BibTeX records: Mohammad Mahmoody

download as .bib file

@inproceedings{DBLP:conf/asiacrypt/AfsharCHLM23,
  author       = {Abtin Afshar and
                  Kai{-}Min Chung and
                  Yao{-}Ching Hsieh and
                  Yao{-}Ting Lin and
                  Mohammad Mahmoody},
  editor       = {Jian Guo and
                  Ron Steinfeld},
  title        = {On the (Im)possibility of Time-Lock Puzzles in the Quantum Random
                  Oracle Model},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2023 - 29th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Guangzhou, China, December 4-8, 2023, Proceedings, Part {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14441},
  pages        = {339--368},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-981-99-8730-6\_11},
  doi          = {10.1007/978-981-99-8730-6\_11},
  timestamp    = {Sun, 07 Jan 2024 14:24:24 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/AfsharCHLM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/GargGJMMPW23,
  author       = {Sanjam Garg and
                  Aarushi Goel and
                  Somesh Jha and
                  Saeed Mahloujifar and
                  Mohammad Mahmoody and
                  Guru{-}Vamsi Policharla and
                  Mingyuan Wang},
  editor       = {Weizhi Meng and
                  Christian Damsgaard Jensen and
                  Cas Cremers and
                  Engin Kirda},
  title        = {Experimenting with Zero-Knowledge Proofs of Training},
  booktitle    = {Proceedings of the 2023 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2023, Copenhagen, Denmark, November
                  26-30, 2023},
  pages        = {1880--1894},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3576915.3623202},
  doi          = {10.1145/3576915.3623202},
  timestamp    = {Fri, 08 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/GargGJMMPW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/citc/MahmoodyQ23,
  author       = {Mohammad Mahmoody and
                  Wei Qi},
  editor       = {Kai{-}Min Chung},
  title        = {Online Mergers and Applications to Registration-Based Encryption and
                  Accumulators},
  booktitle    = {4th Conference on Information-Theoretic Cryptography, {ITC} 2023,
                  June 6-8, 2023, Aarhus University, Aarhus, Denmark},
  series       = {LIPIcs},
  volume       = {267},
  pages        = {15:1--15:23},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik},
  year         = {2023},
  url          = {https://doi.org/10.4230/LIPIcs.ITC.2023.15},
  doi          = {10.4230/LIPICS.ITC.2023.15},
  timestamp    = {Wed, 21 Aug 2024 22:46:00 +0200},
  biburl       = {https://dblp.org/rec/conf/citc/MahmoodyQ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/AfsharCMS23,
  author       = {Abtin Afshar and
                  Geoffroy Couteau and
                  Mohammad Mahmoody and
                  Elahe Sadeghi},
  editor       = {Carmit Hazay and
                  Martijn Stam},
  title        = {Fine-Grained Non-interactive Key-Exchange: Constructions and Lower
                  Bounds},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Lyon, France, April 23-27, 2023, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14004},
  pages        = {55--85},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-30545-0\_3},
  doi          = {10.1007/978-3-031-30545-0\_3},
  timestamp    = {Thu, 20 Apr 2023 11:35:01 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/AfsharCMS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/ChungLM23,
  author       = {Kai{-}Min Chung and
                  Yao{-}Ting Lin and
                  Mohammad Mahmoody},
  editor       = {Carmit Hazay and
                  Martijn Stam},
  title        = {Black-Box Separations for Non-interactive Classical Commitments in
                  a Quantum World},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Lyon, France, April 23-27, 2023, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14004},
  pages        = {144--172},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-30545-0\_6},
  doi          = {10.1007/978-3-031-30545-0\_6},
  timestamp    = {Thu, 20 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/ChungLM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/HajiabadiMQS23,
  author       = {Mohammad Hajiabadi and
                  Mohammad Mahmoody and
                  Wei Qi and
                  Sara Sarfaraz},
  editor       = {Guy N. Rothblum and
                  Hoeteck Wee},
  title        = {Lower Bounds on Assumptions Behind Registration-Based Encryption},
  booktitle    = {Theory of Cryptography - 21st International Conference, {TCC} 2023,
                  Taipei, Taiwan, November 29 - December 2, 2023, Proceedings, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14370},
  pages        = {306--334},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-48618-0\_11},
  doi          = {10.1007/978-3-031-48618-0\_11},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/HajiabadiMQS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2310-18491,
  author       = {Jaiden Fairoze and
                  Sanjam Garg and
                  Somesh Jha and
                  Saeed Mahloujifar and
                  Mohammad Mahmoody and
                  Mingyuan Wang},
  title        = {Publicly Detectable Watermarking for Language Models},
  journal      = {CoRR},
  volume       = {abs/2310.18491},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2310.18491},
  doi          = {10.48550/ARXIV.2310.18491},
  eprinttype    = {arXiv},
  eprint       = {2310.18491},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2310-18491.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChungLM23,
  author       = {Kai{-}Min Chung and
                  Yao{-}Ting Lin and
                  Mohammad Mahmoody},
  title        = {Black-Box Separations for Non-Interactive Commitments in a Quantum
                  World},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {570},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/570},
  timestamp    = {Mon, 05 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChungLM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AfsharCMS23,
  author       = {Abtin Afshar and
                  Geoffroy Couteau and
                  Mohammad Mahmoody and
                  Elahe Sadeghi},
  title        = {Fine-Grained Non-Interactive Key-Exchange: Constructions and Lower
                  Bounds},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {571},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/571},
  timestamp    = {Mon, 05 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AfsharCMS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AfsharCHLM23,
  author       = {Abtin Afshar and
                  Kai{-}Min Chung and
                  Yao{-}Ching Hsieh and
                  Yao{-}Ting Lin and
                  Mohammad Mahmoody},
  title        = {On the (Im)possibility of Time-Lock Puzzles in the Quantum Random
                  Oracle Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {932},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/932},
  timestamp    = {Mon, 03 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AfsharCHLM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GargGJMMPW23,
  author       = {Sanjam Garg and
                  Aarushi Goel and
                  Somesh Jha and
                  Saeed Mahloujifar and
                  Mohammad Mahmoody and
                  Guru{-}Vamsi Policharla and
                  Mingyuan Wang},
  title        = {Experimenting with Zero-Knowledge Proofs of Training},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1345},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1345},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GargGJMMPW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FairozeGJMMW23,
  author       = {Jaiden Fairoze and
                  Sanjam Garg and
                  Somesh Jha and
                  Saeed Mahloujifar and
                  Mohammad Mahmoody and
                  Mingyuan Wang},
  title        = {Publicly Detectable Watermarking for Language Models},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1661},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1661},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FairozeGJMMW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/GaoGMV22,
  author       = {Ji Gao and
                  Sanjam Garg and
                  Mohammad Mahmoody and
                  Prashant Nalini Vasudevan},
  title        = {Deletion inference, reconstruction, and compliance in machine (un)learning},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2022},
  number       = {3},
  pages        = {415--436},
  year         = {2022},
  url          = {https://doi.org/10.56553/popets-2022-0079},
  doi          = {10.56553/POPETS-2022-0079},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/popets/GaoGMV22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AustrinCCFLM22,
  author       = {Per Austrin and
                  Hao Chung and
                  Kai{-}Min Chung and
                  Shiuan Fu and
                  Yao{-}Ting Lin and
                  Mohammad Mahmoody},
  editor       = {Yevgeniy Dodis and
                  Thomas Shrimpton},
  title        = {On the Impossibility of Key Agreements from Quantum Random Oracles},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International
                  Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August
