default search action
BibTeX records: Mohammad Mahmoody
@inproceedings{DBLP:conf/asiacrypt/AfsharCHLM23, author = {Abtin Afshar and Kai{-}Min Chung and Yao{-}Ching Hsieh and Yao{-}Ting Lin and Mohammad Mahmoody}, editor = {Jian Guo and Ron Steinfeld}, title = {On the (Im)possibility of Time-Lock Puzzles in the Quantum Random Oracle Model}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2023 - 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4-8, 2023, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {14441}, pages = {339--368}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-981-99-8730-6\_11}, doi = {10.1007/978-981-99-8730-6\_11}, timestamp = {Sun, 07 Jan 2024 14:24:24 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/AfsharCHLM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/GargGJMMPW23, author = {Sanjam Garg and Aarushi Goel and Somesh Jha and Saeed Mahloujifar and Mohammad Mahmoody and Guru{-}Vamsi Policharla and Mingyuan Wang}, editor = {Weizhi Meng and Christian Damsgaard Jensen and Cas Cremers and Engin Kirda}, title = {Experimenting with Zero-Knowledge Proofs of Training}, booktitle = {Proceedings of the 2023 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2023, Copenhagen, Denmark, November 26-30, 2023}, pages = {1880--1894}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3576915.3623202}, doi = {10.1145/3576915.3623202}, timestamp = {Fri, 08 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/GargGJMMPW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/citc/MahmoodyQ23, author = {Mohammad Mahmoody and Wei Qi}, editor = {Kai{-}Min Chung}, title = {Online Mergers and Applications to Registration-Based Encryption and Accumulators}, booktitle = {4th Conference on Information-Theoretic Cryptography, {ITC} 2023, June 6-8, 2023, Aarhus University, Aarhus, Denmark}, series = {LIPIcs}, volume = {267}, pages = {15:1--15:23}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2023}, url = {https://doi.org/10.4230/LIPIcs.ITC.2023.15}, doi = {10.4230/LIPICS.ITC.2023.15}, timestamp = {Wed, 21 Aug 2024 22:46:00 +0200}, biburl = {https://dblp.org/rec/conf/citc/MahmoodyQ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/AfsharCMS23, author = {Abtin Afshar and Geoffroy Couteau and Mohammad Mahmoody and Elahe Sadeghi}, editor = {Carmit Hazay and Martijn Stam}, title = {Fine-Grained Non-interactive Key-Exchange: Constructions and Lower Bounds}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14004}, pages = {55--85}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-30545-0\_3}, doi = {10.1007/978-3-031-30545-0\_3}, timestamp = {Thu, 20 Apr 2023 11:35:01 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/AfsharCMS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/ChungLM23, author = {Kai{-}Min Chung and Yao{-}Ting Lin and Mohammad Mahmoody}, editor = {Carmit Hazay and Martijn Stam}, title = {Black-Box Separations for Non-interactive Classical Commitments in a Quantum World}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14004}, pages = {144--172}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-30545-0\_6}, doi = {10.1007/978-3-031-30545-0\_6}, timestamp = {Thu, 20 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/ChungLM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/HajiabadiMQS23, author = {Mohammad Hajiabadi and Mohammad Mahmoody and Wei Qi and Sara Sarfaraz}, editor = {Guy N. Rothblum and Hoeteck Wee}, title = {Lower Bounds on Assumptions Behind Registration-Based Encryption}, booktitle = {Theory of Cryptography - 21st International Conference, {TCC} 2023, Taipei, Taiwan, November 29 - December 2, 2023, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14370}, pages = {306--334}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-48618-0\_11}, doi = {10.1007/978-3-031-48618-0\_11}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tcc/HajiabadiMQS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2310-18491, author = {Jaiden Fairoze and Sanjam Garg and Somesh Jha and Saeed Mahloujifar and Mohammad Mahmoody and Mingyuan Wang}, title = {Publicly Detectable Watermarking for Language Models}, journal = {CoRR}, volume = {abs/2310.18491}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2310.18491}, doi = {10.48550/ARXIV.2310.18491}, eprinttype = {arXiv}, eprint = {2310.18491}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2310-18491.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChungLM23, author = {Kai{-}Min Chung and Yao{-}Ting Lin and Mohammad Mahmoody}, title = {Black-Box Separations for Non-Interactive Commitments in a Quantum World}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {570}, year = {2023}, url = {https://eprint.iacr.org/2023/570}, timestamp = {Mon, 05 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChungLM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AfsharCMS23, author = {Abtin Afshar and Geoffroy Couteau and Mohammad Mahmoody and Elahe Sadeghi}, title = {Fine-Grained Non-Interactive Key-Exchange: Constructions and Lower Bounds}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {571}, year = {2023}, url = {https://eprint.iacr.org/2023/571}, timestamp = {Mon, 05 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AfsharCMS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AfsharCHLM23, author = {Abtin Afshar and Kai{-}Min Chung and Yao{-}Ching Hsieh and Yao{-}Ting Lin and Mohammad Mahmoody}, title = {On the (Im)possibility of Time-Lock Puzzles in the Quantum Random Oracle Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {932}, year = {2023}, url = {https://eprint.iacr.org/2023/932}, timestamp = {Mon, 03 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AfsharCHLM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GargGJMMPW23, author = {Sanjam Garg and Aarushi Goel and Somesh Jha and Saeed Mahloujifar and Mohammad Mahmoody and Guru{-}Vamsi Policharla and Mingyuan Wang}, title = {Experimenting with Zero-Knowledge Proofs of Training}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1345}, year = {2023}, url = {https://eprint.iacr.org/2023/1345}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GargGJMMPW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FairozeGJMMW23, author = {Jaiden Fairoze and Sanjam Garg and Somesh Jha and Saeed Mahloujifar and Mohammad Mahmoody and Mingyuan Wang}, title = {Publicly Detectable Watermarking for Language Models}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1661}, year = {2023}, url = {https://eprint.iacr.org/2023/1661}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FairozeGJMMW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/popets/GaoGMV22, author = {Ji Gao and Sanjam Garg and Mohammad Mahmoody and Prashant Nalini Vasudevan}, title = {Deletion inference, reconstruction, and compliance in machine (un)learning}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2022}, number = {3}, pages = {415--436}, year = {2022}, url = {https://doi.org/10.56553/popets-2022-0079}, doi = {10.56553/POPETS-2022-0079}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/popets/GaoGMV22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/AustrinCCFLM22, author = {Per Austrin and Hao Chung and Kai{-}Min Chung and Shiuan Fu and Yao{-}Ting Lin and Mohammad Mahmoody}, editor = {Yevgeniy Dodis and Thomas Shrimpton}, title = {On the Impossibility of Key Agreements from Quantum Random Oracles}, booktitle = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August 15-18, 2022, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13508}, pages = {165--194}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-15979-4\_6}, doi = {10.1007/978-3-031-15979-4\_6}, timestamp = {Wed, 19 Oct 2022 17:37:44 +0200}, biburl = {https://dblp.org/rec/conf/crypto/AustrinCCFLM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nips/GargJMMW22, author = {Sanjam Garg and Somesh Jha and Saeed Mahloujifar and Mohammad Mahmoody and Mingyuan Wang}, editor = {Sanmi Koyejo and S. Mohamed and A. Agarwal and Danielle Belgrave and K. Cho and A. Oh}, title = {Overparameterization from Computational Constraints}, booktitle = {Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, NeurIPS 2022, New Orleans, LA, USA, November 28 - December 9, 2022}, year = {2022}, url = {http://papers.nips.cc/paper\_files/paper/2022/hash/57e48ac3aa4d107979bf5c6ebc9fe99d-Abstract-Conference.html}, timestamp = {Mon, 08 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nips/GargJMMW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nips/HannekeKMMM22, author = {Steve Hanneke and Amin Karbasi and Mohammad Mahmoody and Idan Mehalel and Shay Moran}, editor = {Sanmi Koyejo and S. Mohamed and A. Agarwal and Danielle Belgrave and K. Cho and A. Oh}, title = {On Optimal Learning Under Targeted Data Poisoning}, booktitle = {Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, NeurIPS 2022, New Orleans, LA, USA, November 28 - December 9, 2022}, year = {2022}, url = {http://papers.nips.cc/paper\_files/paper/2022/hash/c6afe9a5d1e1068796d32613ddca1ab7-Abstract-Conference.html}, timestamp = {Mon, 08 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nips/HannekeKMMM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/MahmoodyQR22, author = {Mohammad Mahmoody and Wei Qi and Ahmadreza Rahimi}, editor = {Eike Kiltz and Vinod Vaikuntanathan}, title = {Lower Bounds for the Number of Decryption Updates in Registration-Based Encryption}, booktitle = {Theory of Cryptography - 20th International Conference, {TCC} 2022, Chicago, IL, USA, November 7-10, 2022, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13747}, pages = {559--587}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-22318-1\_20}, doi = {10.1007/978-3-031-22318-1\_20}, timestamp = {Fri, 23 Dec 2022 17:47:37 +0100}, biburl = {https://dblp.org/rec/conf/tcc/MahmoodyQR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2202-03460, author = {Ji Gao and Sanjam Garg and Mohammad Mahmoody and Prashant Nalini Vasudevan}, title = {Deletion Inference, Reconstruction, and Compliance in Machine (Un)Learning}, journal = {CoRR}, volume = {abs/2202.03460}, year = {2022}, url = {https://arxiv.org/abs/2202.03460}, eprinttype = {arXiv}, eprint = {2202.03460}, timestamp = {Wed, 09 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2202-03460.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2208-12926, author = {Sanjam Garg and Somesh Jha and Saeed Mahloujifar and Mohammad Mahmoody and Mingyuan Wang}, title = {Overparameterized (robust) models from computational constraints}, journal = {CoRR}, volume = {abs/2208.12926}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2208.12926}, doi = {10.48550/ARXIV.2208.12926}, eprinttype = {arXiv}, eprint = {2208.12926}, timestamp = {Fri, 08 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2208-12926.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2210-02713, author = {Steve Hanneke and Amin Karbasi and Mohammad Mahmoody and Idan Mehalel and Shay Moran}, title = {On Optimal Learning Under Targeted Data Poisoning}, journal = {CoRR}, volume = {abs/2210.02713}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2210.02713}, doi = {10.48550/ARXIV.2210.02713}, eprinttype = {arXiv}, eprint = {2210.02713}, timestamp = {Fri, 07 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2210-02713.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AustrinCCFLM22, author = {Per Austrin and Hao Chung and Kai{-}Min Chung and Shiuan Fu and Yao{-}Ting Lin and Mohammad Mahmoody}, title = {On the Impossibility of Key Agreements from Quantum Random Oracles}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {218}, year = {2022}, url = {https://eprint.iacr.org/2022/218}, timestamp = {Tue, 22 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/AustrinCCFLM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MahmoodyQR22, author = {Mohammad Mahmoody and Wei Qi and Ahmadreza Rahimi}, title = {Lower Bounds for the Number of Decryption Updates in Registration-Based Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1285}, year = {2022}, url = {https://eprint.iacr.org/2022/1285}, timestamp = {Sat, 22 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MahmoodyQR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/innovations/CouteauFM21, author = {Geoffroy Couteau and Pooya Farshim and Mohammad Mahmoody}, editor = {James R. Lee}, title = {Black-Box Uselessness: Composing Separations in Cryptography}, booktitle = {12th Innovations in Theoretical Computer Science Conference, {ITCS} 2021, January 6-8, 2021, Virtual Conference}, series = {LIPIcs}, volume = {185}, pages = {47:1--47:20}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2021}, url = {https://doi.org/10.4230/LIPIcs.ITCS.2021.47}, doi = {10.4230/LIPICS.ITCS.2021.47}, timestamp = {Wed, 21 Aug 2024 22:46:00 +0200}, biburl = {https://dblp.org/rec/conf/innovations/CouteauFM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nips/DengGJMMT21, author = {Samuel Deng and Sanjam Garg and Somesh Jha and Saeed Mahloujifar and Mohammad Mahmoody and Abhradeep Guha Thakurta}, editor = {Marc'Aurelio Ranzato and Alina Beygelzimer and Yann N. Dauphin and Percy Liang and Jennifer Wortman Vaughan}, title = {A Separation Result Between Data-oblivious and Data-aware Poisoning Attacks}, booktitle = {Advances in Neural Information Processing Systems 34: Annual Conference on Neural Information Processing Systems 2021, NeurIPS 2021, December 6-14, 2021, virtual}, pages = {10862--10875}, year = {2021}, url = {https://proceedings.neurips.cc/paper/2021/hash/5a499f6e26313e19bd4049009bbed5bd-Abstract.html}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nips/DengGJMMT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/CarliniDGJMMTT21, author = {Nicholas Carlini and Samuel Deng and Sanjam Garg and Somesh Jha and Saeed Mahloujifar and Mohammad Mahmoody and Abhradeep Thakurta and Florian Tram{\`{e}}r}, title = {Is Private Learning Possible with Instance Encoding?