BibTeX records: Mohammad Hajiabadi

download as .bib file

@article{DBLP:journals/iacr/GargHMM24,
  author       = {Sanjam Garg and
                  Mohammad Hajiabadi and
                  Peihan Miao and
                  Alice Murphy},
  title        = {Laconic Branching Programs from the Diffie-Hellman Assumption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {102},
  year         = {2024},
  url          = {https://eprint.iacr.org/2024/102},
  timestamp    = {Fri, 16 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/GargHMM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/algorithmica/AggarwalDDHMO23,
  author       = {Divesh Aggarwal and
                  Nico D{\"{o}}ttling and
                  Jesko Dujmovic and
                  Mohammad Hajiabadi and
                  Giulio Malavolta and
                  Maciej Obremski},
  title        = {Algebraic Restriction Codes and Their Applications},
  journal      = {Algorithmica},
  volume       = {85},
  number       = {12},
  pages        = {3602--3648},
  year         = {2023},
  url          = {https://doi.org/10.1007/s00453-023-01150-y},
  doi          = {10.1007/S00453-023-01150-Y},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/algorithmica/AggarwalDDHMO23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/citc/HajiabadiKV23,
  author       = {Mohammad Hajiabadi and
                  Shahram Khazaei and
                  Behzad Vahdani},
  editor       = {Kai{-}Min Chung},
  title        = {Randomness Recoverable Secret Sharing Schemes},
  booktitle    = {4th Conference on Information-Theoretic Cryptography, {ITC} 2023,
                  June 6-8, 2023, Aarhus University, Aarhus, Denmark},
  series       = {LIPIcs},
  volume       = {267},
  pages        = {12:1--12:25},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik},
  year         = {2023},
  url          = {https://doi.org/10.4230/LIPIcs.ITC.2023.12},
  doi          = {10.4230/LIPICS.ITC.2023.12},
  timestamp    = {Tue, 25 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/citc/HajiabadiKV23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/GargHJJPS23,
  author       = {Sanjam Garg and
                  Mohammad Hajiabadi and
                  Abhishek Jain and
                  Zhengzhong Jin and
                  Omkant Pandey and
                  Sina Shiehian},
  editor       = {Alexandra Boldyreva and
                  Vladimir Kolesnikov},
  title        = {Credibility in Private Set Membership},
  booktitle    = {Public-Key Cryptography - {PKC} 2023 - 26th {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA,
                  May 7-10, 2023, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13941},
  pages        = {159--189},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-31371-4\_6},
  doi          = {10.1007/978-3-031-31371-4\_6},
  timestamp    = {Fri, 05 May 2023 22:44:30 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/GargHJJPS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/HajiabadiMQS23,
  author       = {Mohammad Hajiabadi and
                  Mohammad Mahmoody and
                  Wei Qi and
                  Sara Sarfaraz},
  editor       = {Guy N. Rothblum and
                  Hoeteck Wee},
  title        = {Lower Bounds on Assumptions Behind Registration-Based Encryption},
  booktitle    = {Theory of Cryptography - 21st International Conference, {TCC} 2023,
                  Taipei, Taiwan, November 29 - December 2, 2023, Proceedings, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14370},
  pages        = {306--334},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-48618-0\_11},
  doi          = {10.1007/978-3-031-48618-0\_11},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/HajiabadiMQS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HajiabadiKV23,
  author       = {Mohammad Hajiabadi and
                  Shahram Khazaei and
                  Behzad Vahdani},
  title        = {Randomness Recoverable Secret Sharing Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {959},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/959},
  timestamp    = {Mon, 03 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HajiabadiKV23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/innovations/AggarwalDDHMO22,
  author       = {Divesh Aggarwal and
                  Nico D{\"{o}}ttling and
                  Jesko Dujmovic and
                  Mohammad Hajiabadi and
                  Giulio Malavolta and
                  Maciej Obremski},
  editor       = {Mark Braverman},
  title        = {Algebraic Restriction Codes and Their Applications},
  booktitle    = {13th Innovations in Theoretical Computer Science Conference, {ITCS}
                  2022, January 31 - February 3, 2022, Berkeley, CA, {USA}},
  series       = {LIPIcs},
  volume       = {215},
  pages        = {2:1--2:15},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik},
  year         = {2022},
  url          = {https://doi.org/10.4230/LIPIcs.ITCS.2022.2},
  doi          = {10.4230/LIPICS.ITCS.2022.2},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/innovations/AggarwalDDHMO22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/BienstockDGGHR22,
  author       = {Alexander Bienstock and
                  Yevgeniy Dodis and
                  Sanjam Garg and
                  Garrison Grogan and
                  Mohammad Hajiabadi and
                  Paul R{\"{o}}sler},
  editor       = {Eike Kiltz and
                  Vinod Vaikuntanathan},
  title        = {On the Worst-Case Inefficiency of {CGKA}},
  booktitle    = {Theory of Cryptography - 20th International Conference, {TCC} 2022,
                  Chicago, IL, USA, November 7-10, 2022, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13748},
  pages        = {213--243},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-22365-5\_8},
