Follow
Hai H. Nguyen
Title
Cited by
Cited by
Year
Stability in matching markets with complex constraints
H Nguyen, T Nguyen, A Teytelboym
Management Science 67 (12), 7438-7454, 2021
332021
Secure computation based on leaky correlations: High resilience setting
AR Block, HK Maji, HH Nguyen
Annual International Cryptology Conference, 3-32, 2017
202017
Leakage-resilience of the shamir secret-sharing scheme against physical-bit leakages
HK Maji, HH Nguyen, A Paskin-Cherniavsky, T Suad, M Wang
Annual International Conference on the Theory and Applications of …, 2021
182021
Secure computation with constant communication overhead using multiplication embeddings
AR Block, HK Maji, HH Nguyen
International Conference on Cryptology in India, 375-398, 2018
182018
Secure non-interactive simulation: feasibility and rate
H Amini Khorasgani, HK Maji, HH Nguyen
Annual International Conference on the Theory and Applications of …, 2022
82022
Lower bounds for leakage-resilient secret-sharing schemes against probing attacks
DQ Adams, HK Maji, HH Nguyen, ML Nguyen, A Paskin-Cherniavsky, ...
2021 IEEE International Symposium on Information Theory (ISIT), 976-981, 2021
82021
Improved bound on the local leakage-resilience of Shamir’s secret sharing
HK Maji, HH Nguyen, A Paskin-Cherniavsky, M Wang
2022 IEEE International Symposium on Information Theory (ISIT), 2678-2683, 2022
72022
Decidability of secure non-interactive simulation of doubly symmetric binary source
HA Khorasgani, HK Maji, HH Nguyen
Cryptology ePrint Archive, 2021
62021
Secure computation using leaky correlations (asymptotically optimal constructions)
AR Block, D Gupta, HK Maji, HH Nguyen
Theory of Cryptography Conference, 36-65, 2018
62018
Tight Estimate of the Local Leakage Resilience of the Additive Secret-Sharing Scheme {\&} Its Consequences
HK Maji, HH Nguyen, A Paskin, T Suad, M Wang, X Ye, A Yu
3rd Conference on Information-Theoretic Cryptography, ITC, 2022
52022
Leakage-resilient linear secret-sharing against arbitrary bounded-size leakage family
HK Maji, HH Nguyen, A Paskin-Cherniavsky, T Suad, M Wang, X Ye, A Yu
Theory of Cryptography Conference, 355-383, 2022
32022
-free Partition and Cover Numbers and Application
AR Block, S Branzei, HK Maji, H Mehta, T Mukherjee, HH Nguyen
Cryptology ePrint Archive, 2020
32020
Secure Non-interactive Simulation: Hardness & Feasibility.
HA Khorasgani, HK Maji, HH Nguyen
IACR Cryptol. ePrint Arch. 2020, 252, 2020
32020
Secure non-interactive simulation from arbitrary joint distributions
HA Khorasgani, HK Maji, HH Nguyen
Theory of Cryptography Conference, 378-407, 2022
22022
Geometry of secure two-party computation
S Basu, HA Khorasgani, HK Maji, HH Nguyen
2022 IEEE 63rd Annual Symposium on Foundations of Computer Science (FOCS …, 2022
22022
Allocation with Weak Priorities and General Constraints
YS Lin, H Nguyen, T Nguyen, K Altinkemer
Operations Research 70 (5), 2804-2819, 2022
12022
P₄-free Partition and Cover Numbers & Applications
AR Block, S Brânzei, HK Maji, H Mehta, T Mukherjee, HH Nguyen
2nd Conference on Information-Theoretic Cryptography (ITC 2021), 2021
12021
Learning Non-parametric Choice Models with Discrete Fourier Analysis
H Song, HH Nguyen, T Nguyen
2024
Unconditional Security using (Random) Anonymous Bulletin Board
A Yu, HH Nguyen, A Kate, HK Maji
Cryptology ePrint Archive, 2024
2024
Randomized Functions with High Round Complexity
S Basu, HA Khorasgani, HK Maji, HH Nguyen
Theory of Cryptography Conference, 319-348, 2023
2023
The system can't perform the operation now. Try again later.
Articles 1–20