}, booktitle = {42nd {IEEE} Symposium on Security and Privacy, {SP} 2021, San Francisco, CA, USA, 24-27 May 2021}, pages = {410--427}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/SP40001.2021.00099}, doi = {10.1109/SP40001.2021.00099}, timestamp = {Thu, 21 Sep 2023 15:57:26 +0200}, biburl = {https://dblp.org/rec/conf/sp/CarliniDGJMMTT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/EtesamiGMM21, author = {Omid Etesami and Ji Gao and Saeed Mahloujifar and Mohammad Mahmoody}, editor = {Kobbi Nissim and Brent Waters}, title = {Polynomial-Time Targeted Attacks on Coin Tossing for Any Number of Corruptions}, booktitle = {Theory of Cryptography - 19th International Conference, {TCC} 2021, Raleigh, NC, USA, November 8-11, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13043}, pages = {718--750}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-90453-1\_25}, doi = {10.1007/978-3-030-90453-1\_25}, timestamp = {Mon, 08 Nov 2021 11:43:29 +0100}, biburl = {https://dblp.org/rec/conf/tcc/EtesamiGMM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uai/GaoKM21, author = {Ji Gao and Amin Karbasi and Mohammad Mahmoody}, editor = {Cassio P. de Campos and Marloes H. Maathuis and Erik Quaeghebeur}, title = {Learning and certification under instance-targeted poisoning}, booktitle = {Proceedings of the Thirty-Seventh Conference on Uncertainty in Artificial Intelligence, {UAI} 2021, Virtual Event, 27-30 July 2021}, series = {Proceedings of Machine Learning Research}, volume = {161}, pages = {2135--2145}, publisher = {{AUAI} Press}, year = {2021}, url = {https://proceedings.mlr.press/v161/gao21b.html}, timestamp = {Fri, 17 Dec 2021 17:06:27 +0100}, biburl = {https://dblp.org/rec/conf/uai/GaoKM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2105-08709, author = {Ji Gao and Amin Karbasi and Mohammad Mahmoody}, title = {Learning and Certification under Instance-targeted Poisoning}, journal = {CoRR}, volume = {abs/2105.08709}, year = {2021}, url = {https://arxiv.org/abs/2105.08709}, eprinttype = {arXiv}, eprint = {2105.08709}, timestamp = {Mon, 31 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2105-08709.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2108-07256, author = {Nicholas Carlini and Sanjam Garg and Somesh Jha and Saeed Mahloujifar and Mohammad Mahmoody and Florian Tram{\`{e}}r}, title = {NeuraCrypt is not private}, journal = {CoRR}, volume = {abs/2108.07256}, year = {2021}, url = {https://arxiv.org/abs/2108.07256}, eprinttype = {arXiv}, eprint = {2108.07256}, timestamp = {Fri, 20 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2108-07256.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CouteauFM21, author = {Geoffroy Couteau and Pooya Farshim and Mohammad Mahmoody}, title = {Black-Box Uselessness: Composing Separations in Cryptography}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {16}, year = {2021}, url = {https://eprint.iacr.org/2021/016}, timestamp = {Tue, 02 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/CouteauFM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/EtesamiGMM21, author = {Omid Etesami and Ji Gao and Saeed Mahloujifar and Mohammad Mahmoody}, title = {Polynomial-time targeted attacks on coin tossing for any number of corruptions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1464}, year = {2021}, url = {https://eprint.iacr.org/2021/1464}, timestamp = {Fri, 12 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/EtesamiGMM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/amai/MahloujifarDM20, author = {Saeed Mahloujifar and Dimitrios I. Diochnos and Mohammad Mahmoody}, title = {Learning under p-tampering poisoning attacks}, journal = {Ann. Math. Artif. Intell.}, volume = {88}, number = {7}, pages = {759--792}, year = {2020}, url = {https://doi.org/10.1007/s10472-019-09675-1}, doi = {10.1007/S10472-019-09675-1}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/amai/MahloujifarDM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/alt/GargJMM20, author = {Sanjam Garg and Somesh Jha and Saeed Mahloujifar and Mohammad Mahmoody}, editor = {Aryeh Kontorovich and Gergely Neu}, title = {Adversarially Robust Learning Could Leverage Computational Hardness}, booktitle = {Algorithmic Learning Theory, {ALT} 2020, 8-11 February 2020, San Diego, CA, {USA}}, series = {Proceedings of Machine Learning Research}, volume = {117}, pages = {364--385}, publisher = {{PMLR}}, year = {2020}, url = {http://proceedings.mlr.press/v117/garg20a.html}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/alt/GargJMM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icalp/MahmoodySW20, author = {Mohammad Mahmoody and Caleb Smith and David J. Wu}, editor = {Artur Czumaj and Anuj Dawar and Emanuela Merelli}, title = {Can Verifiable Delay Functions Be Based on Random Oracles?}, booktitle = {47th International Colloquium on Automata, Languages, and Programming, {ICALP} 2020, July 8-11, 2020, Saarbr{\"{u}}cken, Germany (Virtual Conference)}, series = {LIPIcs}, volume = {168}, pages = {83:1--83:17}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2020}, url = {https://doi.org/10.4230/LIPIcs.ICALP.2020.83}, doi = {10.4230/LIPICS.ICALP.2020.83}, timestamp = {Wed, 21 Aug 2024 22:46:00 +0200}, biburl = {https://dblp.org/rec/conf/icalp/MahmoodySW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icmla/DiochnosMM20, author = {Dimitrios I. Diochnos and Saeed Mahloujifar and Mohammad Mahmoody}, editor = {M. Arif Wani and Feng Luo and Xiaolin Andy Li and Dejing Dou and Francesco Bonchi}, title = {Lower Bounds for Adversarially Robust {PAC} Learning under Evasion and Hybrid Attacks}, booktitle = {19th {IEEE} International Conference on Machine Learning and Applications, {ICMLA} 2020, Miami, FL, USA, December 14-17, 2020}, pages = {717--722}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/ICMLA51294.2020.00117}, doi = {10.1109/ICMLA51294.2020.00117}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icmla/DiochnosMM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isaim/DiochnosMM20, author = {Dimitrios I. Diochnos and Saeed Mahloujifar and Mohammad Mahmoody}, title = {Lower Bounds for Adversarially Robust {PAC} Learning}, booktitle = {International Symposium on Artificial Intelligence and Mathematics, {ISAIM} 2020, Fort Lauderdale, Florida, USA, January 6-8, 2020}, year = {2020}, url = {http://isaim2020.cs.ou.edu/papers/ISAIM2020\_Diochnos\_etal.pdf}, timestamp = {Wed, 20 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isaim/DiochnosMM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/soda/EtesamiMM20, author = {Omid Etesami and Saeed Mahloujifar and Mohammad Mahmoody}, editor = {Shuchi Chawla}, title = {Computational Concentration of Measure: Optimal Bounds, Reductions, and More}, booktitle = {Proceedings of the 2020 {ACM-SIAM} Symposium on Discrete Algorithms, {SODA} 2020, Salt Lake City, UT, USA, January 5-8, 2020}, pages = {345--363}, publisher = {{SIAM}}, year = {2020}, url = {https://doi.org/10.1137/1.9781611975994.21}, doi = {10.1137/1.9781611975994.21}, timestamp = {Thu, 15 Jul 2021 13:48:53 +0200}, biburl = {https://dblp.org/rec/conf/soda/EtesamiMM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2003-12020, author = {Sanjam Garg and Somesh Jha and Saeed Mahloujifar and Mohammad Mahmoody and Abhradeep Thakurta}, title = {Obliviousness Makes Poisoning Adversaries Weaker}, journal = {CoRR}, volume = {abs/2003.12020}, year = {2020}, url = {https://arxiv.org/abs/2003.12020}, eprinttype = {arXiv}, eprint = {2003.12020}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2003-12020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2011-05315, author = {Nicholas Carlini and Samuel Deng and Sanjam Garg and Somesh Jha and Saeed Mahloujifar and Mohammad Mahmoody and Shuang Song and Abhradeep Thakurta and Florian Tram{\`{e}}r}, title = {An Attack on InstaHide: Is Private Learning Possible with Instance Encoding?}, journal = {CoRR}, volume = {abs/2011.05315}, year = {2020}, url = {https://arxiv.org/abs/2011.05315}, eprinttype = {arXiv}, eprint = {2011.05315}, timestamp = {Thu, 12 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2011-05315.