About.
I am a Senior Research Fellow at the Center for Quantum Technologies (NUS, Singapore), hosted by Professor Divesh Argawal. Before that, I was a postdoctoral researcher in the Department of Computer Science at ETH Zurich, under the supervision of Professor Ueli Maurer. I did a short-term postdoc at Purdue University, hosted by Professor Aniket Kate. I did my PhD in Computer Science at Purdue University under the guidance of Professor Hemanta K. Maji. I am interested in Theoretical Computer Science, Cryptography, Algorithms, and Algorithmic Game Theory.
Conference Papers.
IP Masking with Generic Security Guarantees under Minimum Assumptions, and Applications (ASIACRYPT 2025)(pdf)
with Sebastian Faust, Loïc Masure, Elena Micheli, Maximilian Orlt, François-Xavier Standaert
Solving Linear Inequalities over Convex Sets & its Applications to Cryptography and Hydrodynamics (FOCS 2025) (pdf)
with Saugata Basu, Hamidreza Amini Khorasgani, Hemanta K. Maji
Leakage-resilience of Shamir’s Secret-sharing: Identifying Secure Evaluation Places (ITC 2025) (pdf)
with Hemanta K. Maji, Anat Paskin-Cherniavsky, Xiuyu Ye
Disincentivize Collusion in Verifiable Secret Sharing (EUROCRYPT 2025) (pdf)
Tiantian Gong, Hai H. Nguyen, Aniket Kate, Hemanta K. Maji
Physical-Bit Leakage Resilience of Linear Code-based Secret Sharing (EUROCRYPT 2025) (pdf)
Hai H. Nguyen
Towards Breaking the Half-barrier of Local Leakage-resilient Shamir's Secret Sharing (CRYPTO 2024) (pdf)
Hai H. Nguyen
Constructing Leakage-resilient Shamir’s Secret Sharing: Over Composite Order Fields (EUROCRYPT 2024) (pdf)
with Hemanta K. Maji, Anat Paskin-Cherniavsky, Xiuyu Ye
Unconditional Security using (Random) Anonymous Bulletin Board (ISIT 2024) [pdf]
Albert Yu, Hai H. Nguyen, Aniket Kate, Hemanta K. Maji
Randomized Functions with High Round Complexity (TCC 2023) [pdf]
with Saugata Basu Hamidreza Amini Khorasgani, Hemanta K. Maji
Learning Non-parametric Choice Models with Discrete Fourier Analysis (WINE 2023) [pdf]
with Thanh Nguyen, Haoyu Song
Feasibility, Efficiency, and Robustness of Secure Computation (PhD Thesis) [pdf]
Geometry of Secure Two-party Computation (FOCS 2022) [pdf]
with Saugata Basu, Hamidreza Amini Khorasgani, Hemanta K. Maji
Secure Non-interactive Simulation: Feasibility & Rate (EUROCRYPT 2022) [pdf]
with Hamidreza Amini Khorasgani, Hemanta K. Maji
Secure Non-interactive Simulation from Arbitrary Joint Distributions (TCC 2022) [pdf]
with Hamidreza Amini Khorasgani, Hemanta K. Maji
Leakage-resilient Linear Secret-sharing against arbitrary Bounded-size Leakage Family (TCC 2022) [pdf]
with Hemanta K. Maji , Anat Paskin-Cherniavsky, Tom Suad, Mingyuan Wang, Xiuyu Ye , Albert Yu
Improved Bound on the Local Leakage-resilience of Shamir's Secret Sharing (ISIT 2022) [pdf]
with Hemanta K. Maji, Anat Paskin-Cherniavsky, Mingyuan Wang,
Tight Estimate of the Local Leakage Resilience of the Additive Secret-sharing Scheme & its Consequences (ITC 2022) [pdf]
with Hemanta K. Maji, Anat Paskin-Cherniavsky, Tom Suad, Mingyuan Wang, Xiuyu Ye , Albert Yu
Leakage-resilience of the Shamir Secret-sharing Scheme against Physical-bit Leakages (EUROCRYPT 2021) [pdf]
with Hemanta K. Maji, Anat Paskin-Cherniavsky, Tom Suad, Mingyuan Wang
Allocation with Weak Priorities and General Constraints (EC 2021) [pdf]
with Young-San Lin , Thanh Nguyen
Lower Bounds for Leakage-Resilient Secret Sharing Schemes against Probing Attacks (ISIT 2021) [pdf]
with Donald Q. Adams, Hemanta K. Maji, Minh L. Nguyen, Anat Paskin-Cherniavsky, Tom Suad, Mingyuan Wang
P4-free Partition and Cover Numbers and Application (ITC 2021) [pdf]
with Alexander R. Block, Simina Branzei, Hemanta K. Maji , Himanshi Mehta, Tamalika Mukherjee
Stability in Matching Markets with Complex Constraints (EC 2019) [pdf]
with Thanh Nguyen, Alexander Teytelboym
Secure Computation with Constant Communication Overhead using Multiplication Embeddings (INDOCRYPT 2018) [pdf]
with Alexander R. Block, Hemanta K. Maji
Secure Computation using Leaky Correlations (Asymptotically Optimal Constructions) (TCC 2018) [pdf]
with Alexander R. Block, Divya Gupta, Hemanta K. Maji
Secure Computation based on Leaky Correlations: High Resilience Setting (CRYPTO 2017) [pdf]
with Alexander R. Block, Hemanta K. Maji
Allocation with Weak Priorities and General Constraints (Operation Research 2022) [pdf]
with Young-San Lin , Thanh Nguyen
Stability in Matching Markets with Complex Constraints (Management Science 2020) [pdf]
with Thanh Nguyen, Alexander Teytelboym