  doi          = {10.1007/978-3-031-22365-5\_8},
  timestamp    = {Sun, 25 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/BienstockDGGHR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BienstockDGGHR22,
  author       = {Alexander Bienstock and
                  Yevgeniy Dodis and
                  Sanjam Garg and
                  Garrison Grogan and
                  Mohammad Hajiabadi and
                  Paul R{\"{o}}sler},
  title        = {On the Worst-Case Inefficiency of {CGKA}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1237},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/1237},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BienstockDGGHR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/GargHMO21,
  author       = {Sanjam Garg and
                  Mohammad Hajiabadi and
                  Giulio Malavolta and
                  Rafail Ostrovsky},
  editor       = {Mehdi Tibouchi and
                  Huaxiong Wang},
  title        = {How to Build a Trapdoor Function from an Encryption Scheme},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2021 - 27th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Singapore, December 6-10, 2021, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13092},
  pages        = {220--249},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-92078-4\_8},
  doi          = {10.1007/978-3-030-92078-4\_8},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/GargHMO21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/ChatterjeeGHKLM21,
  author       = {Rohit Chatterjee and
                  Sanjam Garg and
                  Mohammad Hajiabadi and
                  Dakshita Khurana and
                  Xiao Liang and
                  Giulio Malavolta and
                  Omkant Pandey and
                  Sina Shiehian},
  editor       = {Tal Malkin and
                  Chris Peikert},
  title        = {Compact Ring Signatures from Learning with Errors},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International
                  Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20,
                  2021, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12825},
  pages        = {282--312},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-84242-0\_11},
  doi          = {10.1007/978-3-030-84242-0\_11},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/ChatterjeeGHKLM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/Alamati0DGHP21,
  author       = {Navid Alamati and
                  Pedro Branco and
                  Nico D{\"{o}}ttling and
                  Sanjam Garg and
                  Mohammad Hajiabadi and
                  Sihang Pu},
  editor       = {Kobbi Nissim and
                  Brent Waters},
  title        = {Laconic Private Set Intersection and Applications},
  booktitle    = {Theory of Cryptography - 19th International Conference, {TCC} 2021,
                  Raleigh, NC, USA, November 8-11, 2021, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13044},
  pages        = {94--125},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-90456-2\_4},
  doi          = {10.1007/978-3-030-90456-2\_4},
  timestamp    = {Mon, 08 Nov 2021 11:51:39 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/Alamati0DGHP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/ChaseGHLM21,
  author       = {Melissa Chase and
                  Sanjam Garg and
                  Mohammad Hajiabadi and
                  Jialin Li and
                  Peihan Miao},
  editor       = {Kobbi Nissim and
                  Brent Waters},
  title        = {Amortizing Rate-1 {OT} and Applications to {PIR} and {PSI}},
  booktitle    = {Theory of Cryptography - 19th International Conference, {TCC} 2021,
                  Raleigh, NC, USA, November 8-11, 2021, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13044},
  pages        = {126--156},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-90456-2\_5},
  doi          = {10.1007/978-3-030-90456-2\_5},
  timestamp    = {Wed, 02 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/ChaseGHLM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlamatiBDGHP21,
  author       = {Navid Alamati and
                  Pedro Branco and
                  Nico D{\"{o}}ttling and
                  Sanjam Garg and
                  Mohammad Hajiabadi and
                  Sihang Pu},
  title        = {Laconic Private Set Intersection and Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {728},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/728},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AlamatiBDGHP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChatterjeeGHKLM21,
  author       = {Rohit Chatterjee and
                  Sanjam Garg and
                  Mohammad Hajiabadi and
                  Dakshita Khurana and
                  Xiao Liang and
                  Giulio Malavolta and
                  Omkant Pandey and
                  Sina Shiehian},
  title        = {Compact Ring Signatures from Learning With Errors},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {942},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/942},
  timestamp    = {Tue, 15 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/ChatterjeeGHKLM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AggarwalDDHMO21,
  author       = {Divesh Aggarwal and
                  Nico D{\"{o}}ttling and
                  Jesko Dujmovic and
                  Mohammad Hajiabadi and
                  Giulio Malavolta and
                  Maciej Obremski},
  title        = {Algebraic Restriction Codes and their Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1177},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/1177},
