Follow
Hai H. Nguyen
Title
Cited by
Cited by
Year
Stability in matching markets with complex constraints
H Nguyen, T Nguyen, A Teytelboym
Management Science 67 (12), 7438-7454, 2021
322021
Secure computation based on leaky correlations: High resilience setting
AR Block, HK Maji, HH Nguyen
Annual International Cryptology Conference, 3-32, 2017
202017
Secure computation with constant communication overhead using multiplication embeddings
AR Block, HK Maji, HH Nguyen
International Conference on Cryptology in India, 375-398, 2018
182018
Leakage-resilience of the shamir secret-sharing scheme against physical-bit leakages
HK Maji, HH Nguyen, A Paskin-Cherniavsky, T Suad, M Wang
Annual International Conference on the Theory and Applications of …, 2021
172021
Secure non-interactive simulation: feasibility and rate
H Amini Khorasgani, HK Maji, HH Nguyen
Annual International Conference on the Theory and Applications of …, 2022
82022
Lower bounds for leakage-resilient secret-sharing schemes against probing attacks
DQ Adams, HK Maji, HH Nguyen, ML Nguyen, A Paskin-Cherniavsky, ...
2021 IEEE International Symposium on Information Theory (ISIT), 976-981, 2021
82021
Improved bound on the local leakage-resilience of Shamir’s secret sharing
HK Maji, HH Nguyen, A Paskin-Cherniavsky, M Wang
2022 IEEE International Symposium on Information Theory (ISIT), 2678-2683, 2022
72022
Decidability of secure non-interactive simulation of doubly symmetric binary source
HA Khorasgani, HK Maji, HH Nguyen
Cryptology ePrint Archive, 2021
62021
Secure computation using leaky correlations (asymptotically optimal constructions)
AR Block, D Gupta, HK Maji, HH Nguyen
Theory of Cryptography Conference, 36-65, 2018
62018
Tight Estimate of the Local Leakage Resilience of the Additive Secret-Sharing Scheme {\&} Its Consequences
HK Maji, HH Nguyen, A Paskin, T Suad, M Wang, X Ye, A Yu
3rd Conference on Information-Theoretic Cryptography, ITC, 2022
52022
Leakage-resilient linear secret-sharing against arbitrary bounded-size leakage family
HK Maji, HH Nguyen, A Paskin-Cherniavsky, T Suad, M Wang, X Ye, A Yu
Theory of Cryptography Conference, 355-383, 2022
32022
-free Partition and Cover Numbers and Application
AR Block, S Branzei, HK Maji, H Mehta, T Mukherjee, HH Nguyen
Cryptology ePrint Archive, 2020
32020
Secure Non-interactive Simulation: Hardness & Feasibility.
HA Khorasgani, HK Maji, HH Nguyen
IACR Cryptol. ePrint Arch. 2020, 252, 2020
32020
Secure non-interactive simulation from arbitrary joint distributions
HA Khorasgani, HK Maji, HH Nguyen
Theory of Cryptography Conference, 378-407, 2022
22022
Geometry of secure two-party computation
S Basu, HA Khorasgani, HK Maji, HH Nguyen
2022 IEEE 63rd Annual Symposium on Foundations of Computer Science (FOCS …, 2022
22022
Allocation with Weak Priorities and General Constraints
YS Lin, H Nguyen, T Nguyen, K Altinkemer
Operations Research 70 (5), 2804-2819, 2022
12022
P₄-free Partition and Cover Numbers & Applications
AR Block, S Brânzei, HK Maji, H Mehta, T Mukherjee, HH Nguyen
2nd Conference on Information-Theoretic Cryptography (ITC 2021), 2021
12021
Learning Non-parametric Choice Models with Discrete Fourier Analysis
H Song, HH Nguyen, T Nguyen
2024
Unconditional Security using (Random) Anonymous Bulletin Board
A Yu, HH Nguyen, A Kate, HK Maji
Cryptology ePrint Archive, 2024
2024
Randomized Functions with High Round Complexity
S Basu, HA Khorasgani, HK Maji, HH Nguyen
Theory of Cryptography Conference, 319-348, 2023
2023
The system can't perform the operation now. Try again later.
Articles 1–20