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aaai/MahloujifarDM19, author = {Saeed Mahloujifar and Dimitrios I. Diochnos and Mohammad Mahmoody}, title = {The Curse of Concentration in Robust Learning: Evasion and Poisoning Attacks from Concentration of Measure}, booktitle = {The Thirty-Third {AAAI} Conference on Artificial Intelligence, {AAAI} 2019, The Thirty-First Innovative Applications of Artificial Intelligence Conference, {IAAI} 2019, The Ninth {AAAI} Symposium on Educational Advances in Artificial Intelligence, {EAAI} 2019, Honolulu, Hawaii, USA, January 27 - February 1, 2019}, pages = {4536--4543}, publisher = {{AAAI} Press}, year = {2019}, url = {https://doi.org/10.1609/aaai.v33i01.33014536}, doi = {10.1609/AAAI.V33I01.33014536}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/aaai/MahloujifarDM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/alt/MahloujifarM19, author = {Saeed Mahloujifar and Mohammad Mahmoody}, editor = {Aur{\'{e}}lien Garivier and Satyen Kale}, title = {Can Adversarially Robust Learning LeverageComputational Hardness?}, booktitle = {Algorithmic Learning Theory, {ALT} 2019, 22-24 March 2019, Chicago, Illinois, {USA}}, series = {Proceedings of Machine Learning Research}, volume = {98}, pages = {581--609}, publisher = {{PMLR}}, year = {2019}, url = {http://proceedings.mlr.press/v98/mahloujifar19a.html}, timestamp = {Wed, 29 May 2019 08:41:44 +0200}, biburl = {https://dblp.org/rec/conf/alt/MahloujifarM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icml/MahloujifarMM19, author = {Saeed Mahloujifar and Mohammad Mahmoody and Ameer Mohammed}, editor = {Kamalika Chaudhuri and Ruslan Salakhutdinov}, title = {Data Poisoning Attacks in Multi-Party Learning}, booktitle = {Proceedings of the 36th International Conference on Machine Learning, {ICML} 2019, 9-15 June 2019, Long Beach, California, {USA}}, series = {Proceedings of Machine Learning Research}, volume = {97}, pages = {4274--4283}, publisher = {{PMLR}}, year = {2019}, url = {http://proceedings.mlr.press/v97/mahloujifar19a.html}, timestamp = {Tue, 11 Jun 2019 15:37:38 +0200}, biburl = {https://dblp.org/rec/conf/icml/MahloujifarMM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nips/MahloujifarZM019, author = {Saeed Mahloujifar and Xiao Zhang and Mohammad Mahmoody and David Evans}, editor = {Hanna M. Wallach and Hugo Larochelle and Alina Beygelzimer and Florence d'Alch{\'{e}}{-}Buc and Emily B. Fox and Roman Garnett}, title = {Empirically Measuring Concentration: Fundamental Limits on Intrinsic Robustness}, booktitle = {Advances in Neural Information Processing Systems 32: Annual Conference on Neural Information Processing Systems 2019, NeurIPS 2019, December 8-14, 2019, Vancouver, BC, Canada}, pages = {5210--5221}, year = {2019}, url = {https://proceedings.neurips.cc/paper/2019/hash/46f76a4bda9a9579eab38a8f6eabcda1-Abstract.html}, timestamp = {Mon, 16 May 2022 15:41:51 +0200}, biburl = {https://dblp.org/rec/conf/nips/MahloujifarZM019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/GargHMRS19, author = {Sanjam Garg and Mohammad Hajiabadi and Mohammad Mahmoody and Ahmadreza Rahimi and Sruthi Sekar}, editor = {Dongdai Lin and Kazue Sako}, title = {Registration-Based Encryption from Standard Assumptions}, booktitle = {Public-Key Cryptography - {PKC} 2019 - 22nd {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11443}, pages = {63--93}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-17259-6\_3}, doi = {10.1007/978-3-030-17259-6\_3}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/GargHMRS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1905-11564, author = {Sanjam Garg and Somesh Jha and Saeed Mahloujifar and Mohammad Mahmoody}, title = {Adversarially Robust Learning Could Leverage Computational Hardness}, journal = {CoRR}, volume = {abs/1905.11564}, year = {2019}, url = {http://arxiv.org/abs/1905.11564}, eprinttype = {arXiv}, eprint = {1905.11564}, timestamp = {Sat, 23 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1905-11564.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1905-12202, author = {Saeed Mahloujifar and Xiao Zhang and Mohammad Mahmoody and David Evans}, title = {Empirically Measuring Concentration: Fundamental Limits on Intrinsic Robustness}, journal = {CoRR}, volume = {abs/1905.12202}, year = {2019}, url = {http://arxiv.org/abs/1905.12202}, eprinttype = {arXiv}, eprint = {1905.12202}, timestamp = {Sat, 23 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1905-12202.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1906-05815, author = {Dimitrios I. Diochnos and Saeed Mahloujifar and Mohammad Mahmoody}, title = {Lower Bounds for Adversarially Robust {PAC} Learning}, journal = {CoRR}, volume = {abs/1906.05815}, year = {2019}, url = {http://arxiv.org/abs/1906.05815}, eprinttype = {arXiv}, eprint = {1906.05815}, timestamp = {Sat, 23 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1906-05815.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1907-05401, author = {Omid Etesami and Saeed Mahloujifar and Mohammad Mahmoody}, title = {Computational Concentration of Measure: Optimal Bounds, Reductions, and More}, journal = {CoRR}, volume = {abs/1907.05401}, year = {2019}, url = {http://arxiv.org/abs/1907.05401}, eprinttype = {arXiv}, eprint = {1907.05401}, timestamp = {Sat, 23 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1907-05401.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MahmoodySW19, author = {Mohammad Mahmoody and Caleb Smith and David J. Wu}, title = {A Note on the (Im)possibility of Verifiable Delay Functions in the Random Oracle Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {663}, year = {2019}, url = {https://eprint.iacr.org/2019/663}, timestamp = {Sun, 11 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MahmoodySW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/alt/MahloujifarDM18, author = {Saeed Mahloujifar and Dimitrios I. Diochnos and Mohammad Mahmoody}, editor = {Firdaus Janoos and Mehryar Mohri and Karthik Sridharan}, title = {Learning under {\textdollar}p{\textdollar}-Tampering Attacks}, booktitle = {Algorithmic Learning Theory, {ALT} 2018, 7-9 April 2018, Lanzarote, Canary Islands, Spain}, series = {Proceedings of Machine Learning Research}, volume = {83}, pages = {572--596}, publisher = {{PMLR}}, year = {2018}, url = {http://proceedings.mlr.press/v83/mahloujifar18a.html}, timestamp = {Wed, 03 Apr 2019 18:17:24 +0200}, biburl = {https://dblp.org/rec/conf/alt/MahloujifarDM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GargHMM18, author = {Sanjam Garg and Mohammad Hajiabadi and Mohammad Mahmoody and Ameer Mohammed}, editor = {Hovav Shacham and Alexandra Boldyreva}, title = {Limits on the Power of Garbling Techniques for Public-Key Encryption}, booktitle = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {10993}, pages = {335--364}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-96878-0\_12}, doi = {10.1007/978-3-319-96878-0\_12}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/GargHMM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GargMMM18, author = {Sanjam Garg and Mohammad Mahmoody and Daniel Masny and Izaak Meckler}, editor = {Hovav Shacham and Alexandra Boldyreva}, title = {On the Round Complexity of {OT} Extension}, booktitle = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {10993}, pages = {545--574}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-96878-0\_19}, doi = {10.1007/978-3-319-96878-0\_19}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/GargMMM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isaim/MahloujifarDM18, author = {Saeed Mahloujifar and Dimitrios I. Diochnos and Mohammad Mahmoody}, title = {Learning under p-Tampering Attacks}, booktitle = {International Symposium on Artificial Intelligence and Mathematics, {ISAIM} 2018, Fort Lauderdale, Florida, USA, January 3-5, 2018}, year = {2018}, url = {https://isaim2018.cs.ou.edu/papers/ISAIM2018\_Mahloujifar\_etal.pdf}, timestamp = {Wed, 20 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isaim/MahloujifarDM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nips/DiochnosMM18, author = {Dimitrios I. Diochnos and Saeed Mahloujifar and Mohammad Mahmoody}, editor = {Samy Bengio and Hanna M. Wallach and Hugo Larochelle and Kristen Grauman and Nicol{\`{o}} Cesa{-}Bianchi and Roman Garnett}, title = {Adversarial Risk and Robustness: General Definitions and Implications for the Uniform Distribution}, booktitle = {Advances in Neural Information Processing Systems 31: Annual Conference on Neural Information Processing Systems 2018, NeurIPS 2018, December 3-8, 2018, Montr{\'{e}}al, Canada}, pages = {10380--10389}, year = {2018}, url = {https://proceedings.neurips.cc/paper/2018/hash/3483e5ec0489e5c394b028ec4e81f3e1-Abstract.html}, timestamp = {Mon, 16 May 2022 15:41:51 +0200}, biburl = {https://dblp.org/rec/conf/nips/DiochnosMM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/GargHMR18, author = {Sanjam Garg and Mohammad Hajiabadi and Mohammad Mahmoody and Ahmadreza Rahimi}, editor = {Amos Beimel and Stefan Dziembowski}, title = {Registration-Based Encryption: Removing Private-Key Generator from {IBE}}, booktitle = {Theory of Cryptography - 16th International Conference, {TCC} 2018, Panaji, India, November 11-14, 2018, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11239}, pages = {689--718}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03807-6\_25}, doi = {10.1007/978-3-030-03807-6\_25}, timestamp = {Sat, 09 Apr 2022 12:44:08 +0200}, biburl = {https://dblp.org/rec/conf/tcc/GargHMR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1809-03063, author = {Saeed Mahloujifar and Dimitrios I. Diochnos and Mohammad Mahmoody}, title = {The Curse of Concentration in Robust Learning: Evasion and Poisoning Attacks from Concentration of Measure}, journal = {CoRR}, volume = {abs/1809.03063}, year = {2018}, url = {http://arxiv.org/abs/1809.03063}, eprinttype = {arXiv}, eprint = {1809.03063}, timestamp = {Sat, 23 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1809-03063.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1809-03474, author = {Saeed Mahloujifar and Mohammad Mahmoody and Ameer Mohammed}, title = {Multi-party Poisoning through Generalized p-Tampering}, journal = {CoRR}, volume = {abs/1809.03474}, year = {2018}, url = {http://arxiv.org/abs/1809.03474}, eprinttype = {arXiv}, eprint = {1809.03474}, timestamp = {Sat, 23 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1809-03474.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1810-01407, author = {Saeed Mahloujifar and Mohammad Mahmoody}, title = {Can Adversarially Robust Learning Leverage Computational Hardness?}, journal = {CoRR}, volume = {abs/1810.01407}, year = {2018}, url = {http://arxiv.org/abs/1810.01407}, eprinttype = {arXiv}, eprint = {1810.01407}, timestamp = {Sat, 23 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1810-01407.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1810-12272, author = {Dimitrios I. Diochnos and Saeed Mahloujifar and Mohammad Mahmoody}, title = {Adversarial Risk and Robustness: General Definitions and Implications for the Uniform Distribution}, journal = {CoRR}, volume = {abs/1810.12272}, year = {2018}, url = {http://arxiv.org/abs/1810.12272}, eprinttype = {arXiv}, eprint = {1810.12272}, timestamp = {Sat, 23 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1810-12272.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/EtemadM018, author = {Mohammad Etemad and Mohammad Mahmoody and David Evans}, title = {Optimizing Trees for Static Searchable Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {52}, year = {2018}, url = {http://eprint.iacr.org/2018/052}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/EtemadM018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GargHMM18, author = {Sanjam Garg and Mohammad Hajiabadi and Mohammad Mahmoody and Ameer Mohammed}, title = {Limits on the Power of Garbling Techniques for Public-Key Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {555}, year = {2018}, url = {https://eprint.iacr.org/2018/555}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GargHMM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MahloujifarMM18, author = {Saeed Mahloujifar and Mohammad Mahmoody and Ameer Mohammed}, title = {Multi-party Poisoning through Generalized p-Tampering}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {854}, year = {2018}, url = {https://eprint.iacr.org/2018/854}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MahloujifarMM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GargHMR18, author = {Sanjam Garg and Mohammad Hajiabadi and Mohammad Mahmoody and Ahmadreza Rahimi}, title = {Registration-Based Encryption: Removing Private-Key Generator from {IBE}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {919}, year = {2018}, url = {https://eprint.iacr.org/2018/919}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GargHMR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GargHMRS18, author = {Sanjam Garg and Mohammad Hajiabadi and Mohammad Mahmoody and Ahmadreza Rahimi and Sruthi Sekar}, title = {Registration-Based Encryption from Standard Assumptions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1030}, year = {2018}, url = {https://eprint.iacr.org/2018/1030}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GargHMRS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/algorithmica/AustrinCMPS17, author = {Per Austrin and Kai{-}Min Chung and Mohammad Mahmoody and Rafael Pass and Karn Seth}, title = {On the Impossibility of Cryptography with Tamperable Randomness}, journal = {Algorithmica}, volume = {79}, number = {4}, pages = {1052--1101}, year = {2017}, url = {https://doi.org/10.1007/s00453-016-0219-7}, doi = {10.1007/S00453-016-0219-7}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/algorithmica/AustrinCMPS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/BarakM17, author = {Boaz Barak and Mohammad Mahmoody{-}Ghidary}, title = {Merkle's Key Agreement Protocol is Optimal: An O(n\({}^{\mbox{2}}\)) Attack on Any Key Agreement from Random Oracles}, journal = {J. Cryptol.}, volume = {30}, number = {3}, pages = {699--734}, year = {2017}, url = {https://doi.org/10.1007/s00145-016-9233-9}, doi = {10.1007/S00145-016-9233-9}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/BarakM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GargMM17, author = {Sanjam Garg and Mohammad Mahmoody and Ameer Mohammed}, editor = {Jonathan Katz and Hovav Shacham}, title = {Lower Bounds on Obfuscation from All-or-Nothing Encryption Primitives}, booktitle = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10401}, pages = {661--695}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-63688-7\_22}, doi = {10.1007/978-3-319-63688-7\_22}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/GargMM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/GargMM17, author = {Sanjam Garg and Mohammad Mahmoody and Ameer Mohammed}, editor = {Yael Kalai and Leonid Reyzin}, title = {When Does Functional Encryption Imply Obfuscation?}, booktitle = {Theory of Cryptography - 15th International Conference, {TCC} 2017, Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10677}, pages = {82--115}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-70500-2\_4}, doi = {10.1007/978-3-319-70500-2\_4}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tcc/GargMM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/MahloujifarM17, author = {Saeed Mahloujifar and Mohammad Mahmoody}, editor = {Yael Kalai and Leonid Reyzin}, title = {Blockwise p-Tampering Attacks on Cryptographic Primitives, Extractors, and Learners}, booktitle = {Theory of Cryptography - 15th International Conference, {TCC} 2017, Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10678}, pages = {245--279}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-70503-3\_8}, doi = {10.1007/978-3-319-70503-3\_8}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tcc/MahloujifarM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1711-03707, author = {Saeed Mahloujifar and Dimitrios I. Diochnos and Mohammad Mahmoody}, title = {Learning under p-Tampering Attacks}, journal = {CoRR}, volume = {abs/1711.03707}, year = {2017}, url = {http://arxiv.org/abs/1711.03707}, eprinttype = {arXiv}, eprint = {1711.03707}, timestamp = {Sat, 23 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1711-03707.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GargMM17, author = {Sanjam Garg and Mohammad Mahmoody and Ameer Mohammed}, title = {Lower Bounds on Obfuscation from All-or-Nothing Encryption Primitives}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {541}, year = {2017}, url = {http://eprint.iacr.org/2017/541}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GargMM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GargMM17a, author = {Sanjam Garg and Mohammad Mahmoody and Ameer Mohammed}, title = {When does Functional Encryption Imply Obfuscation?}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {943}, year = {2017}, url = {http://eprint.iacr.org/2017/943}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GargMM17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MahloujifarM17, author = {Saeed Mahloujifar and Mohammad Mahmoody}, title = {Blockwise p-Tampering Attacks on Cryptographic Primitives, Extractors, and Learners}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {950}, year = {2017}, url = {http://eprint.iacr.org/2017/950}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MahloujifarM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GargMMM17, author = {Sanjam Garg and Mohammad Mahmoody and Daniel Masny and Izaak Meckler}, title = {On the Round Complexity of {OT} Extension}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1187}, year = {2017}, url = {http://eprint.iacr.org/2017/1187}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GargMMM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/MahmoodyM16, author = {Mohammad Mahmoody and Ameer Mohammed}, editor = {Marc Fischlin and Jean{-}S{\'{e}}bastien Coron}, title = {On the Power of Hierarchical Identity-Based Encryption}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9666}, pages = {243--272}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49896-5\_9}, doi = {10.1007/978-3-662-49896-5\_9}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/MahmoodyM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/MahmoodyMN16, author = {Mohammad Mahmoody and Ameer Mohammed and Soheil Nematihaji}, editor = {Eyal Kushilevitz and Tal Malkin}, title = {On the Impossibility of Virtual Black-Box Obfuscation in Idealized Models}, booktitle = {Theory of Cryptography - 13th International Conference, {TCC} 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9562}, pages = {18--48}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49096-9\_2}, doi = {10.1007/978-3-662-49096-9\_2}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tcc/MahmoodyMN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/MahmoodyMNPS16, author = {Mohammad Mahmoody and Ameer Mohammed and Soheil Nematihaji and Rafael Pass and Abhi Shelat}, editor = {Eyal Kushilevitz and Tal Malkin}, title = {Lower Bounds on Assumptions Behind Indistinguishability Obfuscation}, booktitle = {Theory of Cryptography - 13th International Conference, {TCC} 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9562}, pages = {49--66}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49096-9\_3}, doi = {10.1007/978-3-662-49096-9\_3}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/MahmoodyMNPS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MahmoodyMNPS16, author = {Mohammad Mahmoody and Ameer Mohammed and Soheil Nematihaji and Rafael Pass and Abhi Shelat}, title = {A Note on Black-Box Complexity of Indistinguishability Obfuscation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {316}, year = {2016}, url = {http://eprint.iacr.org/2016/316}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MahmoodyMNPS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MahmoodyMN15, author = {Mohammad Mahmoody and Ameer Mohammed and Soheil Nematihaji}, title = {More on Impossibility of Virtual Black-Box Obfuscation in Idealized Models}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {632}, year = {2015}, url = {http://eprint.iacr.org/2015/632}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MahmoodyMN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MahmoodyM15, author = {Mohammad Mahmoody and Ameer Mohammed}, title = {On the Power of Hierarchical Identity-Based Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {815}, year = {2015}, url = {http://eprint.iacr.org/2015/815}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MahmoodyM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MahmoodyMNPS15, author = {Mohammad Mahmoody and Ameer Mohammed and Soheil Nematihaji and Rafael Pass and Abhi Shelat}, title = {Lower Bounds on Assumptions behind Indistinguishability Obfuscation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1062}, year = {2015}, url = {http://eprint.iacr.org/2015/1062}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MahmoodyMNPS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/AustrinCMPS14, author = {Per Austrin and Kai{-}Min Chung and Mohammad Mahmoody and Rafael Pass and Karn Seth}, editor = {Juan A. Garay and Rosario Gennaro}, title = {On the Impossibility of Cryptography with Tamperable Randomness}, booktitle = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {8616}, pages = {462--479}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44371-2\_26}, doi = {10.1007/978-3-662-44371-2\_26}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/AustrinCMPS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/innovations/MahmoodyMP14, author = {Mohammad Mahmoody and Hemanta K. Maji and Manoj Prabhakaran}, editor = {Moni Naor}, title = {Limits of random oracles in secure computation}, booktitle = {Innovations in Theoretical Computer Science, ITCS'14, Princeton, NJ, USA, January 12-14, 2014}, pages = {23--34}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2554797.2554801}, doi = {10.1145/2554797.2554801}, timestamp = {Wed, 17 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/innovations/MahmoodyMP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/Dachman-SoledMM14, author = {Dana Dachman{-}Soled and Mohammad Mahmoody and Tal Malkin}, editor = {Yehuda Lindell}, title = {Can Optimally-Fair Coin Tossing Be Based on One-Way Functions?