Hai H. Nguyen

According to our database1, Hai H. Nguyen authored at least 31 papers between 2009 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Unconditional Security using (Random) Anonymous Bulletin Board.
IACR Cryptol. ePrint Arch., 2024

Constructing Leakage-Resilient Shamir's Secret Sharing: Over Composite Order Fields.
Proceedings of the Advances in Cryptology - EUROCRYPT 2024, 2024

Towards Breaking the Half-Barrier of Local Leakage-Resilient Shamir's Secret Sharing.
Proceedings of the Advances in Cryptology - CRYPTO 2024, 2024

2023
Randomized Functions with High Round Complexity.
Proceedings of the Theory of Cryptography - 21st International Conference, 2023

2022
Leakage-resilient Linear Secret-sharing Against Arbitrary Bounded-size Leakage Family.
Proceedings of the Theory of Cryptography - 20th International Conference, 2022

Secure Non-interactive Simulation from Arbitrary Joint Distributions.
Proceedings of the Theory of Cryptography - 20th International Conference, 2022

Improved Bound on the Local Leakage-resilience of Shamir's Secret Sharing.
Proceedings of the IEEE International Symposium on Information Theory, 2022

Geometry of Secure Two-party Computation.
Proceedings of the 63rd IEEE Annual Symposium on Foundations of Computer Science, 2022

Secure Non-interactive Simulation: Feasibility and Rate.
Proceedings of the Advances in Cryptology - EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30, 2022

Tight Estimate of the Local Leakage Resilience of the Additive Secret-Sharing Scheme & Its Consequences.
Proceedings of the 3rd Conference on Information-Theoretic Cryptography, 2022

2021
Leakage-resilience of the Shamir Secret-sharing Scheme against Physical-bit Leakages.
IACR Cryptol. ePrint Arch., 2021

Decidability of Secure Non-interactive Simulation of Doubly Symmetric Binary Source.
IACR Cryptol. ePrint Arch., 2021

Lower Bounds for Leakage-Resilient Secret-Sharing Schemes against Probing Attacks.
Proceedings of the IEEE International Symposium on Information Theory, 2021

P<sub>4</sub>-free Partition and Cover Numbers & Applications.
Proceedings of the 2nd Conference on Information-Theoretic Cryptography, 2021

2020
Secure Non-interactive Simulation: Hardness & Feasibility.
IACR Cryptol. ePrint Arch., 2020

P<sub>4</sub>-free Partition and Cover Numbers.
IACR Cryptol. ePrint Arch., 2020

2018
Secure Computation with Constant Communication Overhead using Multiplication Embeddings.
IACR Cryptol. ePrint Arch., 2018

Secure Computation using Leaky Correlations (Asymptotically Optimal Constructions).
IACR Cryptol. ePrint Arch., 2018

2017
Secure Computation Based on Leaky Correlations: High Resilience Setting.
Proceedings of the Advances in Cryptology - CRYPTO 2017, 2017

Success Stories.
Proceedings of the Exploiting Linked Data and Knowledge Graphs in Large Organisations, 2017

2015
A Power Consumption Benchmark Framework for Ontology Reasoning on Android Devices.
Proceedings of the Informal Proceedings of the 4th International Workshop on OWL Reasoner Evaluation (ORE-2015) co-located with the 28th International Workshop on Description Logics (DL 2015), 2015

CURIOS: Connecting Community Heritage through Linked Data.
Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing, 2015

Using Qualitative Spatial Logic for Validating Crowd-Sourced Geospatial Data.
Proceedings of the Twenty-Ninth AAAI Conference on Artificial Intelligence, 2015

2014
The Ubiquitous Semantic Web: Promises, Progress and Challenges.
Int. J. Semantic Web Inf. Syst., 2014

CURIOS: Web-based Presentation and Management of Linked Datasets.
Proceedings of the ISWC 2014 Posters & Demonstrations Track a track within the 13th International Semantic Web Conference, 2014

A Lightweight Treatment of Inexact Dates.
Proceedings of the Semantic Technology - 4th Joint International Conference, 2014

CURIOS Mobile: Linked Data Exploitation for Tourist Mobile Apps in Rural Areas.
Proceedings of the Semantic Technology - 4th Joint International Conference, 2014

2013
Multi-Cycle Query Caching in Agent Programming.
Proceedings of the Twenty-Seventh AAAI Conference on Artificial Intelligence, 2013

2012
A new approach for pin detection for an electronic system prototyping reconfigurable platform.
Proceedings of the 23rd IEEE International Symposium on Rapid System Prototyping, 2012

Axiom Pinpointing Using an Assumption-Based Truth Maintenance System.
Proceedings of the 2012 International Workshop on Description Logics, 2012

2009
Belief Revision in a Fact-Rule Agent's Belief Base.
Proceedings of the Agent and Multi-Agent Systems: Technologies and Applications, 2009


  Loading...