关注
Hai H. Nguyen
标题
引用次数
引用次数
年份
Stability in matching markets with complex constraints
H Nguyen, T Nguyen, A Teytelboym
Management Science 67 (12), 7438-7454, 2021
182021
Secure computation based on leaky correlations: high resilience setting
AR Block, HK Maji, HH Nguyen
Annual International Cryptology Conference, 3-32, 2017
172017
Secure computation with constant communication overhead using multiplication embeddings
AR Block, HK Maji, HH Nguyen
International Conference on Cryptology in India, 375-398, 2018
152018
Leakage-resilience of the Shamir Secret-sharing Scheme against Physical-bit Leakages
HK Maji, HH Nguyen, A Paskin-Cherniavsky, T Suad, M Wang
Annual International Conference on the Theory and Applications of …, 2021
72021
Secure computation using leaky correlations (asymptotically optimal constructions)
AR Block, D Gupta, HK Maji, HH Nguyen
Theory of Cryptography Conference, 36-65, 2018
62018
Lower Bounds for Leakage-Resilient Secret-Sharing Schemes against Probing Attacks
DQ Adams, HK Maji, HH Nguyen, ML Nguyen, A Paskin-Cherniavsky, ...
2021 IEEE International Symposium on Information Theory (ISIT), 976-981, 2021
42021
Secure non-interactive simulation: feasibility & rate
HA Khorasgani, HK Maji, HH Nguyen
Cryptology ePrint Archive, 2020
42020
Decidability of secure non-interactive simulation of doubly symmetric binary source
HA Khorasgani, HK Maji, HH Nguyen
Cryptology ePrint Archive, 2021
32021
Secure Non-interactive Simulation: Hardness & Feasibility.
HA Khorasgani, HK Maji, HH Nguyen
IACR Cryptol. ePrint Arch. 2020, 252, 2020
32020
-free Partition and Cover Numbers and Application
AR Block, S Brânzei, HK Maji, H Mehta, T Mukherjee, HH Nguyen
Cryptology ePrint Archive, 2020
22020
Allocation with Weak Priorities and General Constraints
YS Lin, H Nguyen, T Nguyen, K Altinkemer
Operations Research, 2022
2022
Improved Bound on the Local Leakage-resilience of Shamir’s Secret Sharing
HK Maji, HH Nguyen, A Paskin-Cherniavsky, M Wang
2022 IEEE International Symposium on Information Theory (ISIT), 2678-2683, 2022
2022
Secure Non-interactive Simulation: Feasibility and Rate
H Amini Khorasgani, HK Maji, HH Nguyen
Annual International Conference on the Theory and Applications of …, 2022
2022
Tight Estimate of the Local Leakage Resilience of the Additive Secret-Sharing Scheme & Its Consequences
HK Maji, HH Nguyen, A Paskin-Cherniavsky, T Suad, M Wang, X Ye, A Yu
3rd Conference on Information-Theoretic Cryptography (ITC 2022), 2022
2022
P-free Partition and Cover Numbers {\&} Applications
A Block, S Branzei, H Maji, H Mehta, T Mukherjee, H Nguyen
2nd Conference on Information-Theoretic Cryptography,{ITC} 2021, July 23-26 …, 2021
2021
P₄-free Partition and Cover Numbers & Applications
AR Block, S Brânzei, HK Maji, H Mehta, T Mukherjee, HH Nguyen
2nd Conference on Information-Theoretic Cryptography (ITC 2021), 2021
2021
Round-Optimal Correlation Extractors with Linear Production and Leakage Resilience
AR Block, D Gupta, HK Maji, HH Nguyen
2017
Maximum Leakage Resilience of the Inner-Product Correlation while performing General Secure 2-party Computation
AR Block, HK Maji, HH Nguyen
2016
Secure Non-interactive Simulation from Arbitrary Joint Distributions
HA Khorasgani, HK Maji, HH Nguyen
Geometry of Secure Two-party Computation
S Basu, HA Khorashgani, HK Maji, HH Nguyen
系统目前无法执行此操作,请稍后再试。
文章 1–20