}, booktitle = {Theory of Cryptography - 11th Theory of Cryptography Conference, {TCC} 2014, San Diego, CA, USA, February 24-26, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8349}, pages = {217--239}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-54242-8\_10}, doi = {10.1007/978-3-642-54242-8\_10}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tcc/Dachman-SoledMM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/MahmoodyMP14, author = {Mohammad Mahmoody and Hemanta K. Maji and Manoj Prabhakaran}, editor = {Yehuda Lindell}, title = {On the Power of Public-Key Encryption in Secure Computation}, booktitle = {Theory of Cryptography - 11th Theory of Cryptography Conference, {TCC} 2014, San Diego, CA, USA, February 24-26, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8349}, pages = {240--264}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-54242-8\_11}, doi = {10.1007/978-3-642-54242-8\_11}, timestamp = {Wed, 17 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/MahmoodyMP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/innovations/MahmoodyMV13, author = {Mohammad Mahmoody and Tal Moran and Salil P. Vadhan}, editor = {Robert D. Kleinberg}, title = {Publicly verifiable proofs of sequential work}, booktitle = {Innovations in Theoretical Computer Science, {ITCS} '13, Berkeley, CA, USA, January 9-12, 2013}, pages = {373--388}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2422436.2422479}, doi = {10.1145/2422436.2422479}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/innovations/MahmoodyMV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/innovations/ChungLMP13, author = {Kai{-}Min Chung and Huijia Lin and Mohammad Mahmoody and Rafael Pass}, editor = {Robert D. Kleinberg}, title = {On the power of nonuniformity in proofs of security}, booktitle = {Innovations in Theoretical Computer Science, {ITCS} '13, Berkeley, CA, USA, January 9-12, 2013}, pages = {389--400}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2422436.2422480}, doi = {10.1145/2422436.2422480}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/innovations/ChungLMP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/MahmoodyX13, author = {Mohammad Mahmoody and David Xiao}, editor = {Amit Sahai}, title = {Languages with Efficient Zero-Knowledge PCPs are in {SZK}}, booktitle = {Theory of Cryptography - 10th Theory of Cryptography Conference, {TCC} 2013, Tokyo, Japan, March 3-6, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7785}, pages = {297--314}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-36594-2\_17}, doi = {10.1007/978-3-642-36594-2\_17}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tcc/MahmoodyX13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eccc/MahmoodyMP13, author = {Mohammad Mahmoody and Hemanta K. Maji and Manoj Prabhakaran}, title = {On the Power of Public-key Encryption in Secure Computation}, journal = {Electron. Colloquium Comput. Complex.}, volume = {{TR13-137}}, year = {2013}, url = {https://eccc.weizmann.ac.il/report/2013/137}, eprinttype = {ECCC}, eprint = {TR13-137}, timestamp = {Wed, 17 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eccc/MahmoodyMP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AustrinCMPS13, author = {Per Austrin and Kai{-}Min Chung and Mohammad Mahmoody and Rafael Pass and Karn Seth}, title = {On the (Im)Possibility of Tamper-Resilient Cryptography: Using Fourier Analysis in Computer Viruses}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {194}, year = {2013}, url = {http://eprint.iacr.org/2013/194}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AustrinCMPS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/MahmoodyP12, author = {Mohammad Mahmoody and Rafael Pass}, editor = {Reihaneh Safavi{-}Naini and Ran Canetti}, title = {The Curious Case of Non-Interactive Commitments - On the Power of Black-Box vs. Non-Black-Box Use of Primitives}, booktitle = {Advances in Cryptology - {CRYPTO} 2012 - 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7417}, pages = {701--718}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-32009-5\_41}, doi = {10.1007/978-3-642-32009-5\_41}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/MahmoodyP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/IshaiMS12, author = {Yuval Ishai and Mohammad Mahmoody and Amit Sahai}, editor = {Ronald Cramer}, title = {On Efficient Zero-Knowledge PCPs}, booktitle = {Theory of Cryptography - 9th Theory of Cryptography Conference, {TCC} 2012, Taormina, Sicily, Italy, March 19-21, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7194}, pages = {151--168}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-28914-9\_9}, doi = {10.1007/978-3-642-28914-9\_9}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tcc/IshaiMS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/GoyalKLM12, author = {Vipul Goyal and Virendra Kumar and Satyanarayana V. Lokam and Mohammad Mahmoody}, editor = {Ronald Cramer}, title = {On Black-Box Reductions between Predicate Encryption Schemes}, booktitle = {Theory of Cryptography - 9th Theory of Cryptography Conference, {TCC} 2012, Taormina, Sicily, Italy, March 19-21, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7194}, pages = {440--457}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-28914-9\_25}, doi = {10.1007/978-3-642-28914-9\_25}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tcc/GoyalKLM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1205-3554, author = {Mohammad Mahmoody and Hemanta K. Maji and Manoj Prabhakaran}, title = {Limits of Random Oracles in Secure Computation}, journal = {CoRR}, volume = {abs/1205.3554}, year = {2012}, url = {http://arxiv.org/abs/1205.3554}, eprinttype = {arXiv}, eprint = {1205.3554}, timestamp = {Wed, 17 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1205-3554.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eccc/MahmoodyMP12, author = {Mohammad Mahmoody and Hemanta K. Maji and Manoj Prabhakaran}, title = {Limits of Random Oracles in Secure Computation}, journal = {Electron. Colloquium Comput. Complex.}, volume = {{TR12-065}}, year = {2012}, url = {https://eccc.weizmann.ac.il/report/2012/065}, eprinttype = {ECCC}, eprint = {TR12-065}, timestamp = {Wed, 17 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eccc/MahmoodyMP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eccc/MahmoodyX12, author = {Mohammad Mahmoody and David Xiao}, title = {Languages with Efficient Zero-Knowledge PCPs are in {SZK}}, journal = {Electron. Colloquium Comput. Complex.