                  15-18, 2022, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13508},
  pages        = {165--194},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-15979-4\_6},
  doi          = {10.1007/978-3-031-15979-4\_6},
  timestamp    = {Wed, 19 Oct 2022 17:37:44 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/AustrinCCFLM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nips/GargJMMW22,
  author       = {Sanjam Garg and
                  Somesh Jha and
                  Saeed Mahloujifar and
                  Mohammad Mahmoody and
                  Mingyuan Wang},
  editor       = {Sanmi Koyejo and
                  S. Mohamed and
                  A. Agarwal and
                  Danielle Belgrave and
                  K. Cho and
                  A. Oh},
  title        = {Overparameterization from Computational Constraints},
  booktitle    = {Advances in Neural Information Processing Systems 35: Annual Conference
                  on Neural Information Processing Systems 2022, NeurIPS 2022, New Orleans,
                  LA, USA, November 28 - December 9, 2022},
  year         = {2022},
  url          = {http://papers.nips.cc/paper\_files/paper/2022/hash/57e48ac3aa4d107979bf5c6ebc9fe99d-Abstract-Conference.html},
  timestamp    = {Mon, 08 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nips/GargJMMW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nips/HannekeKMMM22,
  author       = {Steve Hanneke and
                  Amin Karbasi and
                  Mohammad Mahmoody and
                  Idan Mehalel and
                  Shay Moran},
  editor       = {Sanmi Koyejo and
                  S. Mohamed and
                  A. Agarwal and
                  Danielle Belgrave and
                  K. Cho and
                  A. Oh},
  title        = {On Optimal Learning Under Targeted Data Poisoning},
  booktitle    = {Advances in Neural Information Processing Systems 35: Annual Conference
                  on Neural Information Processing Systems 2022, NeurIPS 2022, New Orleans,
                  LA, USA, November 28 - December 9, 2022},
  year         = {2022},
  url          = {http://papers.nips.cc/paper\_files/paper/2022/hash/c6afe9a5d1e1068796d32613ddca1ab7-Abstract-Conference.html},
  timestamp    = {Mon, 08 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nips/HannekeKMMM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/MahmoodyQR22,
  author       = {Mohammad Mahmoody and
                  Wei Qi and
                  Ahmadreza Rahimi},
  editor       = {Eike Kiltz and
                  Vinod Vaikuntanathan},
  title        = {Lower Bounds for the Number of Decryption Updates in Registration-Based
                  Encryption},
  booktitle    = {Theory of Cryptography - 20th International Conference, {TCC} 2022,
                  Chicago, IL, USA, November 7-10, 2022, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13747},
  pages        = {559--587},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-22318-1\_20},
  doi          = {10.1007/978-3-031-22318-1\_20},
  timestamp    = {Fri, 23 Dec 2022 17:47:37 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/MahmoodyQR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2202-03460,
  author       = {Ji Gao and
                  Sanjam Garg and
                  Mohammad Mahmoody and
                  Prashant Nalini Vasudevan},
  title        = {Deletion Inference, Reconstruction, and Compliance in Machine (Un)Learning},
  journal      = {CoRR},
  volume       = {abs/2202.03460},
  year         = {2022},
  url          = {https://arxiv.org/abs/2202.03460},
  eprinttype    = {arXiv},
  eprint       = {2202.03460},
  timestamp    = {Wed, 09 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2202-03460.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2208-12926,
  author       = {Sanjam Garg and
                  Somesh Jha and
                  Saeed Mahloujifar and
                  Mohammad Mahmoody and
                  Mingyuan Wang},
  title        = {Overparameterized (robust) models from computational constraints},
  journal      = {CoRR},
  volume       = {abs/2208.12926},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2208.12926},
  doi          = {10.48550/ARXIV.2208.12926},
  eprinttype    = {arXiv},
  eprint       = {2208.12926},
  timestamp    = {Fri, 08 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2208-12926.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2210-02713,
  author       = {Steve Hanneke and
                  Amin Karbasi and
                  Mohammad Mahmoody and
                  Idan Mehalel and
                  Shay Moran},
  title        = {On Optimal Learning Under Targeted Data Poisoning},
  journal      = {CoRR},
  volume       = {abs/2210.02713},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2210.02713},
  doi          = {10.48550/ARXIV.2210.02713},
  eprinttype    = {arXiv},
  eprint       = {2210.02713},
  timestamp    = {Fri, 07 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2210-02713.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AustrinCCFLM22,
  author       = {Per Austrin and
                  Hao Chung and
                  Kai{-}Min Chung and
                  Shiuan Fu and
                  Yao{-}Ting Lin and
                  Mohammad Mahmoody},
  title        = {On the Impossibility of Key Agreements from Quantum Random Oracles},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {218},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/218},
  timestamp    = {Tue, 22 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/AustrinCCFLM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MahmoodyQR22,
  author       = {Mohammad Mahmoody and
                  Wei Qi and
                  Ahmadreza Rahimi},
  title        = {Lower Bounds for the Number of Decryption Updates in Registration-Based
                  Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1285},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/1285},
  timestamp    = {Sat, 22 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MahmoodyQR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/innovations/CouteauFM21,
  author       = {Geoffroy Couteau and
                  Pooya Farshim and
                  Mohammad Mahmoody},
  editor       = {James R. Lee},
  title        = {Black-Box Uselessness: Composing Separations in Cryptography},
  booktitle    = {12th Innovations in Theoretical Computer Science Conference, {ITCS}
                  2021, January 6-8, 2021, Virtual Conference},
  series       = {LIPIcs},
  volume       = {185},
  pages        = {47:1--47:20},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik},
  year         = {2021},
  url          = {https://doi.org/10.4230/LIPIcs.ITCS.2021.47},
  doi          = {10.4230/LIPICS.ITCS.2021.47},
  timestamp    = {Wed, 21 Aug 2024 22:46:00 +0200},
  biburl       = {https://dblp.org/rec/conf/innovations/CouteauFM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nips/DengGJMMT21,
  author       = {Samuel Deng and
                  Sanjam Garg and
                  Somesh Jha and
                  Saeed Mahloujifar and
                  Mohammad Mahmoody and
                  Abhradeep Guha Thakurta},
  editor       = {Marc'Aurelio Ranzato and
                  Alina Beygelzimer and
                  Yann N. Dauphin and
                  Percy Liang and
                  Jennifer Wortman Vaughan},
  title        = {A Separation Result Between Data-oblivious and Data-aware Poisoning
                  Attacks},
  booktitle    = {Advances in Neural Information Processing Systems 34: Annual Conference
                  on Neural Information Processing Systems 2021, NeurIPS 2021, December
                  6-14, 2021, virtual},
  pages        = {10862--10875},
  year         = {2021},
  url          = {https://proceedings.neurips.cc/paper/2021/hash/5a499f6e26313e19bd4049009bbed5bd-Abstract.html},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nips/DengGJMMT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/CarliniDGJMMTT21,
  author       = {Nicholas Carlini and
                  Samuel Deng and
                  Sanjam Garg and
                  Somesh Jha and
                  Saeed Mahloujifar and
                  Mohammad Mahmoody and
                  Abhradeep Thakurta and
                  Florian Tram{\`{e}}r},
  title        = {Is Private Learning Possible with Instance Encoding?},
  booktitle    = {42nd {IEEE} Symposium on Security and Privacy, {SP} 2021, San Francisco,
                  CA, USA, 24-27 May 2021},
  pages        = {410--427},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/SP40001.2021.00099},
  doi          = {10.1109/SP40001.2021.00099},
  timestamp    = {Thu, 21 Sep 2023 15:57:26 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/CarliniDGJMMTT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/EtesamiGMM21,
  author       = {Omid Etesami and
                  Ji Gao and
                  Saeed Mahloujifar and
                  Mohammad Mahmoody},
  editor       = {Kobbi Nissim and
                  Brent Waters},
  title        = {Polynomial-Time Targeted Attacks on Coin Tossing for Any Number of
                  Corruptions},
  booktitle    = {Theory of Cryptography - 19th International Conference, {TCC} 2021,
                  Raleigh, NC, USA, November 8-11, 2021, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13043},
  pages        = {718--750},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-90453-1\_25},
  doi          = {10.1007/978-3-030-90453-1\_25},