  timestamp    = {Mon, 25 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AggarwalDDHMO21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChaseGHLM21,
  author       = {Melissa Chase and
                  Sanjam Garg and
                  Mohammad Hajiabadi and
                  Jialin Li and
                  Peihan Miao},
  title        = {Amortizing Rate-1 {OT} and Applications to {PIR} and {PSI}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1525},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/1525},
  timestamp    = {Wed, 02 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChaseGHLM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/DottlingGHMW20,
  author       = {Nico D{\"{o}}ttling and
                  Sanjam Garg and
                  Mohammad Hajiabadi and
                  Daniel Masny and
                  Daniel Wichs},
  editor       = {Anne Canteaut and
                  Yuval Ishai},
  title        = {Two-Round Oblivious Transfer from {CDH} or {LPN}},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2020 - 39th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Zagreb, Croatia, May 10-14, 2020, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12106},
  pages        = {768--797},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-45724-2\_26},
  doi          = {10.1007/978-3-030-45724-2\_26},
  timestamp    = {Mon, 04 May 2020 14:32:28 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/DottlingGHMW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/GargGH20,
  author       = {Sanjam Garg and
                  Romain Gay and
                  Mohammad Hajiabadi},
  editor       = {Aggelos Kiayias and
                  Markulf Kohlweiss and
                  Petros Wallden and
                  Vassilis Zikas},
  title        = {Master-Key KDM-Secure {IBE} from Pairings},
  booktitle    = {Public-Key Cryptography - {PKC} 2020 - 23rd {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Edinburgh, UK,
                  May 4-7, 2020, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12110},
  pages        = {123--152},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-45374-9\_5},
  doi          = {10.1007/978-3-030-45374-9\_5},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/GargGH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/GargHO20,
  author       = {Sanjam Garg and
                  Mohammad Hajiabadi and
                  Rafail Ostrovsky},
  editor       = {Rafael Pass and
                  Krzysztof Pietrzak},
  title        = {Efficient Range-Trapdoor Functions and Applications: Rate-1 {OT} and
                  More},
  booktitle    = {Theory of Cryptography - 18th International Conference, {TCC} 2020,
                  Durham, NC, USA, November 16-19, 2020, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12550},
  pages        = {88--116},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-64375-1\_4},
  doi          = {10.1007/978-3-030-64375-1\_4},
  timestamp    = {Tue, 15 Dec 2020 11:52:09 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/GargHO20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GargGH20,
  author       = {Sanjam Garg and
                  Romain Gay and
                  Mohammad Hajiabadi},
  title        = {Master-Key KDM-Secure {IBE} from Pairings},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {616},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/616},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GargGH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/DottlingGHLM19,
  author       = {Nico D{\"{o}}ttling and
                  Sanjam Garg and
                  Mohammad Hajiabadi and
                  Kevin Liu and
                  Giulio Malavolta},
  editor       = {Steven D. Galbraith and
                  Shiho Moriai},
  title        = {Rate-1 Trapdoor Functions from the Diffie-Hellman Problem},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2019 - 25th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Kobe, Japan, December 8-12, 2019, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11923},
  pages        = {585--606},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-34618-8\_20},
  doi          = {10.1007/978-3-030-34618-8\_20},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/DottlingGHLM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/GargGH19,
  author       = {Sanjam Garg and
                  Romain Gay and
                  Mohammad Hajiabadi},
  editor       = {Yuval Ishai and
                  Vincent Rijmen},
  title        = {New Techniques for Efficient Trapdoor Functions and Applications},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2019 - 38th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Darmstadt, Germany, May 19-23, 2019, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11478},
  pages        = {33--63},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-17659-4\_2},
  doi          = {10.1007/978-3-030-17659-4\_2},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/GargGH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/GargHMRS19,
  author       = {Sanjam Garg and
                  Mohammad Hajiabadi and
                  Mohammad Mahmoody and
                  Ahmadreza Rahimi and
                  Sruthi Sekar},
  editor       = {Dongdai Lin and
                  Kazue Sako},
  title        = {Registration-Based Encryption from Standard Assumptions},
  booktitle    = {Public-Key Cryptography - {PKC} 2019 - 22nd {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Beijing, China,
                  April 14-17, 2019, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11443},
  pages        = {63--93},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-17259-6\_3},
  doi          = {10.1007/978-3-030-17259-6\_3},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/GargHMRS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DottlingGHMW19,
