# Hai H. Nguyen

According to our database

Collaborative distances:

^{1}, Hai H. Nguyen authored at least 30 papers between 2009 and 2024.Collaborative distances:

## Timeline

#### Legend:

Book In proceedings Article PhD thesis Dataset Other## Links

#### On csauthors.net:

## Bibliography

2024

IACR Cryptol. ePrint Arch., 2024

Constructing Leakage-Resilient Shamir's Secret Sharing: Over Composite Order Fields.

Proceedings of the Advances in Cryptology - EUROCRYPT 2024, 2024

2023

Proceedings of the Theory of Cryptography - 21st International Conference, 2023

2022

Leakage-resilient Linear Secret-sharing Against Arbitrary Bounded-size Leakage Family.

Proceedings of the Theory of Cryptography - 20th International Conference, 2022

Proceedings of the Theory of Cryptography - 20th International Conference, 2022

Proceedings of the IEEE International Symposium on Information Theory, 2022

Proceedings of the 63rd IEEE Annual Symposium on Foundations of Computer Science, 2022

Proceedings of the Advances in Cryptology - EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30, 2022

Tight Estimate of the Local Leakage Resilience of the Additive Secret-Sharing Scheme & Its Consequences.

Proceedings of the 3rd Conference on Information-Theoretic Cryptography, 2022

2021

Leakage-resilience of the Shamir Secret-sharing Scheme against Physical-bit Leakages.

IACR Cryptol. ePrint Arch., 2021

Decidability of Secure Non-interactive Simulation of Doubly Symmetric Binary Source.

IACR Cryptol. ePrint Arch., 2021

Lower Bounds for Leakage-Resilient Secret-Sharing Schemes against Probing Attacks.

Proceedings of the IEEE International Symposium on Information Theory, 2021

Proceedings of the 2nd Conference on Information-Theoretic Cryptography, 2021

2020

IACR Cryptol. ePrint Arch., 2020

IACR Cryptol. ePrint Arch., 2020

2018

Secure Computation with Constant Communication Overhead using Multiplication Embeddings.

IACR Cryptol. ePrint Arch., 2018

Secure Computation using Leaky Correlations (Asymptotically Optimal Constructions).

IACR Cryptol. ePrint Arch., 2018

2017

Proceedings of the Advances in Cryptology - CRYPTO 2017, 2017

Proceedings of the Exploiting Linked Data and Knowledge Graphs in Large Organisations, 2017

2015

A Power Consumption Benchmark Framework for Ontology Reasoning on Android Devices.

Proceedings of the Informal Proceedings of the 4th International Workshop on OWL Reasoner Evaluation (ORE-2015) co-located with the 28th International Workshop on Description Logics (DL 2015), 2015

Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing, 2015

Proceedings of the Twenty-Ninth AAAI Conference on Artificial Intelligence, 2015

2014

Int. J. Semantic Web Inf. Syst., 2014

Proceedings of the ISWC 2014 Posters & Demonstrations Track a track within the 13th International Semantic Web Conference, 2014

Proceedings of the Semantic Technology - 4th Joint International Conference, 2014

Proceedings of the Semantic Technology - 4th Joint International Conference, 2014

2013

Proceedings of the Twenty-Seventh AAAI Conference on Artificial Intelligence, 2013

2012

A new approach for pin detection for an electronic system prototyping reconfigurable platform.

Proceedings of the 23rd IEEE International Symposium on Rapid System Prototyping, 2012

Proceedings of the 2012 International Workshop on Description Logics, 2012

2009

Proceedings of the Agent and Multi-Agent Systems: Technologies and Applications, 2009