Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Mohammad Hajiabadi
@article{DBLP:journals/iacr/GargHMM24, author = {Sanjam Garg and Mohammad Hajiabadi and Peihan Miao and Alice Murphy}, title = {Laconic Branching Programs from the Diffie-Hellman Assumption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {102}, year = {2024}, url = {https://eprint.iacr.org/2024/102}, timestamp = {Fri, 16 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/GargHMM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/algorithmica/AggarwalDDHMO23, author = {Divesh Aggarwal and Nico D{\"{o}}ttling and Jesko Dujmovic and Mohammad Hajiabadi and Giulio Malavolta and Maciej Obremski}, title = {Algebraic Restriction Codes and Their Applications}, journal = {Algorithmica}, volume = {85}, number = {12}, pages = {3602--3648}, year = {2023}, url = {https://doi.org/10.1007/s00453-023-01150-y}, doi = {10.1007/S00453-023-01150-Y}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/algorithmica/AggarwalDDHMO23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/citc/HajiabadiKV23, author = {Mohammad Hajiabadi and Shahram Khazaei and Behzad Vahdani}, editor = {Kai{-}Min Chung}, title = {Randomness Recoverable Secret Sharing Schemes}, booktitle = {4th Conference on Information-Theoretic Cryptography, {ITC} 2023, June 6-8, 2023, Aarhus University, Aarhus, Denmark}, series = {LIPIcs}, volume = {267}, pages = {12:1--12:25}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2023}, url = {https://doi.org/10.4230/LIPIcs.ITC.2023.12}, doi = {10.4230/LIPICS.ITC.2023.12}, timestamp = {Tue, 25 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/citc/HajiabadiKV23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/GargHJJPS23, author = {Sanjam Garg and Mohammad Hajiabadi and Abhishek Jain and Zhengzhong Jin and Omkant Pandey and Sina Shiehian}, editor = {Alexandra Boldyreva and Vladimir Kolesnikov}, title = {Credibility in Private Set Membership}, booktitle = {Public-Key Cryptography - {PKC} 2023 - 26th {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA, May 7-10, 2023, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13941}, pages = {159--189}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-31371-4\_6}, doi = {10.1007/978-3-031-31371-4\_6}, timestamp = {Fri, 05 May 2023 22:44:30 +0200}, biburl = {https://dblp.org/rec/conf/pkc/GargHJJPS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/HajiabadiMQS23, author = {Mohammad Hajiabadi and Mohammad Mahmoody and Wei Qi and Sara Sarfaraz}, editor = {Guy N. Rothblum and Hoeteck Wee}, title = {Lower Bounds on Assumptions Behind Registration-Based Encryption}, booktitle = {Theory of Cryptography - 21st International Conference, {TCC} 2023, Taipei, Taiwan, November 29 - December 2, 2023, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14370}, pages = {306--334}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-48618-0\_11}, doi = {10.1007/978-3-031-48618-0\_11}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tcc/HajiabadiMQS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HajiabadiKV23, author = {Mohammad Hajiabadi and Shahram Khazaei and Behzad Vahdani}, title = {Randomness Recoverable Secret Sharing Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {959}, year = {2023}, url = {https://eprint.iacr.org/2023/959}, timestamp = {Mon, 03 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HajiabadiKV23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/innovations/AggarwalDDHMO22, author = {Divesh Aggarwal and Nico D{\"{o}}ttling and Jesko Dujmovic and Mohammad Hajiabadi and Giulio Malavolta and Maciej Obremski}, editor = {Mark Braverman}, title = {Algebraic Restriction Codes and Their Applications}, booktitle = {13th Innovations in Theoretical Computer Science Conference, {ITCS} 2022, January 31 - February 3, 2022, Berkeley, CA, {USA}}, series = {LIPIcs}, volume = {215}, pages = {2:1--2:15}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2022}, url = {https://doi.org/10.4230/LIPIcs.ITCS.2022.2}, doi = {10.4230/LIPICS.ITCS.2022.2}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/innovations/AggarwalDDHMO22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/BienstockDGGHR22, author = {Alexander Bienstock and Yevgeniy Dodis and Sanjam Garg and Garrison Grogan and Mohammad Hajiabadi and Paul R{\"{o}}sler}, editor = {Eike Kiltz and Vinod Vaikuntanathan}, title = {On the Worst-Case Inefficiency of {CGKA}}, booktitle = {Theory of Cryptography - 20th International Conference, {TCC} 2022, Chicago, IL, USA, November 7-10, 2022, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13748}, pages = {213--243}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-22365-5\_8}, doi = {10.1007/978-3-031-22365-5\_8}, timestamp = {Sun, 25 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tcc/BienstockDGGHR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BienstockDGGHR22, author = {Alexander Bienstock and Yevgeniy Dodis and Sanjam Garg and Garrison Grogan and Mohammad Hajiabadi and Paul R{\"{o}}sler}, title = {On the Worst-Case Inefficiency of {CGKA}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1237}, year = {2022}, url = {https://eprint.iacr.org/2022/1237}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BienstockDGGHR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/GargHMO21, author = {Sanjam Garg and Mohammad Hajiabadi and Giulio Malavolta and Rafail Ostrovsky}, editor = {Mehdi Tibouchi and Huaxiong Wang}, title = {How to Build a Trapdoor Function from an Encryption Scheme}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2021 - 27th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 6-10, 2021, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {13092}, pages = {220--249}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-92078-4\_8}, doi = {10.1007/978-3-030-92078-4\_8}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/GargHMO21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/ChatterjeeGHKLM21, author = {Rohit Chatterjee and Sanjam Garg and Mohammad Hajiabadi and Dakshita Khurana and Xiao Liang and Giulio Malavolta and Omkant Pandey and Sina Shiehian}, editor = {Tal Malkin and Chris Peikert}, title = {Compact Ring Signatures from Learning with Errors}, booktitle = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20, 2021, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12825}, pages = {282--312}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-84242-0\_11}, doi = {10.1007/978-3-030-84242-0\_11}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/ChatterjeeGHKLM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/Alamati0DGHP21, author = {Navid Alamati and Pedro Branco and Nico D{\"{o}}ttling and Sanjam Garg and Mohammad Hajiabadi and Sihang Pu}, editor = {Kobbi Nissim and Brent Waters}, title = {Laconic Private Set Intersection and Applications}, booktitle = {Theory of Cryptography - 19th International Conference, {TCC} 2021, Raleigh, NC, USA, November 8-11, 2021, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {13044}, pages = {94--125}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-90456-2\_4}, doi = {10.1007/978-3-030-90456-2\_4}, timestamp = {Mon, 08 Nov 2021 11:51:39 +0100}, biburl = {https://dblp.org/rec/conf/tcc/Alamati0DGHP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/ChaseGHLM21, author = {Melissa Chase and Sanjam Garg and Mohammad Hajiabadi and Jialin Li and Peihan Miao}, editor = {Kobbi Nissim and Brent Waters}, title = {Amortizing Rate-1 {OT} and Applications to {PIR} and {PSI}}, booktitle = {Theory of Cryptography - 19th International Conference, {TCC} 2021, Raleigh, NC, USA, November 8-11, 2021, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {13044}, pages = {126--156}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-90456-2\_5}, doi = {10.1007/978-3-030-90456-2\_5}, timestamp = {Wed, 02 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/ChaseGHLM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AlamatiBDGHP21, author = {Navid Alamati and Pedro Branco and Nico D{\"{o}}ttling and Sanjam Garg and Mohammad Hajiabadi and Sihang Pu}, title = {Laconic Private Set Intersection and Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {728}, year = {2021}, url = {https://eprint.iacr.org/2021/728}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AlamatiBDGHP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChatterjeeGHKLM21, author = {Rohit Chatterjee and Sanjam Garg and Mohammad Hajiabadi and Dakshita Khurana and Xiao Liang and Giulio Malavolta and Omkant Pandey and Sina Shiehian}, title = {Compact Ring Signatures from Learning With Errors}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {942}, year = {2021}, url = {https://eprint.iacr.org/2021/942}, timestamp = {Tue, 15 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/ChatterjeeGHKLM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AggarwalDDHMO21, author = {Divesh Aggarwal and Nico D{\"{o}}ttling and Jesko Dujmovic and Mohammad Hajiabadi and Giulio Malavolta and Maciej Obremski}, title = {Algebraic Restriction Codes and their Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1177}, year = {2021}, url = {https://eprint.iacr.org/2021/1177}, timestamp = {Mon, 25 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AggarwalDDHMO21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChaseGHLM21, author = {Melissa Chase and Sanjam Garg and Mohammad Hajiabadi and Jialin Li and Peihan Miao}, title = {Amortizing Rate-1 {OT} and Applications to {PIR} and {PSI}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1525}, year = {2021}, url = {https://eprint.iacr.org/2021/1525}, timestamp = {Wed, 02 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChaseGHLM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/DottlingGHMW20, author = {Nico D{\"{o}}ttling and Sanjam Garg and Mohammad Hajiabadi and Daniel Masny and Daniel Wichs}, editor = {Anne Canteaut and Yuval Ishai}, title = {Two-Round Oblivious Transfer from {CDH} or {LPN}}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10-14, 2020, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12106}, pages = {768--797}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45724-2\_26}, doi = {10.1007/978-3-030-45724-2\_26}, timestamp = {Mon, 04 May 2020 14:32:28 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/DottlingGHMW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/GargGH20, author = {Sanjam Garg and Romain Gay and Mohammad Hajiabadi}, editor = {Aggelos Kiayias and Markulf Kohlweiss and Petros Wallden and Vassilis Zikas}, title = {Master-Key KDM-Secure {IBE} from Pairings}, booktitle = {Public-Key Cryptography - {PKC} 2020 - 23rd {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Edinburgh, UK, May 4-7, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12110}, pages = {123--152}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45374-9\_5}, doi = {10.1007/978-3-030-45374-9\_5}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/GargGH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/GargHO20, author = {Sanjam Garg and Mohammad Hajiabadi and Rafail Ostrovsky}, editor = {Rafael Pass and Krzysztof Pietrzak}, title = {Efficient Range-Trapdoor Functions and Applications: Rate-1 {OT} and More}, booktitle = {Theory of Cryptography - 18th International Conference, {TCC} 2020, Durham, NC, USA, November 16-19, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12550}, pages = {88--116}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-64375-1\_4}, doi = {10.1007/978-3-030-64375-1\_4}, timestamp = {Tue, 15 Dec 2020 11:52:09 +0100}, biburl = {https://dblp.org/rec/conf/tcc/GargHO20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GargGH20, author = {Sanjam Garg and Romain Gay and Mohammad Hajiabadi}, title = {Master-Key KDM-Secure {IBE} from Pairings}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {616}, year = {2020}, url = {https://eprint.iacr.org/2020/616}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GargGH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/DottlingGHLM19, author = {Nico D{\"{o}}ttling and Sanjam Garg and Mohammad Hajiabadi and Kevin Liu and Giulio Malavolta}, editor = {Steven D. Galbraith and Shiho Moriai}, title = {Rate-1 Trapdoor Functions from the Diffie-Hellman Problem}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2019 - 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8-12, 2019, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {11923}, pages = {585--606}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-34618-8\_20}, doi = {10.1007/978-3-030-34618-8\_20}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/DottlingGHLM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/GargGH19, author = {Sanjam Garg and Romain Gay and Mohammad Hajiabadi}, editor = {Yuval Ishai and Vincent Rijmen}, title = {New Techniques for Efficient Trapdoor Functions and Applications}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19-23, 2019, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {11478}, pages = {33--63}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-17659-4\_2}, doi = {10.1007/978-3-030-17659-4\_2}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/GargGH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/GargHMRS19, author = {Sanjam Garg and Mohammad Hajiabadi and Mohammad Mahmoody and Ahmadreza Rahimi and Sruthi Sekar}, editor = {Dongdai Lin and Kazue Sako}, title = {Registration-Based Encryption from Standard Assumptions}, booktitle = {Public-Key Cryptography - {PKC} 2019 - 22nd {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11443}, pages = {63--93}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-17259-6\_3}, doi = {10.1007/978-3-030-17259-6\_3}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/GargHMRS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DottlingGHMW19, author = {Nico D{\"{o}}ttling and Sanjam Garg and Mohammad Hajiabadi and Daniel Masny and Daniel Wichs}, title = {Two-Round Oblivious Transfer from {CDH} or {LPN}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {414}, year = {2019}, url = {https://eprint.iacr.org/2019/414}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DottlingGHMW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GargHO19, author = {Sanjam Garg and Mohammad Hajiabadi and Rafail Ostrovsky}, title = {Efficient Range-Trapdoor Functions and Applications: Rate-1 {OT} and More}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {990}, year = {2019}, url = {https://eprint.iacr.org/2019/990}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GargHO19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DottlingGHLM19, author = {Nico D{\"{o}}ttling and Sanjam Garg and Mohammad Hajiabadi and Kevin Liu and Giulio Malavolta}, title = {Rate-1 Trapdoor Functions from the Diffie-Hellman Problem}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1072}, year = {2019}, url = {https://eprint.iacr.org/2019/1072}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DottlingGHLM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GargHMM18, author = {Sanjam Garg and Mohammad Hajiabadi and Mohammad Mahmoody and Ameer Mohammed}, editor = {Hovav Shacham and Alexandra Boldyreva}, title = {Limits on the Power of Garbling Techniques for Public-Key Encryption}, booktitle = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {10993}, pages = {335--364}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-96878-0\_12}, doi = {10.1007/978-3-319-96878-0\_12}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/GargHMM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GargH18, author = {Sanjam Garg and Mohammad Hajiabadi}, editor = {Hovav Shacham and Alexandra Boldyreva}, title = {Trapdoor Functions from the Computational Diffie-Hellman Assumption}, booktitle = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10992}, pages = {362--391}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-96881-0\_13}, doi = {10.1007/978-3-319-96881-0\_13}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/GargH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/DottlingGHM18, author = {Nico D{\"{o}}ttling and Sanjam Garg and Mohammad Hajiabadi and Daniel Masny}, editor = {Michel Abdalla and Ricardo Dahab}, title = {New Constructions of Identity-Based and Key-Dependent Message Secure Encryption Schemes}, booktitle = {Public-Key Cryptography - {PKC} 2018 - 21st {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Rio de Janeiro, Brazil, March 25-29, 2018, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10769}, pages = {3--31}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-76578-5\_1}, doi = {10.1007/978-3-319-76578-5\_1}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/DottlingGHM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/Hajiabadi18, author = {Mohammad Hajiabadi}, editor = {Amos Beimel and Stefan Dziembowski}, title = {Enhancements are Blackbox Non-trivial: Impossibility of Enhanced Trapdoor Permutations from Standard Trapdoor Permutations}, booktitle = {Theory of Cryptography - 16th International Conference, {TCC} 2018, Panaji, India, November 11-14, 2018, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11239}, pages = {448--475}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03807-6\_17}, doi = {10.1007/978-3-030-03807-6\_17}, timestamp = {Sat, 09 Apr 2022 12:44:08 +0200}, biburl = {https://dblp.org/rec/conf/tcc/Hajiabadi18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/GargHMR18, author = {Sanjam Garg and Mohammad Hajiabadi and Mohammad Mahmoody and Ahmadreza Rahimi}, editor = {Amos Beimel and Stefan Dziembowski}, title = {Registration-Based Encryption: Removing Private-Key Generator from {IBE}}, booktitle = {Theory of Cryptography - 16th International Conference, {TCC} 2018, Panaji, India, November 11-14, 2018, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11239}, pages = {689--718}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03807-6\_25}, doi = {10.1007/978-3-030-03807-6\_25}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tcc/GargHMR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GargH18, author = {Sanjam Garg and Mohammad Hajiabadi}, title = {Trapdoor Functions from the Computational Diffie-Hellman Assumption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {529}, year = {2018}, url = {https://eprint.iacr.org/2018/529}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GargH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GargHMM18, author = {Sanjam Garg and Mohammad Hajiabadi and Mohammad Mahmoody and Ameer Mohammed}, title = {Limits on the Power of Garbling Techniques for Public-Key Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {555}, year = {2018}, url = {https://eprint.iacr.org/2018/555}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GargHMM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GargGH18, author = {Sanjam Garg and Romain Gay and Mohammad Hajiabadi}, title = {New Techniques for Efficient Trapdoor Functions and Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {872}, year = {2018}, url = {https://eprint.iacr.org/2018/872}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GargGH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Hajiabadi18, author = {Mohammad Hajiabadi}, title = {Enhancements Are Blackbox Non-Trivial: Impossibility of Enhanced Trapdoor Permutations from Standard Trapdoor Permutations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {900}, year = {2018}, url = {https://eprint.iacr.org/2018/900}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Hajiabadi18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GargHMR18, author = {Sanjam Garg and Mohammad Hajiabadi and Mohammad Mahmoody and Ahmadreza Rahimi}, title = {Registration-Based Encryption: Removing Private-Key Generator from {IBE}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {919}, year = {2018}, url = {https://eprint.iacr.org/2018/919}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GargHMR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GargHMRS18, author = {Sanjam Garg and Mohammad Hajiabadi and Mohammad Mahmoody and Ahmadreza Rahimi and Sruthi Sekar}, title = {Registration-Based Encryption from Standard Assumptions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1030}, year = {2018}, url = {https://eprint.iacr.org/2018/1030}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GargHMRS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/HajiabadiK17, author = {Mohammad Hajiabadi and Bruce M. Kapron}, title = {Reproducible Circularly Secure Bit Encryption: Applications and Realizations}, journal = {J. Cryptol.}, volume = {30}, number = {4}, pages = {1187--1237}, year = {2017}, url = {https://doi.org/10.1007/s00145-016-9246-4}, doi = {10.1007/S00145-016-9246-4}, timestamp = {Sat, 21 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/HajiabadiK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/BootleCGGHJ17, author = {Jonathan Bootle and Andrea Cerulli and Essam Ghadafi and Jens Groth and Mohammad Hajiabadi and Sune K. Jakobsen}, editor = {Tsuyoshi Takagi and Thomas Peyrin}, title = {Linear-Time Zero-Knowledge Proofs for Arithmetic Circuit Satisfiability}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2017 - 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {10626}, pages = {336--365}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-70700-6\_12}, doi = {10.1007/978-3-319-70700-6\_12}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/BootleCGGHJ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/HajiabadiK17, author = {Mohammad Hajiabadi and Bruce M. Kapron}, editor = {Jean{-}S{\'{e}}bastien Coron and Jesper Buus Nielsen}, title = {Toward Fine-Grained Blackbox Separations Between Semantic and Circular-Security Notions}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10211}, pages = {561--591}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-56614-6\_19}, doi = {10.1007/978-3-319-56614-6\_19}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/HajiabadiK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HajiabadiK17, author = {Mohammad Hajiabadi and Bruce M. Kapron}, title = {Toward Fine-Grained Blackbox Separations Between Semantic and Circular-Security Notions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {146}, year = {2017}, url = {http://eprint.iacr.org/2017/146}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HajiabadiK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BootleCGGHJ17, author = {Jonathan Bootle and Andrea Cerulli and Essam Ghadafi and Jens Groth and Mohammad Hajiabadi and Sune K. Jakobsen}, title = {Linear-Time Zero-Knowledge Proofs for Arithmetic Circuit Satisfiability}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {872}, year = {2017}, url = {http://eprint.iacr.org/2017/872}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BootleCGGHJ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DottlingGHM17, author = {Nico D{\"{o}}ttling and Sanjam Garg and Mohammad Hajiabadi and Daniel Masny}, title = {New Constructions of Identity-Based and Key-Dependent Message Secure Encryption Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {978}, year = {2017}, url = {http://eprint.iacr.org/2017/978}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DottlingGHM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/ca/Hajiabadi16, author = {Mohammad Hajiabadi}, title = {Encryption security against key-dependent-message attacks: applications, realizations and separations}, school = {University of Victoria, Canada}, year = {2016}, url = {http://hdl.handle.net/1828/7454}, timestamp = {Fri, 05 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/ca/Hajiabadi16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/HajiabadiKS16, author = {Mohammad Hajiabadi and Bruce M. Kapron and Venkatesh Srinivasan}, editor = {Chen{-}Mou Cheng and Kai{-}Min Chung and Giuseppe Persiano and Bo{-}Yin Yang}, title = {On Generic Constructions of Circularly-Secure, Leakage-Resilient Public-Key Encryption Schemes}, booktitle = {Public-Key Cryptography - {PKC} 2016 - 19th {IACR} International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9615}, pages = {129--158}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49387-8\_6}, doi = {10.1007/978-3-662-49387-8\_6}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/HajiabadiKS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/HajiabadiK15, author = {Mohammad Hajiabadi and Bruce M. Kapron}, editor = {Rosario Gennaro and Matthew Robshaw}, title = {Reproducible Circularly-Secure Bit Encryption: Applications and Realizations}, booktitle = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9215}, pages = {224--243}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-47989-6\_11}, doi = {10.1007/978-3-662-47989-6\_11}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/HajiabadiK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/HajiabadiK15, author = {Mohammad Hajiabadi and Bruce M. Kapron}, editor = {Anja Lehmann and Stefan Wolf}, title = {Gambling, Computational Information and Encryption Security}, booktitle = {Information Theoretic Security - 8th International Conference, {ICITS} 2015, Lugano, Switzerland, May 2-5, 2015. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9063}, pages = {141--158}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-17470-9\_9}, doi = {10.1007/978-3-319-17470-9\_9}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/icits/HajiabadiK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eccc/HajiabadiK15, author = {Mohammad Hajiabadi and Bruce M. Kapron}, title = {Gambling, Computational Information, and Encryption Security}, journal = {Electron. Colloquium Comput. Complex.}, volume = {{TR15-149}}, year = {2015}, url = {https://eccc.weizmann.ac.il/report/2015/149}, eprinttype = {ECCC}, eprint = {TR15-149}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eccc/HajiabadiK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HajiabadiK15, author = {Mohammad Hajiabadi and Bruce M. Kapron}, title = {Reproducible Circularly-Secure Bit Encryption: Applications and Realizations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {531}, year = {2015}, url = {http://eprint.iacr.org/2015/531}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HajiabadiK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HajiabadiKS15, author = {Mohammad Hajiabadi and Bruce M. Kapron and S. Venkatesh}, title = {On Generic Constructions of Circularly-Secure, Leakage-Resilient Public-Key Encryption Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {741}, year = {2015}, url = {http://eprint.iacr.org/2015/741}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HajiabadiKS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HajiabadiK15a, author = {Mohammad Hajiabadi and Bruce M. Kapron}, title = {Gambling, Computational Information and Encryption Security}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {870}, year = {2015}, url = {http://eprint.iacr.org/2015/870}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HajiabadiK15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/HajiabadiK13, author = {Mohammad Hajiabadi and Bruce M. Kapron}, editor = {Amit Sahai}, title = {Computational Soundness of Coinductive Symbolic Security under Active Attacks}, booktitle = {Theory of Cryptography - 10th Theory of Cryptography Conference, {TCC} 2013, Tokyo, Japan, March 3-6, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7785}, pages = {539--558}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-36594-2\_30}, doi = {10.1007/978-3-642-36594-2\_30}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/tcc/HajiabadiK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HajiabadiK12, author = {Mohammad Hajiabadi and Bruce M. Kapron}, title = {Computational Soundness of Coinductive Symbolic Security under Active Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {560}, year = {2012}, url = {http://eprint.iacr.org/2012/560}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HajiabadiK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.