  author       = {Nico D{\"{o}}ttling and
                  Sanjam Garg and
                  Mohammad Hajiabadi and
                  Daniel Masny and
                  Daniel Wichs},
  title        = {Two-Round Oblivious Transfer from {CDH} or {LPN}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {414},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/414},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DottlingGHMW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GargHO19,
  author       = {Sanjam Garg and
                  Mohammad Hajiabadi and
                  Rafail Ostrovsky},
  title        = {Efficient Range-Trapdoor Functions and Applications: Rate-1 {OT} and
                  More},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {990},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/990},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GargHO19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DottlingGHLM19,
  author       = {Nico D{\"{o}}ttling and
                  Sanjam Garg and
                  Mohammad Hajiabadi and
                  Kevin Liu and
                  Giulio Malavolta},
  title        = {Rate-1 Trapdoor Functions from the Diffie-Hellman Problem},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1072},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/1072},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DottlingGHLM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GargHMM18,
  author       = {Sanjam Garg and
                  Mohammad Hajiabadi and
                  Mohammad Mahmoody and
                  Ameer Mohammed},
  editor       = {Hovav Shacham and
                  Alexandra Boldyreva},
  title        = {Limits on the Power of Garbling Techniques for Public-Key Encryption},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018,
                  Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10993},
  pages        = {335--364},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-96878-0\_12},
  doi          = {10.1007/978-3-319-96878-0\_12},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/GargHMM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GargH18,
  author       = {Sanjam Garg and
                  Mohammad Hajiabadi},
  editor       = {Hovav Shacham and
                  Alexandra Boldyreva},
  title        = {Trapdoor Functions from the Computational Diffie-Hellman Assumption},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10992},
  pages        = {362--391},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-96881-0\_13},
  doi          = {10.1007/978-3-319-96881-0\_13},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/GargH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/DottlingGHM18,
  author       = {Nico D{\"{o}}ttling and
                  Sanjam Garg and
                  Mohammad Hajiabadi and
                  Daniel Masny},
  editor       = {Michel Abdalla and
                  Ricardo Dahab},
  title        = {New Constructions of Identity-Based and Key-Dependent Message Secure
                  Encryption Schemes},
  booktitle    = {Public-Key Cryptography - {PKC} 2018 - 21st {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Rio de Janeiro,
                  Brazil, March 25-29, 2018, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10769},
  pages        = {3--31},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-76578-5\_1},
  doi          = {10.1007/978-3-319-76578-5\_1},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/DottlingGHM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/Hajiabadi18,
  author       = {Mohammad Hajiabadi},
  editor       = {Amos Beimel and
                  Stefan Dziembowski},
  title        = {Enhancements are Blackbox Non-trivial: Impossibility of Enhanced Trapdoor
                  Permutations from Standard Trapdoor Permutations},
  booktitle    = {Theory of Cryptography - 16th International Conference, {TCC} 2018,
                  Panaji, India, November 11-14, 2018, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11239},
  pages        = {448--475},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-03807-6\_17},
  doi          = {10.1007/978-3-030-03807-6\_17},
  timestamp    = {Sat, 09 Apr 2022 12:44:08 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/Hajiabadi18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/GargHMR18,
  author       = {Sanjam Garg and
                  Mohammad Hajiabadi and
                  Mohammad Mahmoody and
                  Ahmadreza Rahimi},
  editor       = {Amos Beimel and
                  Stefan Dziembowski},
  title        = {Registration-Based Encryption: Removing Private-Key Generator from
                  {IBE}},
  booktitle    = {Theory of Cryptography - 16th International Conference, {TCC} 2018,
                  Panaji, India, November 11-14, 2018, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11239},
  pages        = {689--718},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-03807-6\_25},
  doi          = {10.1007/978-3-030-03807-6\_25},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/GargHMR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GargH18,
  author       = {Sanjam Garg and
                  Mohammad Hajiabadi},
  title        = {Trapdoor Functions from the Computational Diffie-Hellman Assumption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {529},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/529},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GargH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GargHMM18,
  author       = {Sanjam Garg and
                  Mohammad Hajiabadi and
                  Mohammad Mahmoody and
                  Ameer Mohammed},
