Hai H. Nguyen
Office: LSWN 1204
|
 |
About
I am a postdoctoral researcher in the
Department of Computer Science at Purdue University hosted by Professor Aniket Kate. I recently received my PhD in Computer Science from Purde University under the guidance of Professor Hemanta K. Maji . I am interested in theoretical Computer Science, Cryptography, Algorithms, and Algorithmic Game Theory.
Preprints
Conference Papers
-
Geometry of Secure Two-party Computation (FOCS 2022)
[pdf]
with
Saugata Basu
Hamidreza Amini Khorasgani,
Hemanta K. Maji
-
Secure Non-interactive Simulation: Feasibility & Rate (EUROCRYPT 2022)
[pdf]
with Hamidreza Amini Khorasgani,
Hemanta K. Maji
-
Secure Non-interactive Simulation from arbitrary Joint Distributions (TCC 2022)
[pdf]
with Hamidreza Amini Khorasgani,
Hemanta K. Maji
-
Leakage-resilient Linear Secret-sharing against arbitrary Bounded-size Leakage Family (TCC 2022)
[pdf]
with
Hemanta K. Maji ,
Anat Paskin-Cherniavsky,
Tom Suad,
Mingyuan Wang,
Xiuyu Ye ,
Albert Yu
-
Improved Bound on the Local Leakage-resilience of Shamir's Secret Sharing (ISIT 2022)
[pdf]
with
Hemanta K. Maji ,
Anat Paskin-Cherniavsky,
Mingyuan Wang,
-
Tight Estimate of the Local Leakage Resilience of the Additive Secret-sharing Scheme & its Consequences (ITC 2022)
[pdf]
with
Hemanta K. Maji ,
Anat Paskin-Cherniavsky,
Tom Suad,
Mingyuan Wang,
Xiuyu Ye ,
Albert Yu
-
Leakage-resilience of the Shamir Secret-sharing Scheme against Physical-bit Leakages (EUROCRYPT 2021)
[pdf]
with Hemanta K. Maji ,
Anat Paskin-Cherniavsky,
Tom Suad,
Mingyuan Wang
-
Allocation with Weak Priorities and General Constraints (EC 2021)
[pdf]
with Young-San Lin ,
Thanh Nguyen
-
Lower Bounds for Leakage-Resilient Secret Sharing Schemes against Probing Attacks (ISIT 2021)
[pdf]
with Donald Q. Adams,
Hemanta K. Maji ,
Minh L. Nguyen,
Anat Paskin-Cherniavsky,
Tom Suad,
Mingyuan Wang
-
P4-free Partition and Cover Numbers and Application (ITC 2021)
[pdf]
with Alexander R. Block,
Simina Branzei,
Hemanta K. Maji ,
Himanshi Mehta,
Tamalika Mukherjee
-
Stability in Matching Markets with Complex Constraints (EC 2019)
[pdf]
with Thanh Nguyen,
Alexander Teytelboym
-
Secure Computation with Constant Communication Overhead using Multiplication Embeddings (INDOCRYPT 2018)
[pdf]
with Alexander R. Block,
Hemanta K. Maji
-
Secure Computation using Leaky Correlations (Asymptotically Optimal Constructions) (TCC 2018)
[pdf]
with Alexander R. Block,
Divya Gupta,
Hemanta K. Maji
-
Secure Computation based on Leaky Correlations: High Resilience Setting (CRYPTO 2017)
[pdf]
with Alexander R. Block,
Hemanta K. Maji
Journal Papers
Teaching
- Fourier Notes
(Summer 2021)
-
- Graduate TA for CS 35500 Introduction to Cryptography with Professor Hemanta Maji
(Spring 2020),
(Fall 2020)
- Graduate TA for CS 38100 Introduction to the Analysis of Algorithms with Professor Jeremiah Blocki
(Fall 2019)
- Graduate TA for CS 590-MTK with Professor Hemanta Maji
(Spring 2019)
Spring 2017)
Education
CS at Purdue University
- PhD Student
- Joined Department in 2015
Worcester Polytechnic Institute
- B.S. Computer Science
- B.S. Mathematics
- 2011-2015