Hai H. Nguyen

According to our database1, Hai H. Nguyen authored at least 34 papers between 2009 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
Physical-Bit Leakage Resilience of Linear Code-Based Secret Sharing.
Proceedings of the Advances in Cryptology - EUROCRYPT 2025, 2025

Disincentivize Collusion in Verifiable Secret Sharing.
Proceedings of the Advances in Cryptology - EUROCRYPT 2025, 2025

Leakage-Resilience of Shamir's Secret Sharing: Identifying Secure Evaluation Places.
Proceedings of the 6th Conference on Information-Theoretic Cryptography, 2025

2024
Unconditional Security Using (Random) Anonymous Bulletin Board.
Proceedings of the IEEE International Symposium on Information Theory, 2024

Constructing Leakage-Resilient Shamir's Secret Sharing: Over Composite Order Fields.
Proceedings of the Advances in Cryptology - EUROCRYPT 2024, 2024

Towards Breaking the Half-Barrier of Local Leakage-Resilient Shamir's Secret Sharing.
Proceedings of the Advances in Cryptology - CRYPTO 2024, 2024

2023
Randomized Functions with High Round Complexity.
Proceedings of the Theory of Cryptography - 21st International Conference, 2023

2022
Leakage-resilient Linear Secret-sharing Against Arbitrary Bounded-size Leakage Family.
Proceedings of the Theory of Cryptography - 20th International Conference, 2022

Secure Non-interactive Simulation from Arbitrary Joint Distributions.
Proceedings of the Theory of Cryptography - 20th International Conference, 2022

Improved Bound on the Local Leakage-resilience of Shamir's Secret Sharing.
Proceedings of the IEEE International Symposium on Information Theory, 2022

Geometry of Secure Two-party Computation.
Proceedings of the 63rd IEEE Annual Symposium on Foundations of Computer Science, 2022

Secure Non-interactive Simulation: Feasibility and Rate.
Proceedings of the Advances in Cryptology - EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30, 2022

Tight Estimate of the Local Leakage Resilience of the Additive Secret-Sharing Scheme & Its Consequences.
Proceedings of the 3rd Conference on Information-Theoretic Cryptography, 2022

2021
Decidability of Secure Non-interactive Simulation of Doubly Symmetric Binary Source.
IACR Cryptol. ePrint Arch., 2021

Lower Bounds for Leakage-Resilient Secret-Sharing Schemes against Probing Attacks.
Proceedings of the IEEE International Symposium on Information Theory, 2021

Leakage-Resilience of the Shamir Secret-Sharing Scheme Against Physical-Bit Leakages.
Proceedings of the Advances in Cryptology - EUROCRYPT 2021, 2021

P<sub>4</sub>-free Partition and Cover Numbers & Applications.
Proceedings of the 2nd Conference on Information-Theoretic Cryptography, 2021

2020
Secure Non-interactive Simulation: Hardness & Feasibility.
IACR Cryptol. ePrint Arch., 2020

P<sub>4</sub>-free Partition and Cover Numbers.
IACR Cryptol. ePrint Arch., 2020

2018
Secure Computation Using Leaky Correlations (Asymptotically Optimal Constructions).
Proceedings of the Theory of Cryptography - 16th International Conference, 2018

Secure Computation with Constant Communication Overhead Using Multiplication Embeddings.
Proceedings of the Progress in Cryptology - INDOCRYPT 2018, 2018

2017
Secure Computation Based on Leaky Correlations: High Resilience Setting.
Proceedings of the Advances in Cryptology - CRYPTO 2017, 2017

Success Stories.
Proceedings of the Exploiting Linked Data and Knowledge Graphs in Large Organisations, 2017

2015
A Power Consumption Benchmark Framework for Ontology Reasoning on Android Devices.
Proceedings of the Informal Proceedings of the 4th International Workshop on OWL Reasoner Evaluation (ORE-2015) co-located with the 28th International Workshop on Description Logics (DL 2015), 2015

CURIOS: Connecting Community Heritage through Linked Data.
Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing, 2015

Using Qualitative Spatial Logic for Validating Crowd-Sourced Geospatial Data.
Proceedings of the Twenty-Ninth AAAI Conference on Artificial Intelligence, 2015

2014
The Ubiquitous Semantic Web: Promises, Progress and Challenges.
Int. J. Semantic Web Inf. Syst., 2014

CURIOS: Web-based Presentation and Management of Linked Datasets.
Proceedings of the ISWC 2014 Posters & Demonstrations Track a track within the 13th International Semantic Web Conference, 2014

A Lightweight Treatment of Inexact Dates.
Proceedings of the Semantic Technology - 4th Joint International Conference, 2014

CURIOS Mobile: Linked Data Exploitation for Tourist Mobile Apps in Rural Areas.
Proceedings of the Semantic Technology - 4th Joint International Conference, 2014

2013
Multi-Cycle Query Caching in Agent Programming.
Proceedings of the Twenty-Seventh AAAI Conference on Artificial Intelligence, 2013

2012
A new approach for pin detection for an electronic system prototyping reconfigurable platform.
Proceedings of the 23rd IEEE International Symposium on Rapid System Prototyping, 2012

Axiom Pinpointing Using an Assumption-Based Truth Maintenance System.
Proceedings of the 2012 International Workshop on Description Logics, 2012

2009
Belief Revision in a Fact-Rule Agent's Belief Base.
Proceedings of the Agent and Multi-Agent Systems: Technologies and Applications, 2009


  Loading...