  title        = {Limits on the Power of Garbling Techniques for Public-Key Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {555},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/555},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GargHMM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GargGH18,
  author       = {Sanjam Garg and
                  Romain Gay and
                  Mohammad Hajiabadi},
  title        = {New Techniques for Efficient Trapdoor Functions and Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {872},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/872},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GargGH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Hajiabadi18,
  author       = {Mohammad Hajiabadi},
  title        = {Enhancements Are Blackbox Non-Trivial: Impossibility of Enhanced Trapdoor
                  Permutations from Standard Trapdoor Permutations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {900},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/900},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Hajiabadi18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GargHMR18,
  author       = {Sanjam Garg and
                  Mohammad Hajiabadi and
                  Mohammad Mahmoody and
                  Ahmadreza Rahimi},
  title        = {Registration-Based Encryption: Removing Private-Key Generator from
                  {IBE}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {919},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/919},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GargHMR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GargHMRS18,
  author       = {Sanjam Garg and
                  Mohammad Hajiabadi and
                  Mohammad Mahmoody and
                  Ahmadreza Rahimi and
                  Sruthi Sekar},
  title        = {Registration-Based Encryption from Standard Assumptions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1030},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1030},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GargHMRS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/HajiabadiK17,
  author       = {Mohammad Hajiabadi and
                  Bruce M. Kapron},
  title        = {Reproducible Circularly Secure Bit Encryption: Applications and Realizations},
  journal      = {J. Cryptol.},
  volume       = {30},
  number       = {4},
  pages        = {1187--1237},
  year         = {2017},
  url          = {https://doi.org/10.1007/s00145-016-9246-4},
  doi          = {10.1007/S00145-016-9246-4},
  timestamp    = {Sat, 21 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/HajiabadiK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/BootleCGGHJ17,
  author       = {Jonathan Bootle and
                  Andrea Cerulli and
                  Essam Ghadafi and
                  Jens Groth and
                  Mohammad Hajiabadi and
                  Sune K. Jakobsen},
  editor       = {Tsuyoshi Takagi and
                  Thomas Peyrin},
  title        = {Linear-Time Zero-Knowledge Proofs for Arithmetic Circuit Satisfiability},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2017 - 23rd International Conference
                  on the Theory and Applications of Cryptology and Information Security,
                  Hong Kong, China, December 3-7, 2017, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10626},
  pages        = {336--365},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-70700-6\_12},
  doi          = {10.1007/978-3-319-70700-6\_12},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/BootleCGGHJ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/HajiabadiK17,
  author       = {Mohammad Hajiabadi and
                  Bruce M. Kapron},
  editor       = {Jean{-}S{\'{e}}bastien Coron and
                  Jesper Buus Nielsen},
  title        = {Toward Fine-Grained Blackbox Separations Between Semantic and Circular-Security
                  Notions},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2017 - 36th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Paris, France, April 30 - May 4, 2017, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10211},
  pages        = {561--591},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-56614-6\_19},
  doi          = {10.1007/978-3-319-56614-6\_19},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/HajiabadiK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HajiabadiK17,
  author       = {Mohammad Hajiabadi and
                  Bruce M. Kapron},
  title        = {Toward Fine-Grained Blackbox Separations Between Semantic and Circular-Security
                  Notions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {146},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/146},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HajiabadiK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BootleCGGHJ17,
  author       = {Jonathan Bootle and
                  Andrea Cerulli and
                  Essam Ghadafi and
                  Jens Groth and
                  Mohammad Hajiabadi and
                  Sune K. Jakobsen},
  title        = {Linear-Time Zero-Knowledge Proofs for Arithmetic Circuit Satisfiability},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {872},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/872},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BootleCGGHJ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DottlingGHM17,
  author       = {Nico D{\"{o}}ttling and
                  Sanjam Garg and
                  Mohammad Hajiabadi and
                  Daniel Masny},
  title        = {New Constructions of Identity-Based and Key-Dependent Message Secure
