Hai H. Nguyen
Title
Cited by
Cited by
Year
Secure computation based on leaky correlations: high resilience setting
AR Block, HK Maji, HH Nguyen
Annual International Cryptology Conference, 3-32, 2017
122017
Stability in matching markets with complex constraints
H Nguyen, T Nguyen, A Teytelboym
Management Science, 2021
112021
Secure computation with constant communication overhead using multiplication embeddings
AR Block, HK Maji, HH Nguyen
International Conference on Cryptology in India, 375-398, 2018
52018
Secure computation using leaky correlations (asymptotically optimal constructions)
AR Block, D Gupta, HK Maji, HH Nguyen
Theory of Cryptography Conference, 36-65, 2018
42018
Secure Non-interactive Simulation: Hardness & Feasibility.
HA Khorasgani, HK Maji, HH Nguyen
IACR Cryptol. ePrint Arch. 2020, 252, 2020
32020
Secure Computation with Constant Communication Overhead Using Multiplication Embeddings
R Alexander, HK Maji, HH Nguyen
Progress in Cryptology–INDOCRYPT 2018: 19th International Conference on …, 2018
2018
Secure Computation Using Leaky Correlations (Asymptotically Optimal Constructions)
HH Nguyen
Theory of Cryptography: 16th International Conference, TCC 2018, Panaji …, 2018
2018
Round-Optimal Correlation Extractors with Linear Production and Leakage Resilience
AR Block, D Gupta, HK Maji, HH Nguyen
2017
Maximum Leakage Resilience of the Inner-Product Correlation while performing General Secure 2-party Computation
AR Block, HK Maji, HH Nguyen
2016
P4-free Partition and Cover Numbers and Application
AR Block, S Brânzei, HK Maji, H Mehta, T Mukherjee, HH Nguyen
Allocation with Weak Priorities and General Constraints
YS Lin, H Nguyen, T Nguyen, K Altinkemer
Lower Bounds for Leakage-Resilient Secret Sharing Schemes against Probing Attacks
DQ Adams, HK Maji, HH Nguyen, ML Nguyen, A Paskin-Cherniavsky, ...
P4-free Partition and Cover Numbers
AR Block, S Brânzei, HK Maji, H Mehta, T Mukherjee, HH Nguyen
Secure Non-interactive Simulation: Feasibility & Rate
HA Khorasgani, HK Maji, HH Nguyen
Leakage-resilience of the Shamir Secret-sharing Scheme against Physical-bit Leakages
HK Maji, HH Nguyen, A Paskin-Cherniavsky, T Suad, M Wang
Decidability of Secure Non-interactive Simulation of Doubly Symmetric Binary Source
HA Khorasgani, HK Maji, HH Nguyen
The system can't perform the operation now. Try again later.
Articles 1–16