  timestamp    = {Mon, 08 Nov 2021 11:43:29 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/EtesamiGMM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uai/GaoKM21,
  author       = {Ji Gao and
                  Amin Karbasi and
                  Mohammad Mahmoody},
  editor       = {Cassio P. de Campos and
                  Marloes H. Maathuis and
                  Erik Quaeghebeur},
  title        = {Learning and certification under instance-targeted poisoning},
  booktitle    = {Proceedings of the Thirty-Seventh Conference on Uncertainty in Artificial
                  Intelligence, {UAI} 2021, Virtual Event, 27-30 July 2021},
  series       = {Proceedings of Machine Learning Research},
  volume       = {161},
  pages        = {2135--2145},
  publisher    = {{AUAI} Press},
  year         = {2021},
  url          = {https://proceedings.mlr.press/v161/gao21b.html},
  timestamp    = {Fri, 17 Dec 2021 17:06:27 +0100},
  biburl       = {https://dblp.org/rec/conf/uai/GaoKM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2105-08709,
  author       = {Ji Gao and
                  Amin Karbasi and
                  Mohammad Mahmoody},
  title        = {Learning and Certification under Instance-targeted Poisoning},
  journal      = {CoRR},
  volume       = {abs/2105.08709},
  year         = {2021},
  url          = {https://arxiv.org/abs/2105.08709},
  eprinttype    = {arXiv},
  eprint       = {2105.08709},
  timestamp    = {Mon, 31 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2105-08709.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2108-07256,
  author       = {Nicholas Carlini and
                  Sanjam Garg and
                  Somesh Jha and
                  Saeed Mahloujifar and
                  Mohammad Mahmoody and
                  Florian Tram{\`{e}}r},
  title        = {NeuraCrypt is not private},
  journal      = {CoRR},
  volume       = {abs/2108.07256},
  year         = {2021},
  url          = {https://arxiv.org/abs/2108.07256},
  eprinttype    = {arXiv},
  eprint       = {2108.07256},
  timestamp    = {Fri, 20 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2108-07256.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CouteauFM21,
  author       = {Geoffroy Couteau and
                  Pooya Farshim and
                  Mohammad Mahmoody},
  title        = {Black-Box Uselessness: Composing Separations in Cryptography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {16},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/016},
  timestamp    = {Tue, 02 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/CouteauFM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/EtesamiGMM21,
  author       = {Omid Etesami and
                  Ji Gao and
                  Saeed Mahloujifar and
                  Mohammad Mahmoody},
  title        = {Polynomial-time targeted attacks on coin tossing for any number of
                  corruptions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1464},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/1464},
  timestamp    = {Fri, 12 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/EtesamiGMM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/amai/MahloujifarDM20,
  author       = {Saeed Mahloujifar and
                  Dimitrios I. Diochnos and
                  Mohammad Mahmoody},
  title        = {Learning under p-tampering poisoning attacks},
  journal      = {Ann. Math. Artif. Intell.},
  volume       = {88},
  number       = {7},
  pages        = {759--792},
  year         = {2020},
  url          = {https://doi.org/10.1007/s10472-019-09675-1},
  doi          = {10.1007/S10472-019-09675-1},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/amai/MahloujifarDM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/alt/GargJMM20,
  author       = {Sanjam Garg and
                  Somesh Jha and
                  Saeed Mahloujifar and
                  Mohammad Mahmoody},
  editor       = {Aryeh Kontorovich and
                  Gergely Neu},
  title        = {Adversarially Robust Learning Could Leverage Computational Hardness},
  booktitle    = {Algorithmic Learning Theory, {ALT} 2020, 8-11 February 2020, San Diego,
                  CA, {USA}},
  series       = {Proceedings of Machine Learning Research},
  volume       = {117},
  pages        = {364--385},
  publisher    = {{PMLR}},
  year         = {2020},
  url          = {http://proceedings.mlr.press/v117/garg20a.html},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/alt/GargJMM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icalp/MahmoodySW20,
  author       = {Mohammad Mahmoody and
                  Caleb Smith and
                  David J. Wu},
  editor       = {Artur Czumaj and
                  Anuj Dawar and
                  Emanuela Merelli},
  title        = {Can Verifiable Delay Functions Be Based on Random Oracles?},
  booktitle    = {47th International Colloquium on Automata, Languages, and Programming,
                  {ICALP} 2020, July 8-11, 2020, Saarbr{\"{u}}cken, Germany (Virtual
                  Conference)},
  series       = {LIPIcs},
  volume       = {168},
  pages        = {83:1--83:17},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik},
  year         = {2020},
  url          = {https://doi.org/10.4230/LIPIcs.ICALP.2020.83},
  doi          = {10.4230/LIPICS.ICALP.2020.83},
  timestamp    = {Wed, 21 Aug 2024 22:46:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icalp/MahmoodySW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icmla/DiochnosMM20,
  author       = {Dimitrios I. Diochnos and
                  Saeed Mahloujifar and
                  Mohammad Mahmoody},
  editor       = {M. Arif Wani and
                  Feng Luo and
                  Xiaolin Andy Li and
                  Dejing Dou and
                  Francesco Bonchi},
  title        = {Lower Bounds for Adversarially Robust {PAC} Learning under Evasion
                  and Hybrid Attacks},
  booktitle    = {19th {IEEE} International Conference on Machine Learning and Applications,
                  {ICMLA} 2020, Miami, FL, USA, December 14-17, 2020},
  pages        = {717--722},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/ICMLA51294.2020.00117},
  doi          = {10.1109/ICMLA51294.2020.00117},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icmla/DiochnosMM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isaim/DiochnosMM20,
  author       = {Dimitrios I. Diochnos and
                  Saeed Mahloujifar and
                  Mohammad Mahmoody},
  title        = {Lower Bounds for Adversarially Robust {PAC} Learning},
  booktitle    = {International Symposium on Artificial Intelligence and Mathematics,
                  {ISAIM} 2020, Fort Lauderdale, Florida, USA, January 6-8, 2020},
  year         = {2020},
  url          = {http://isaim2020.cs.ou.edu/papers/ISAIM2020\_Diochnos\_etal.pdf},
  timestamp    = {Wed, 20 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isaim/DiochnosMM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/soda/EtesamiMM20,
  author       = {Omid Etesami and
                  Saeed Mahloujifar and
                  Mohammad Mahmoody},
  editor       = {Shuchi Chawla},
  title        = {Computational Concentration of Measure: Optimal Bounds, Reductions,
                  and More},
  booktitle    = {Proceedings of the 2020 {ACM-SIAM} Symposium on Discrete Algorithms,
                  {SODA} 2020, Salt Lake City, UT, USA, January 5-8, 2020},
  pages        = {345--363},
  publisher    = {{SIAM}},
  year         = {2020},
  url          = {https://doi.org/10.1137/1.9781611975994.21},
  doi          = {10.1137/1.9781611975994.21},
  timestamp    = {Thu, 15 Jul 2021 13:48:53 +0200},
  biburl       = {https://dblp.org/rec/conf/soda/EtesamiMM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2003-12020,
  author       = {Sanjam Garg and
                  Somesh Jha and
                  Saeed Mahloujifar and
                  Mohammad Mahmoody and
                  Abhradeep Thakurta},
  title        = {Obliviousness Makes Poisoning Adversaries Weaker},
  journal      = {CoRR},
  volume       = {abs/2003.12020},
  year         = {2020},
  url          = {https://arxiv.org/abs/2003.12020},
  eprinttype    = {arXiv},
  eprint       = {2003.12020},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2003-12020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2011-05315,
  author       = {Nicholas Carlini and
                  Samuel Deng and
                  Sanjam Garg and
                  Somesh Jha and
                  Saeed Mahloujifar and
                  Mohammad Mahmoody and
                  Shuang Song and
                  Abhradeep Thakurta and
                  Florian Tram{\`{e}}r},
  title        = {An Attack on InstaHide: Is Private Learning Possible with Instance
                  Encoding?},
  journal      = {CoRR},
  volume       = {abs/2011.05315},
  year         = {2020},
  url          = {https://arxiv.org/abs/2011.05315},
  eprinttype    = {arXiv},
  eprint       = {2011.05315},
  timestamp    = {Thu, 12 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2011-05315.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aaai/MahloujifarDM19,
  author       = {Saeed Mahloujifar and
                  Dimitrios I. Diochnos and
                  Mohammad Mahmoody},
  title        = {The Curse of Concentration in Robust Learning: Evasion and Poisoning
                  Attacks from Concentration of Measure},
  booktitle    = {The Thirty-Third {AAAI} Conference on Artificial Intelligence, {AAAI}