                  Encryption Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {978},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/978},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DottlingGHM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/ca/Hajiabadi16,
  author       = {Mohammad Hajiabadi},
  title        = {Encryption security against key-dependent-message attacks: applications,
                  realizations and separations},
  school       = {University of Victoria, Canada},
  year         = {2016},
  url          = {http://hdl.handle.net/1828/7454},
  timestamp    = {Fri, 05 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/ca/Hajiabadi16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/HajiabadiKS16,
  author       = {Mohammad Hajiabadi and
                  Bruce M. Kapron and
                  Venkatesh Srinivasan},
  editor       = {Chen{-}Mou Cheng and
                  Kai{-}Min Chung and
                  Giuseppe Persiano and
                  Bo{-}Yin Yang},
  title        = {On Generic Constructions of Circularly-Secure, Leakage-Resilient Public-Key
                  Encryption Schemes},
  booktitle    = {Public-Key Cryptography - {PKC} 2016 - 19th {IACR} International Conference
                  on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan,
                  March 6-9, 2016, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9615},
  pages        = {129--158},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-49387-8\_6},
  doi          = {10.1007/978-3-662-49387-8\_6},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/HajiabadiKS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/HajiabadiK15,
  author       = {Mohammad Hajiabadi and
                  Bruce M. Kapron},
  editor       = {Rosario Gennaro and
                  Matthew Robshaw},
  title        = {Reproducible Circularly-Secure Bit Encryption: Applications and Realizations},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9215},
  pages        = {224--243},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-47989-6\_11},
  doi          = {10.1007/978-3-662-47989-6\_11},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/HajiabadiK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/HajiabadiK15,
  author       = {Mohammad Hajiabadi and
                  Bruce M. Kapron},
  editor       = {Anja Lehmann and
                  Stefan Wolf},
  title        = {Gambling, Computational Information and Encryption Security},
  booktitle    = {Information Theoretic Security - 8th International Conference, {ICITS}
                  2015, Lugano, Switzerland, May 2-5, 2015. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9063},
  pages        = {141--158},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-17470-9\_9},
  doi          = {10.1007/978-3-319-17470-9\_9},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/HajiabadiK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eccc/HajiabadiK15,
  author       = {Mohammad Hajiabadi and
                  Bruce M. Kapron},
  title        = {Gambling, Computational Information, and Encryption Security},
  journal      = {Electron. Colloquium Comput. Complex.},
  volume       = {{TR15-149}},
  year         = {2015},
  url          = {https://eccc.weizmann.ac.il/report/2015/149},
  eprinttype    = {ECCC},
  eprint       = {TR15-149},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eccc/HajiabadiK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HajiabadiK15,
  author       = {Mohammad Hajiabadi and
                  Bruce M. Kapron},
  title        = {Reproducible Circularly-Secure Bit Encryption: Applications and Realizations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {531},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/531},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HajiabadiK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HajiabadiKS15,
  author       = {Mohammad Hajiabadi and
                  Bruce M. Kapron and
                  S. Venkatesh},
  title        = {On Generic Constructions of Circularly-Secure, Leakage-Resilient Public-Key
                  Encryption Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {741},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/741},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HajiabadiKS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HajiabadiK15a,
  author       = {Mohammad Hajiabadi and
                  Bruce M. Kapron},
  title        = {Gambling, Computational Information and Encryption Security},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {870},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/870},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HajiabadiK15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/HajiabadiK13,
  author       = {Mohammad Hajiabadi and
                  Bruce M. Kapron},
  editor       = {Amit Sahai},
  title        = {Computational Soundness of Coinductive Symbolic Security under Active
                  Attacks},
  booktitle    = {Theory of Cryptography - 10th Theory of Cryptography Conference, {TCC}
                  2013, Tokyo, Japan, March 3-6, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7785},
  pages        = {539--558},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-36594-2\_30},
  doi          = {10.1007/978-3-642-36594-2\_30},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/HajiabadiK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HajiabadiK12,
  author       = {Mohammad Hajiabadi and
                  Bruce M. Kapron},
  title        = {Computational Soundness of Coinductive Symbolic Security under Active
                  Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {560},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/560},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HajiabadiK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics