicago, IL …, 2023
2023
Feasibility, Efficiency, and Robustness of Secure Computation
HH Nguyen
Purdue University Graduate School, 2022
2022
Geometry of Secure Two-party Computation
S Basu, HA Khorasgani, HK Maji, HH Nguyen
2022 IEEE 63rd Annual Symposium on Foundations of Computer Science (FOCS …, 2022
2022
Allocation with Weak Priorities and General Constraints
YS Lin, H Nguyen, T Nguyen, K Altinkemer
Operations Research 70 (5), 2804-2819, 2022
2022
P-free Partition and Cover Numbers {\&} Applications
A Block, S Branzei, H Maji, H Mehta, T Mukherjee, H Nguyen
2nd Conference on Information-Theoretic Cryptography,{ITC} 2021, July 23-26 …, 2021
2021
P₄-free Partition and Cover Numbers & Applications
AR Block, S Brânzei, HK Maji, H Mehta, T Mukherjee, HH Nguyen
2nd Conference on Information-Theoretic Cryptography (ITC 2021), 2021
2021
Round-Optimal Correlation Extractors with Linear Production and Leakage Resilience
AR Block, D Gupta, HK Maji, HH Nguyen
2017
The system can't perform the operation now. Try again later.
Articles 1–20