                  2019, The Thirty-First Innovative Applications of Artificial Intelligence
                  Conference, {IAAI} 2019, The Ninth {AAAI} Symposium on Educational
                  Advances in Artificial Intelligence, {EAAI} 2019, Honolulu, Hawaii,
                  USA, January 27 - February 1, 2019},
  pages        = {4536--4543},
  publisher    = {{AAAI} Press},
  year         = {2019},
  url          = {https://doi.org/10.1609/aaai.v33i01.33014536},
  doi          = {10.1609/AAAI.V33I01.33014536},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/aaai/MahloujifarDM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/alt/MahloujifarM19,
  author       = {Saeed Mahloujifar and
                  Mohammad Mahmoody},
  editor       = {Aur{\'{e}}lien Garivier and
                  Satyen Kale},
  title        = {Can Adversarially Robust Learning LeverageComputational Hardness?},
  booktitle    = {Algorithmic Learning Theory, {ALT} 2019, 22-24 March 2019, Chicago,
                  Illinois, {USA}},
  series       = {Proceedings of Machine Learning Research},
  volume       = {98},
  pages        = {581--609},
  publisher    = {{PMLR}},
  year         = {2019},
  url          = {http://proceedings.mlr.press/v98/mahloujifar19a.html},
  timestamp    = {Wed, 29 May 2019 08:41:44 +0200},
  biburl       = {https://dblp.org/rec/conf/alt/MahloujifarM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icml/MahloujifarMM19,
  author       = {Saeed Mahloujifar and
                  Mohammad Mahmoody and
                  Ameer Mohammed},
  editor       = {Kamalika Chaudhuri and
                  Ruslan Salakhutdinov},
  title        = {Data Poisoning Attacks in Multi-Party Learning},
  booktitle    = {Proceedings of the 36th International Conference on Machine Learning,
                  {ICML} 2019, 9-15 June 2019, Long Beach, California, {USA}},
  series       = {Proceedings of Machine Learning Research},
  volume       = {97},
  pages        = {4274--4283},
  publisher    = {{PMLR}},
  year         = {2019},
  url          = {http://proceedings.mlr.press/v97/mahloujifar19a.html},
  timestamp    = {Tue, 11 Jun 2019 15:37:38 +0200},
  biburl       = {https://dblp.org/rec/conf/icml/MahloujifarMM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nips/MahloujifarZM019,
  author       = {Saeed Mahloujifar and
                  Xiao Zhang and
                  Mohammad Mahmoody and
                  David Evans},
  editor       = {Hanna M. Wallach and
                  Hugo Larochelle and
                  Alina Beygelzimer and
                  Florence d'Alch{\'{e}}{-}Buc and
                  Emily B. Fox and
                  Roman Garnett},
  title        = {Empirically Measuring Concentration: Fundamental Limits on Intrinsic
                  Robustness},
  booktitle    = {Advances in Neural Information Processing Systems 32: Annual Conference
                  on Neural Information Processing Systems 2019, NeurIPS 2019, December
                  8-14, 2019, Vancouver, BC, Canada},
  pages        = {5210--5221},
  year         = {2019},
  url          = {https://proceedings.neurips.cc/paper/2019/hash/46f76a4bda9a9579eab38a8f6eabcda1-Abstract.html},
  timestamp    = {Mon, 16 May 2022 15:41:51 +0200},
  biburl       = {https://dblp.org/rec/conf/nips/MahloujifarZM019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/GargHMRS19,
  author       = {Sanjam Garg and
                  Mohammad Hajiabadi and
                  Mohammad Mahmoody and
                  Ahmadreza Rahimi and
                  Sruthi Sekar},
  editor       = {Dongdai Lin and
                  Kazue Sako},
  title        = {Registration-Based Encryption from Standard Assumptions},
  booktitle    = {Public-Key Cryptography - {PKC} 2019 - 22nd {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Beijing, China,
                  April 14-17, 2019, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11443},
  pages        = {63--93},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-17259-6\_3},
  doi          = {10.1007/978-3-030-17259-6\_3},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/GargHMRS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1905-11564,
  author       = {Sanjam Garg and
                  Somesh Jha and
                  Saeed Mahloujifar and
                  Mohammad Mahmoody},
  title        = {Adversarially Robust Learning Could Leverage Computational Hardness},
  journal      = {CoRR},
  volume       = {abs/1905.11564},
  year         = {2019},
  url          = {http://arxiv.org/abs/1905.11564},
  eprinttype    = {arXiv},
  eprint       = {1905.11564},
  timestamp    = {Sat, 23 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1905-11564.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1905-12202,
  author       = {Saeed Mahloujifar and
                  Xiao Zhang and
                  Mohammad Mahmoody and
                  David Evans},
  title        = {Empirically Measuring Concentration: Fundamental Limits on Intrinsic
                  Robustness},
  journal      = {CoRR},
  volume       = {abs/1905.12202},
  year         = {2019},
  url          = {http://arxiv.org/abs/1905.12202},
  eprinttype    = {arXiv},
  eprint       = {1905.12202},
  timestamp    = {Sat, 23 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1905-12202.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1906-05815,
  author       = {Dimitrios I. Diochnos and
                  Saeed Mahloujifar and
                  Mohammad Mahmoody},
  title        = {Lower Bounds for Adversarially Robust {PAC} Learning},
  journal      = {CoRR},
  volume       = {abs/1906.05815},
  year         = {2019},
  url          = {http://arxiv.org/abs/1906.05815},
  eprinttype    = {arXiv},
  eprint       = {1906.05815},
  timestamp    = {Sat, 23 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1906-05815.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1907-05401,
  author       = {Omid Etesami and
                  Saeed Mahloujifar and
                  Mohammad Mahmoody},
  title        = {Computational Concentration of Measure: Optimal Bounds, Reductions,
                  and More},
  journal      = {CoRR},
  volume       = {abs/1907.05401},
  year         = {2019},
  url          = {http://arxiv.org/abs/1907.05401},
  eprinttype    = {arXiv},
  eprint       = {1907.05401},
  timestamp    = {Sat, 23 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1907-05401.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MahmoodySW19,
  author       = {Mohammad Mahmoody and
                  Caleb Smith and
                  David J. Wu},
  title        = {A Note on the (Im)possibility of Verifiable Delay Functions in the
                  Random Oracle Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {663},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/663},
  timestamp    = {Sun, 11 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MahmoodySW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/alt/MahloujifarDM18,
  author       = {Saeed Mahloujifar and
                  Dimitrios I. Diochnos and
                  Mohammad Mahmoody},
  editor       = {Firdaus Janoos and
                  Mehryar Mohri and
                  Karthik Sridharan},
  title        = {Learning under {\textdollar}p{\textdollar}-Tampering Attacks},
  booktitle    = {Algorithmic Learning Theory, {ALT} 2018, 7-9 April 2018, Lanzarote,
                  Canary Islands, Spain},
  series       = {Proceedings of Machine Learning Research},
  volume       = {83},
  pages        = {572--596},
  publisher    = {{PMLR}},
  year         = {2018},
  url          = {http://proceedings.mlr.press/v83/mahloujifar18a.html},
  timestamp    = {Wed, 03 Apr 2019 18:17:24 +0200},
  biburl       = {https://dblp.org/rec/conf/alt/MahloujifarDM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GargHMM18,
  author       = {Sanjam Garg and
                  Mohammad Hajiabadi and
                  Mohammad Mahmoody and
                  Ameer Mohammed},
  editor       = {Hovav Shacham and
                  Alexandra Boldyreva},
  title        = {Limits on the Power of Garbling Techniques for Public-Key Encryption},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018,
                  Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10993},
  pages        = {335--364},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-96878-0\_12},
  doi          = {10.1007/978-3-319-96878-0\_12},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/GargHMM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GargMMM18,
  author       = {Sanjam Garg and
                  Mohammad Mahmoody and
                  Daniel Masny and
                  Izaak Meckler},
  editor       = {Hovav Shacham and
                  Alexandra Boldyreva},
  title        = {On the Round Complexity of {OT} Extension},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018,
                  Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10993},
  pages        = {545--574},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-96878-0\_19},
  doi          = {10.1007/978-3-319-96878-0\_19},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/GargMMM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isaim/MahloujifarDM18,
  author       = {Saeed Mahloujifar and
                  Dimitrios I. Diochnos and
                  Mohammad Mahmoody},
  title        = {Learning under p-Tampering Attacks},
  booktitle    = {International Symposium on Artificial Intelligence and Mathematics,
                  {ISAIM} 2018, Fort Lauderdale, Florida, USA, January 3-5, 2018},
