Skip to main content

and
  1. No Access

    Article

    Application of machine learning techniques to predict the temperature distribution in semi-rigid pavement with a cement-treated base

    Due to the visco-elastic properties of asphalt concrete (AC), its strength is reduced exponentially along with the increased temperatures. Including cement-treated base (CTB) will improve the whole pavement st...

    Teron Nguyen, Thao T. T. Tran, Phuong N. Pham in Innovative Infrastructure Solutions (2024)

  2. No Access

    Chapter and Conference Paper

    Constructing Leakage-Resilient Shamir’s Secret Sharing: Over Composite Order Fields

    Probing physical bits in hardware has compromised cryptographic systems. This work investigates how to instantiate Shamir’s secret sharing so that the physical probes into its shares reveal statistically insig...

    Hemanta K. Maji, Hai H. Nguyen in Advances in Cryptology – EUROCRYPT 2024 (2024)

  3. No Access

    Chapter and Conference Paper

    Randomized Functions with High Round Complexity

    Consider two-party secure function evaluation against an honest-but-curious adversary in the information-theoretic plain model. We study the round complexity of securely realizing a given secure function evalu...

    Saugata Basu, Hamidreza Amini Khorasgani, Hemanta K. Maji in Theory of Cryptography (2023)

  4. No Access

    Chapter and Conference Paper

    Develo** Statistical Models to Predict Temperature Distribution in Asphalt Concrete in Danang City

    Asphalt concrete (AC) is a commonly used material in road construction; however, its quality is highly dependent on atmosphere temperature. Temperatures can adversely affect AC performance and its service life...

    Thao T. T. Tran, Hai H. Nguyen in CIGOS 2021, Emerging Technologies and Appl… (2022)

  5. No Access

    Chapter and Conference Paper

    Secure Non-interactive Simulation from Arbitrary Joint Distributions

    Secure non-interactive simulation (SNIS), introduced in EUROCRYPT 2022, is the information-theoretic analog of pseudo-correlation generators. SNIS allows parties, starting with samples of a source correlated priv...

    Hamidreza Amini Khorasgani, Hemanta K. Maji, Hai H. Nguyen in Theory of Cryptography (2022)

  6. No Access

    Chapter and Conference Paper

    Secure Non-interactive Simulation: Feasibility and Rate

    A natural solution to increase the efficiency of secure computation will be to non-interactively and securely transform diverse inexpensive-to-generate correlated randomness, like, joint samples from noise sou...

    Hamidreza Amini Khorasgani, Hemanta K. Maji in Advances in Cryptology – EUROCRYPT 2022 (2022)

  7. No Access

    Chapter and Conference Paper

    Leakage-resilient Linear Secret-sharing Against Arbitrary Bounded-size Leakage Family

    Motivated by leakage-resilient secure computation of circuits with addition and multiplication gates, this work studies the leakage-resilience of linear secret-sharing schemes with a small reconstruction thres...

    Hemanta K. Maji, Hai H. Nguyen, Anat Paskin-Cherniavsky, Tom Suad in Theory of Cryptography (2022)

  8. No Access

    Chapter and Conference Paper

    Develo** an Apparatus to Determine Thermal Diffusivity of Paving Materials

    Temperature changes affect pavement performance such as strength reduction at elevated temperature or crack initiation and development at low thermal conditions. Thermal diffusivity of paving materials is one ...

    Thao T. T. Tran, Hai H. Nguyen in Structural Health Monitoring and Engineeri… (2021)

  9. Chapter and Conference Paper

    Leakage-Resilience of the Shamir Secret-Sharing Scheme Against Physical-Bit Leakages

    Efficient Reed-Solomon code reconstruction algorithms, for example, by Guruswami and Wootters (STOC–2016), translate into local leakage attacks on Shamir secret-sharing schemes over characteristic-2 fields. Ho...

    Hemanta K. Maji, Hai H. Nguyen in Advances in Cryptology – EUROCRYPT 2021 (2021)

  10. No Access

    Chapter and Conference Paper

    Secure Computation with Constant Communication Overhead Using Multiplication Embeddings

    Secure multi-party computation (MPC) allows mutually distrusting parties to compute securely over their private data. The hardness of MPC, essentially, lies in performing secure multiplications over suitable a...

    Alexander R. Block, Hemanta K. Maji in Progress in Cryptology – INDOCRYPT 2018 (2018)

  11. Chapter and Conference Paper

    Secure Computation Using Leaky Correlations (Asymptotically Optimal Constructions)

    Most secure computation protocols can be effortlessly adapted to offload a significant fraction of their computationally and cryptographically expensive components to an offline phase so that the parties can r...

    Alexander R. Block, Divya Gupta, Hemanta K. Maji, Hai H. Nguyen in Theory of Cryptography (2018)

  12. Chapter and Conference Paper

    Secure Computation Based on Leaky Correlations: High Resilience Setting

    Correlated private randomness, or correlation in short, is a fundamental cryptographic resource that helps parties compute securely over their private data. An offline preprocessing step, which is independent ...

    Alexander R. Block, Hemanta K. Maji, Hai H. Nguyen in Advances in Cryptology – CRYPTO 2017 (2017)

  13. No Access

    Chapter and Conference Paper

    A Lightweight Treatment of Inexact Dates

    This paper presents a lightweight approach to representing inexact dates on the semantic web, in that it imposes minimal ontological commitments on the ontology author and provides data that can be queried using ...

    Hai H. Nguyen, Stuart Taylor, Gemma Webster, Nophadol Jekjantuk in Semantic Technology (2015)

  14. No Access

    Chapter and Conference Paper

    CURIOS Mobile: Linked Data Exploitation for Tourist Mobile Apps in Rural Areas

    As mobile devices proliferate and their computational power has increased rapidly over recent years, mobile applications have become a popular choice for visitors to enhance their travelling experience. Howeve...

    Hai H. Nguyen, David Beel, Gemma Webster, Chris Mellish, Jeff Z. Pan in Semantic Technology (2015)

  15. No Access

    Chapter and Conference Paper

    Belief Revision in a Fact-Rule Agent’s Belief Base

    When there is much incoming information with different levels of reliability, the agent’s belief base could become inconsistent, and therefore it needs a revision procedure. The algorithm which implements this...

    Hai H. Nguyen in Agent and Multi-Agent Systems: Technologies and Applications (2009)