  year         = {2018},
  url          = {https://isaim2018.cs.ou.edu/papers/ISAIM2018\_Mahloujifar\_etal.pdf},
  timestamp    = {Wed, 20 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isaim/MahloujifarDM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nips/DiochnosMM18,
  author       = {Dimitrios I. Diochnos and
                  Saeed Mahloujifar and
                  Mohammad Mahmoody},
  editor       = {Samy Bengio and
                  Hanna M. Wallach and
                  Hugo Larochelle and
                  Kristen Grauman and
                  Nicol{\`{o}} Cesa{-}Bianchi and
                  Roman Garnett},
  title        = {Adversarial Risk and Robustness: General Definitions and Implications
                  for the Uniform Distribution},
  booktitle    = {Advances in Neural Information Processing Systems 31: Annual Conference
                  on Neural Information Processing Systems 2018, NeurIPS 2018, December
                  3-8, 2018, Montr{\'{e}}al, Canada},
  pages        = {10380--10389},
  year         = {2018},
  url          = {https://proceedings.neurips.cc/paper/2018/hash/3483e5ec0489e5c394b028ec4e81f3e1-Abstract.html},
  timestamp    = {Mon, 16 May 2022 15:41:51 +0200},
  biburl       = {https://dblp.org/rec/conf/nips/DiochnosMM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/GargHMR18,
  author       = {Sanjam Garg and
                  Mohammad Hajiabadi and
                  Mohammad Mahmoody and
                  Ahmadreza Rahimi},
  editor       = {Amos Beimel and
                  Stefan Dziembowski},
  title        = {Registration-Based Encryption: Removing Private-Key Generator from
                  {IBE}},
  booktitle    = {Theory of Cryptography - 16th International Conference, {TCC} 2018,
                  Panaji, India, November 11-14, 2018, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11239},
  pages        = {689--718},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-03807-6\_25},
  doi          = {10.1007/978-3-030-03807-6\_25},
  timestamp    = {Sat, 09 Apr 2022 12:44:08 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/GargHMR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1809-03063,
  author       = {Saeed Mahloujifar and
                  Dimitrios I. Diochnos and
                  Mohammad Mahmoody},
  title        = {The Curse of Concentration in Robust Learning: Evasion and Poisoning
                  Attacks from Concentration of Measure},
  journal      = {CoRR},
  volume       = {abs/1809.03063},
  year         = {2018},
  url          = {http://arxiv.org/abs/1809.03063},
  eprinttype    = {arXiv},
  eprint       = {1809.03063},
  timestamp    = {Sat, 23 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1809-03063.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1809-03474,
  author       = {Saeed Mahloujifar and
                  Mohammad Mahmoody and
                  Ameer Mohammed},
  title        = {Multi-party Poisoning through Generalized p-Tampering},
  journal      = {CoRR},
  volume       = {abs/1809.03474},
  year         = {2018},
  url          = {http://arxiv.org/abs/1809.03474},
  eprinttype    = {arXiv},
  eprint       = {1809.03474},
  timestamp    = {Sat, 23 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1809-03474.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1810-01407,
  author       = {Saeed Mahloujifar and
                  Mohammad Mahmoody},
  title        = {Can Adversarially Robust Learning Leverage Computational Hardness?},
  journal      = {CoRR},
  volume       = {abs/1810.01407},
  year         = {2018},
  url          = {http://arxiv.org/abs/1810.01407},
  eprinttype    = {arXiv},
  eprint       = {1810.01407},
  timestamp    = {Sat, 23 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1810-01407.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1810-12272,
  author       = {Dimitrios I. Diochnos and
                  Saeed Mahloujifar and
                  Mohammad Mahmoody},
  title        = {Adversarial Risk and Robustness: General Definitions and Implications
                  for the Uniform Distribution},
  journal      = {CoRR},
  volume       = {abs/1810.12272},
  year         = {2018},
  url          = {http://arxiv.org/abs/1810.12272},
  eprinttype    = {arXiv},
  eprint       = {1810.12272},
  timestamp    = {Sat, 23 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1810-12272.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/EtemadM018,
  author       = {Mohammad Etemad and
                  Mohammad Mahmoody and
                  David Evans},
  title        = {Optimizing Trees for Static Searchable Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {52},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/052},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/EtemadM018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GargHMM18,
  author       = {Sanjam Garg and
                  Mohammad Hajiabadi and
                  Mohammad Mahmoody and
                  Ameer Mohammed},
  title        = {Limits on the Power of Garbling Techniques for Public-Key Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {555},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/555},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GargHMM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MahloujifarMM18,
  author       = {Saeed Mahloujifar and
                  Mohammad Mahmoody and
                  Ameer Mohammed},
  title        = {Multi-party Poisoning through Generalized p-Tampering},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {854},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/854},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MahloujifarMM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GargHMR18,
  author       = {Sanjam Garg and
                  Mohammad Hajiabadi and
                  Mohammad Mahmoody and
                  Ahmadreza Rahimi},
  title        = {Registration-Based Encryption: Removing Private-Key Generator from
                  {IBE}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {919},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/919},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GargHMR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GargHMRS18,
  author       = {Sanjam Garg and
                  Mohammad Hajiabadi and
                  Mohammad Mahmoody and
                  Ahmadreza Rahimi and
                  Sruthi Sekar},
  title        = {Registration-Based Encryption from Standard Assumptions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1030},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1030},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GargHMRS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/algorithmica/AustrinCMPS17,
  author       = {Per Austrin and
                  Kai{-}Min Chung and
                  Mohammad Mahmoody and
                  Rafael Pass and
                  Karn Seth},
  title        = {On the Impossibility of Cryptography with Tamperable Randomness},
  journal      = {Algorithmica},
  volume       = {79},
  number       = {4},
  pages        = {1052--1101},
  year         = {2017},
  url          = {https://doi.org/10.1007/s00453-016-0219-7},
  doi          = {10.1007/S00453-016-0219-7},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/algorithmica/AustrinCMPS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/BarakM17,
  author       = {Boaz Barak and
                  Mohammad Mahmoody{-}Ghidary},
  title        = {Merkle's Key Agreement Protocol is Optimal: An O(n\({}^{\mbox{2}}\))
                  Attack on Any Key Agreement from Random Oracles},
  journal      = {J. Cryptol.},
  volume       = {30},
  number       = {3},
  pages        = {699--734},
  year         = {2017},
  url          = {https://doi.org/10.1007/s00145-016-9233-9},
  doi          = {10.1007/S00145-016-9233-9},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/BarakM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GargMM17,
  author       = {Sanjam Garg and
                  Mohammad Mahmoody and
                  Ameer Mohammed},
  editor       = {Jonathan Katz and
                  Hovav Shacham},
  title        = {Lower Bounds on Obfuscation from All-or-Nothing Encryption Primitives},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017,
                  Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10401},
  pages        = {661--695},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-63688-7\_22},
  doi          = {10.1007/978-3-319-63688-7\_22},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/GargMM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/GargMM17,
  author       = {Sanjam Garg and
                  Mohammad Mahmoody and
                  Ameer Mohammed},
  editor       = {Yael Kalai and
                  Leonid Reyzin},
  title        = {When Does Functional Encryption Imply Obfuscation?},
  booktitle    = {Theory of Cryptography - 15th International Conference, {TCC} 2017,
                  Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10677},
  pages        = {82--115},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-70500-2\_4},
  doi          = {10.1007/978-3-319-70500-2\_4},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/GargMM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/MahloujifarM17,
  author       = {Saeed Mahloujifar and
                  Mohammad Mahmoody},
  editor       = {Yael Kalai and
                  Leonid Reyzin},
  title        = {Blockwise p-Tampering Attacks on Cryptographic Primitives, Extractors,
                  and Learners},
  booktitle    = {Theory of Cryptography - 15th International Conference, {TCC} 2017,
                  Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10678},
  pages        = {245--279},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-70503-3\_8},
  doi          = {10.1007/978-3-319-70503-3\_8},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/MahloujifarM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1711-03707,
  author       = {Saeed Mahloujifar and
                  Dimitrios I. Diochnos and
                  Mohammad Mahmoody},
  title        = {Learning under p-Tampering Attacks},
  journal      = {CoRR},
  volume       = {abs/1711.03707},
  year         = {2017},
  url          = {http://arxiv.org/abs/1711.03707},
  eprinttype    = {arXiv},
  eprint       = {1711.03707},
  timestamp    = {Sat, 23 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1711-03707.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GargMM17,
  author       = {Sanjam Garg and
                  Mohammad Mahmoody and
                  Ameer Mohammed},
  title        = {Lower Bounds on Obfuscation from All-or-Nothing Encryption Primitives},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {541},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/541},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GargMM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GargMM17a,
  author       = {Sanjam Garg and
                  Mohammad Mahmoody and
                  Ameer Mohammed},
  title        = {When does Functional Encryption Imply Obfuscation?},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {943},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/943},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GargMM17a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MahloujifarM17,
  author       = {Saeed Mahloujifar and
                  Mohammad Mahmoody},
  title        = {Blockwise p-Tampering Attacks on Cryptographic Primitives, Extractors,
                  and Learners},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {950},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/950},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MahloujifarM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GargMMM17,
  author       = {Sanjam Garg and
                  Mohammad Mahmoody and
                  Daniel Masny and
                  Izaak Meckler},
  title        = {On the Round Complexity of {OT} Extension},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1187},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1187},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GargMMM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/MahmoodyM16,
  author       = {Mohammad Mahmoody and
                  Ameer Mohammed},
  editor       = {Marc Fischlin and
                  Jean{-}S{\'{e}}bastien Coron},
  title        = {On the Power of Hierarchical Identity-Based Encryption},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2016 - 35th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Vienna, Austria, May 8-12, 2016, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9666},
  pages        = {243--272},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-49896-5\_9},
  doi          = {10.1007/978-3-662-49896-5\_9},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/MahmoodyM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/MahmoodyMN16,
  author       = {Mohammad Mahmoody and
                  Ameer Mohammed and
                  Soheil Nematihaji},
  editor       = {Eyal Kushilevitz and
                  Tal Malkin},
  title        = {On the Impossibility of Virtual Black-Box Obfuscation in Idealized
                  Models},
  booktitle    = {Theory of Cryptography - 13th International Conference, {TCC} 2016-A,
                  Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9562},
  pages        = {18--48},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-49096-9\_2},
  doi          = {10.1007/978-3-662-49096-9\_2},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/MahmoodyMN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/MahmoodyMNPS16,
  author       = {Mohammad Mahmoody and
                  Ameer Mohammed and
                  Soheil Nematihaji and
                  Rafael Pass and
                  Abhi Shelat},
  editor       = {Eyal Kushilevitz and
                  Tal Malkin},
  title        = {Lower Bounds on Assumptions Behind Indistinguishability Obfuscation},
  booktitle    = {Theory of Cryptography - 13th International Conference, {TCC} 2016-A,
                  Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9562},
  pages        = {49--66},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-49096-9\_3},
  doi          = {10.1007/978-3-662-49096-9\_3},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/MahmoodyMNPS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MahmoodyMNPS16,
  author       = {Mohammad Mahmoody and
                  Ameer Mohammed and
                  Soheil Nematihaji and
                  Rafael Pass and
                  Abhi Shelat},
  title        = {A Note on Black-Box Complexity of Indistinguishability Obfuscation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {316},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/316},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MahmoodyMNPS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MahmoodyMN15,
  author       = {Mohammad Mahmoody and
                  Ameer Mohammed and
                  Soheil Nematihaji},
  title        = {More on Impossibility of Virtual Black-Box Obfuscation in Idealized
                  Models},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {632},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/632},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MahmoodyMN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MahmoodyM15,
  author       = {Mohammad Mahmoody and
                  Ameer Mohammed},
  title        = {On the Power of Hierarchical Identity-Based Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {815},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/815},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MahmoodyM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MahmoodyMNPS15,
  author       = {Mohammad Mahmoody and
                  Ameer Mohammed and
                  Soheil Nematihaji and
                  Rafael Pass and
                  Abhi Shelat},
  title        = {Lower Bounds on Assumptions behind Indistinguishability Obfuscation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1062},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1062},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MahmoodyMNPS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AustrinCMPS14,
  author       = {Per Austrin and
                  Kai{-}Min Chung and
                  Mohammad Mahmoody and
                  Rafael Pass and
                  Karn Seth},
  editor       = {Juan A. Garay and
                  Rosario Gennaro},
  title        = {On the Impossibility of Cryptography with Tamperable Randomness},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8616},
  pages        = {462--479},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44371-2\_26},
  doi          = {10.1007/978-3-662-44371-2\_26},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/AustrinCMPS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/innovations/MahmoodyMP14,
  author       = {Mohammad Mahmoody and
                  Hemanta K. Maji and
                  Manoj Prabhakaran},
  editor       = {Moni Naor},
  title        = {Limits of random oracles in secure computation},
  booktitle    = {Innovations in Theoretical Computer Science, ITCS'14, Princeton, NJ,
                  USA, January 12-14, 2014},
  pages        = {23--34},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2554797.2554801},
  doi          = {10.1145/2554797.2554801},
  timestamp    = {Wed, 17 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/innovations/MahmoodyMP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/Dachman-SoledMM14,
  author       = {Dana Dachman{-}Soled and
                  Mohammad Mahmoody and
                  Tal Malkin},
  editor       = {Yehuda Lindell},
  title        = {Can Optimally-Fair Coin Tossing Be Based on One-Way Functions?},
  booktitle    = {Theory of Cryptography - 11th Theory of Cryptography Conference, {TCC}
                  2014, San Diego, CA, USA, February 24-26, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8349},
  pages        = {217--239},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-54242-8\_10},
  doi          = {10.1007/978-3-642-54242-8\_10},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/Dachman-SoledMM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/MahmoodyMP14,
  author       = {Mohammad Mahmoody and
                  Hemanta K. Maji and
                  Manoj Prabhakaran},
  editor       = {Yehuda Lindell},
  title        = {On the Power of Public-Key Encryption in Secure Computation},
  booktitle    = {Theory of Cryptography - 11th Theory of Cryptography Conference, {TCC}
                  2014, San Diego, CA, USA, February 24-26, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8349},
  pages        = {240--264},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-54242-8\_11},
  doi          = {10.1007/978-3-642-54242-8\_11},
  timestamp    = {Wed, 17 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/MahmoodyMP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/innovations/MahmoodyMV13,
  author       = {Mohammad Mahmoody and
                  Tal Moran and
                  Salil P. Vadhan},
  editor       = {Robert D. Kleinberg},
  title        = {Publicly verifiable proofs of sequential work},
  booktitle    = {Innovations in Theoretical Computer Science, {ITCS} '13, Berkeley,
                  CA, USA, January 9-12, 2013},
  pages        = {373--388},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2422436.2422479},
  doi          = {10.1145/2422436.2422479},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/innovations/MahmoodyMV13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/innovations/ChungLMP13,
  author       = {Kai{-}Min Chung and
                  Huijia Lin and
                  Mohammad Mahmoody and
                  Rafael Pass},
  editor       = {Robert D. Kleinberg},
  title        = {On the power of nonuniformity in proofs of security},
  booktitle    = {Innovations in Theoretical Computer Science, {ITCS} '13, Berkeley,
                  CA, USA, January 9-12, 2013},
  pages        = {389--400},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2422436.2422480},
  doi          = {10.1145/2422436.2422480},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/innovations/ChungLMP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/MahmoodyX13,
  author       = {Mohammad Mahmoody and
                  David Xiao},
  editor       = {Amit Sahai},
  title        = {Languages with Efficient Zero-Knowledge PCPs are in {SZK}},
  booktitle    = {Theory of Cryptography - 10th Theory of Cryptography Conference, {TCC}
                  2013, Tokyo, Japan, March 3-6, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7785},
  pages        = {297--314},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-36594-2\_17},
  doi          = {10.1007/978-3-642-36594-2\_17},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/MahmoodyX13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eccc/MahmoodyMP13,
  author       = {Mohammad Mahmoody and
                  Hemanta K. Maji and
                  Manoj Prabhakaran},
  title        = {On the Power of Public-key Encryption in Secure Computation},
  journal      = {Electron. Colloquium Comput. Complex.},
  volume       = {{TR13-137}},
  year         = {2013},
  url          = {https://eccc.weizmann.ac.il/report/2013/137},
  eprinttype    = {ECCC},
  eprint       = {TR13-137},
  timestamp    = {Wed, 17 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eccc/MahmoodyMP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AustrinCMPS13,
  author       = {Per Austrin and
                  Kai{-}Min Chung and
                  Mohammad Mahmoody and
                  Rafael Pass and
                  Karn Seth},
  title        = {On the (Im)Possibility of Tamper-Resilient Cryptography: Using Fourier
                  Analysis in Computer Viruses},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {194},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/194},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AustrinCMPS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/MahmoodyP12,
  author       = {Mohammad Mahmoody and
                  Rafael Pass},
  editor       = {Reihaneh Safavi{-}Naini and
                  Ran Canetti},
  title        = {The Curious Case of Non-Interactive Commitments - On the Power of
                  Black-Box vs. Non-Black-Box Use of Primitives},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2012 - 32nd Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 19-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7417},
  pages        = {701--718},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-32009-5\_41},
  doi          = {10.1007/978-3-642-32009-5\_41},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/MahmoodyP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/IshaiMS12,
  author       = {Yuval Ishai and
                  Mohammad Mahmoody and
                  Amit Sahai},
  editor       = {Ronald Cramer},
  title        = {On Efficient Zero-Knowledge PCPs},
  booktitle    = {Theory of Cryptography - 9th Theory of Cryptography Conference, {TCC}
                  2012, Taormina, Sicily, Italy, March 19-21, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7194},
  pages        = {151--168},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-28914-9\_9},
  doi          = {10.1007/978-3-642-28914-9\_9},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/IshaiMS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/GoyalKLM12,
  author       = {Vipul Goyal and
                  Virendra Kumar and
                  Satyanarayana V. Lokam and
                  Mohammad Mahmoody},
  editor       = {Ronald Cramer},
  title        = {On Black-Box Reductions between Predicate Encryption Schemes},
  booktitle    = {Theory of Cryptography - 9th Theory of Cryptography Conference, {TCC}
                  2012, Taormina, Sicily, Italy, March 19-21, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7194},
  pages        = {440--457},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-28914-9\_25},
  doi          = {10.1007/978-3-642-28914-9\_25},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/GoyalKLM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1205-3554,
  author       = {Mohammad Mahmoody and
                  Hemanta K. Maji and
                  Manoj Prabhakaran},
  title        = {Limits of Random Oracles in Secure Computation},
  journal      = {CoRR},
  volume       = {abs/1205.3554},
  year         = {2012},
  url          = {http://arxiv.org/abs/1205.3554},
  eprinttype    = {arXiv},
  eprint       = {1205.3554},
  timestamp    = {Wed, 17 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1205-3554.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eccc/MahmoodyMP12,
  author       = {Mohammad Mahmoody and
                  Hemanta K. Maji and
                  Manoj Prabhakaran},
  title        = {Limits of Random Oracles in Secure Computation},
  journal      = {Electron. Colloquium Comput. Complex.},
  volume       = {{TR12-065}},
  year         = {2012},
  url          = {https://eccc.weizmann.ac.il/report/2012/065},
  eprinttype    = {ECCC},
  eprint       = {TR12-065},
  timestamp    = {Wed, 17 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eccc/MahmoodyMP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eccc/MahmoodyX12,
  author       = {Mohammad Mahmoody and
                  David Xiao},
  title        = {Languages with Efficient Zero-Knowledge PCPs are in {SZK}},
  journal      = {Electron. Colloquium Comput. Complex.},
  volume       = {{TR12-052}},
  year         = {2012},
  url          = {https://eccc.weizmann.ac.il/report/2012/052},
  eprinttype    = {ECCC},
  eprint       = {TR12-052},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eccc/MahmoodyX12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MahmoodyX12,
  author       = {Mohammad Mahmoody and
                  David Xiao},
  title        = {Languages with Efficient Zero-Knowledge PCP's are in {SZK}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {229},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/229},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MahmoodyX12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MahmoodyP12,
  author       = {Mohammad Mahmoody and
                  Rafael Pass},
  title        = {The Curious Case of Non-Interactive Commitments},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {523},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/523},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MahmoodyP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChungLMP12,
  author       = {Kai{-}Min Chung and
                  Edward Lui and
                  Mohammad Mahmoody and
                  Rafael Pass},
  title        = {Unprovable Security of Two-Message Zero Knowledge},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {711},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/711},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChungLMP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/MahmoodyMV11,
  author       = {Mohammad Mahmoody and
                  Tal Moran and
                  Salil P. Vadhan},
  editor       = {Phillip Rogaway},
  title        = {Time-Lock Puzzles in the Random Oracle Model},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2011 - 31st Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 14-18, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6841},
  pages        = {39--50},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22792-9\_3},
  doi          = {10.1007/978-3-642-22792-9\_3},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/MahmoodyMV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/Dachman-SoledLMM11,
  author       = {Dana Dachman{-}Soled and
                  Yehuda Lindell and
                  Mohammad Mahmoody and
                  Tal Malkin},
  editor       = {Yuval Ishai},
  title        = {On the Black-Box Complexity of Optimally-Fair Coin Tossing},
  booktitle    = {Theory of Cryptography - 8th Theory of Cryptography Conference, {TCC}
                  2011, Providence, RI, USA, March 28-30, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6597},
  pages        = {450--467},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-19571-6\_27},
  doi          = {10.1007/978-3-642-19571-6\_27},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/Dachman-SoledLMM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MahmoodyMV11,
  author       = {Mohammad Mahmoody and
                  Tal Moran and
                  Salil P. Vadhan},
  title        = {Non-Interactive Time-Stamping and Proofs of Work in the Random Oracle
                  Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {553},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/553},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MahmoodyMV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/coco/MahmoodyX10,
  author       = {Mohammad Mahmoody and
                  David Xiao},
  title        = {On the Power of Randomized Reductions and the Checkability of {SAT}},
  booktitle    = {Proceedings of the 25th Annual {IEEE} Conference on Computational
                  Complexity, {CCC} 2010, Cambridge, Massachusetts, USA, June 9-12,
                  2010},
  pages        = {64--75},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CCC.2010.16},
  doi          = {10.1109/CCC.2010.16},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/coco/MahmoodyX10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/coco/HaitnerMX10,
  author       = {Iftach Haitner and
                  Mohammad Mahmoody and
                  David Xiao},
  title        = {A New Sampling Protocol and Applications to Basing Cryptographic Primitives
                  on the Hardness of {NP}},
  booktitle    = {Proceedings of the 25th Annual {IEEE} Conference on Computational
                  Complexity, {CCC} 2010, Cambridge, Massachusetts, USA, June 9-12,
                  2010},
  pages        = {76--87},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CCC.2010.17},
  doi          = {10.1109/CCC.2010.17},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/coco/HaitnerMX10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GoyalIMS10,
  author       = {Vipul Goyal and
                  Yuval Ishai and
                  Mohammad Mahmoody and
                  Amit Sahai},
  editor       = {Tal Rabin},
  title        = {Interactive Locking, Zero-Knowledge PCPs, and Unconditional Cryptography},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2010, 30th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 15-19, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6223},
  pages        = {173--190},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14623-7\_10},
  doi          = {10.1007/978-3-642-14623-7\_10},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/GoyalIMS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eccc/GoyalIMS10,
  author       = {Vipul Goyal and
                  Yuval Ishai and
                  Mohammad Mahmoody and
                  Amit Sahai},
  title        = {Interactive Locking, Zero-Knowledge PCPs, and Unconditional Cryptography},
  journal      = {Electron. Colloquium Comput. Complex.},
  volume       = {{TR10-020}},
  year         = {2010},
  url          = {https://eccc.weizmann.ac.il/report/2010/020},
  eprinttype    = {ECCC},
  eprint       = {TR10-020},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eccc/GoyalIMS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eccc/HaitnerMX10,
  author       = {Iftach Haitner and
                  Mohammad Mahmoody and
                  David Xiao},
  title        = {A New Sampling Protocol and Applications to Basing Cryptographic Primitives
                  on the Hardness of {NP}},
  journal      = {Electron. Colloquium Comput. Complex.},
  volume       = {{TR10-001}},
  year         = {2010},
  url          = {https://eccc.weizmann.ac.il/report/2010/001},
  eprinttype    = {ECCC},
  eprint       = {TR10-001},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eccc/HaitnerMX10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GoyalIMS10,
  author       = {Vipul Goyal and
                  Yuval Ishai and
                  Mohammad Mahmoody and
                  Amit Sahai},
  title        = {Interactive Locking, Zero-Knowledge PCPs, and Unconditional Cryptography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {89},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/089},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GoyalIMS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BarakM09,
  author       = {Boaz Barak and
                  Mohammad Mahmoody{-}Ghidary},
  editor       = {Shai Halevi},
  title        = {Merkle Puzzles Are Optimal - An \emph{O}(\emph{n}\({}^{\mbox{2}}\))-Query
                  Attack on Any Key Exchange from a Random Oracle},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2009, 29th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2009.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5677},
  pages        = {374--390},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03356-8\_22},
  doi          = {10.1007/978-3-642-03356-8\_22},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/BarakM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eccc/MahmoodyX09,
  author       = {Mohammad Mahmoody and
                  David Xiao},
  title        = {On the Power of Randomized Reductions and the Checkability of {SAT}},
  journal      = {Electron. Colloquium Comput. Complex.},
  volume       = {{TR09-139}},
  year         = {2009},
  url          = {https://eccc.weizmann.ac.il/report/2009/139},
  eprinttype    = {ECCC},
  eprint       = {TR09-139},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eccc/MahmoodyX09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/NayyeriZYM08,
  author       = {Amir Nayyeri and
                  Sajjad Zarifzadeh and
                  Nasser Yazdani and
                  Mohammad Mahmoody{-}Ghidary},
  title        = {Load sensitive topology control: Towards minimum energy consumption
                  in dense ad hoc sensor networks},
  journal      = {Comput. Networks},
  volume       = {52},
  number       = {3},
  pages        = {493--513},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.comnet.2007.09.022},
  doi          = {10.1016/J.COMNET.2007.09.022},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/NayyeriZYM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-0801-3669,
  author       = {Boaz Barak and
                  Mohammad Mahmoody{-}Ghidary},
  title        = {Merkle Puzzles are Optimal},
  journal      = {CoRR},
  volume       = {abs/0801.3669},
  year         = {2008},
  url          = {http://arxiv.org/abs/0801.3669},
  eprinttype    = {arXiv},
  eprint       = {0801.3669},
  timestamp    = {Sat, 23 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-0801-3669.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-0801-3680,
  author       = {Boaz Barak and
                  Mohammad Mahmoody{-}Ghidary},
  title        = {Lower Bounds on Signatures from Symmetric Primitives},
  journal      = {CoRR},
  volume       = {abs/0801.3680},
  year         = {2008},
  url          = {http://arxiv.org/abs/0801.3680},
  eprinttype    = {arXiv},
  eprint       = {0801.3680},
  timestamp    = {Sat, 23 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-0801-3680.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BarakM08,
  author       = {Boaz Barak and
                  Mohammad Mahmoody{-}Ghidary},
  title        = {Merkle Puzzles are Optimal},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {32},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/032},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BarakM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BarakM08a,
  author       = {Boaz Barak and
                  Mohammad Mahmoody{-}Ghidary},
  title        = {Lower Bounds on Signatures From Symmetric Primitives},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {33},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/033},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BarakM08a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ajc/AkbariEMM07,
  author       = {Saieed Akbari and
                  Omid Etesami and
                  H. Mahini and
                  Mohammad Mahmoody},
  title        = {On rainbow cycles in edge colored complete graphs},
  journal      = {Australas. {J} Comb.},
  volume       = {37},
  pages        = {33--42},
  year         = {2007},
  url          = {http://ajc.maths.uq.edu.au/pdf/37/ajc\_v37\_p033.pdf},
  timestamp    = {Wed, 11 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ajc/AkbariEMM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/focs/BarakM07,
  author       = {Boaz Barak and
                  Mohammad Mahmoody{-}Ghidary},
  title        = {Lower Bounds on Signatures From Symmetric Primitives},
  booktitle    = {48th Annual {IEEE} Symposium on Foundations of Computer Science {(FOCS}
                  2007), October 20-23, 2007, Providence, RI, USA, Proceedings},
  pages        = {680--688},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/FOCS.2007.38},
  doi          = {10.1109/FOCS.2007.38},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/focs/BarakM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dm/AkbariEMMS06,
  author       = {Saeed Akbari and
                  Omid Etesami and
                  H. Mahini and
                  Mohammad Mahmoody and
                  Arash Sharifi},
  title        = {Transversals in long rectangular arrays},
  journal      = {Discret. Math.},
  volume       = {306},
  number       = {23},
  pages        = {3011--3013},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.disc.2004.02.027},
  doi          = {10.1016/J.DISC.2004.02.027},
  timestamp    = {Fri, 12 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dm/AkbariEMMS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}