}, volume = {{TR12-052}}, year = {2012}, url = {https://eccc.weizmann.ac.il/report/2012/052}, eprinttype = {ECCC}, eprint = {TR12-052}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eccc/MahmoodyX12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MahmoodyX12, author = {Mohammad Mahmoody and David Xiao}, title = {Languages with Efficient Zero-Knowledge PCP's are in {SZK}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {229}, year = {2012}, url = {http://eprint.iacr.org/2012/229}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MahmoodyX12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MahmoodyP12, author = {Mohammad Mahmoody and Rafael Pass}, title = {The Curious Case of Non-Interactive Commitments}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {523}, year = {2012}, url = {http://eprint.iacr.org/2012/523}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MahmoodyP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChungLMP12, author = {Kai{-}Min Chung and Edward Lui and Mohammad Mahmoody and Rafael Pass}, title = {Unprovable Security of Two-Message Zero Knowledge}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {711}, year = {2012}, url = {http://eprint.iacr.org/2012/711}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChungLMP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/MahmoodyMV11, author = {Mohammad Mahmoody and Tal Moran and Salil P. Vadhan}, editor = {Phillip Rogaway}, title = {Time-Lock Puzzles in the Random Oracle Model}, booktitle = {Advances in Cryptology - {CRYPTO} 2011 - 31st Annual Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6841}, pages = {39--50}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-22792-9\_3}, doi = {10.1007/978-3-642-22792-9\_3}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/MahmoodyMV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/Dachman-SoledLMM11, author = {Dana Dachman{-}Soled and Yehuda Lindell and Mohammad Mahmoody and Tal Malkin}, editor = {Yuval Ishai}, title = {On the Black-Box Complexity of Optimally-Fair Coin Tossing}, booktitle = {Theory of Cryptography - 8th Theory of Cryptography Conference, {TCC} 2011, Providence, RI, USA, March 28-30, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6597}, pages = {450--467}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-19571-6\_27}, doi = {10.1007/978-3-642-19571-6\_27}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tcc/Dachman-SoledLMM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MahmoodyMV11, author = {Mohammad Mahmoody and Tal Moran and Salil P. Vadhan}, title = {Non-Interactive Time-Stamping and Proofs of Work in the Random Oracle Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {553}, year = {2011}, url = {http://eprint.iacr.org/2011/553}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MahmoodyMV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/coco/MahmoodyX10, author = {Mohammad Mahmoody and David Xiao}, title = {On the Power of Randomized Reductions and the Checkability of {SAT}}, booktitle = {Proceedings of the 25th Annual {IEEE} Conference on Computational Complexity, {CCC} 2010, Cambridge, Massachusetts, USA, June 9-12, 2010}, pages = {64--75}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/CCC.2010.16}, doi = {10.1109/CCC.2010.16}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/coco/MahmoodyX10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/coco/HaitnerMX10, author = {Iftach Haitner and Mohammad Mahmoody and David Xiao}, title = {A New Sampling Protocol and Applications to Basing Cryptographic Primitives on the Hardness of {NP}}, booktitle = {Proceedings of the 25th Annual {IEEE} Conference on Computational Complexity, {CCC} 2010, Cambridge, Massachusetts, USA, June 9-12, 2010}, pages = {76--87}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/CCC.2010.17}, doi = {10.1109/CCC.2010.17}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/coco/HaitnerMX10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GoyalIMS10, author = {Vipul Goyal and Yuval Ishai and Mohammad Mahmoody and Amit Sahai}, editor = {Tal Rabin}, title = {Interactive Locking, Zero-Knowledge PCPs, and Unconditional Cryptography}, booktitle = {Advances in Cryptology - {CRYPTO} 2010, 30th Annual Cryptology Conference, Santa Barbara, CA, USA, August 15-19, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6223}, pages = {173--190}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14623-7\_10}, doi = {10.1007/978-3-642-14623-7\_10}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/GoyalIMS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eccc/GoyalIMS10, author = {Vipul Goyal and Yuval Ishai and Mohammad Mahmoody and Amit Sahai}, title = {Interactive Locking, Zero-Knowledge PCPs, and Unconditional Cryptography}, journal = {Electron. Colloquium Comput. Complex.}, volume = {{TR10-020}}, year = {2010}, url = {https://eccc.weizmann.ac.il/report/2010/020}, eprinttype = {ECCC}, eprint = {TR10-020}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eccc/GoyalIMS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eccc/HaitnerMX10, author = {Iftach Haitner and Mohammad Mahmoody and David Xiao}, title = {A New Sampling Protocol and Applications to Basing Cryptographic Primitives on the Hardness of {NP}}, journal = {Electron. Colloquium Comput. Complex.}, volume = {{TR10-001}}, year = {2010}, url = {https://eccc.weizmann.ac.il/report/2010/001}, eprinttype = {ECCC}, eprint = {TR10-001}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eccc/HaitnerMX10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GoyalIMS10, author = {Vipul Goyal and Yuval Ishai and Mohammad Mahmoody and Amit Sahai}, title = {Interactive Locking, Zero-Knowledge PCPs, and Unconditional Cryptography}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {89}, year = {2010}, url = {http://eprint.iacr.org/2010/089}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GoyalIMS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BarakM09, author = {Boaz Barak and Mohammad Mahmoody{-}Ghidary}, editor = {Shai Halevi}, title = {Merkle Puzzles Are Optimal - An \emph{O}(\emph{n}\({}^{\mbox{2}}\))-Query Attack on Any Key Exchange from a Random Oracle}, booktitle = {Advances in Cryptology - {CRYPTO} 2009, 29th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5677}, pages = {374--390}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03356-8\_22}, doi = {10.1007/978-3-642-03356-8\_22}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/BarakM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eccc/MahmoodyX09, author = {Mohammad Mahmoody and David Xiao}, title = {On the Power of Randomized Reductions and the Checkability of {SAT}}, journal = {Electron. Colloquium Comput. Complex.}, volume = {{TR09-139}}, year = {2009}, url = {https://eccc.weizmann.ac.il/report/2009/139}, eprinttype = {ECCC}, eprint = {TR09-139}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eccc/MahmoodyX09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/NayyeriZYM08, author = {Amir Nayyeri and Sajjad Zarifzadeh and Nasser Yazdani and Mohammad Mahmoody{-}Ghidary}, title = {Load sensitive topology control: Towards minimum energy consumption in dense ad hoc sensor networks}, journal = {Comput. Networks}, volume = {52}, number = {3}, pages = {493--513}, year = {2008}, url = {https://doi.org/10.1016/j.comnet.2007.09.022}, doi = {10.1016/J.COMNET.2007.09.022}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/NayyeriZYM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-0801-3669, author = {Boaz Barak and Mohammad Mahmoody{-}Ghidary}, title = {Merkle Puzzles are Optimal}, journal = {CoRR}, volume = {abs/0801.3669}, year = {2008}, url = {http://arxiv.org/abs/0801.3669}, eprinttype = {arXiv}, eprint = {0801.3669}, timestamp = {Sat, 23 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-0801-3669.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-0801-3680, author = {Boaz Barak and Mohammad Mahmoody{-}Ghidary}, title = {Lower Bounds on Signatures from Symmetric Primitives}, journal = {CoRR}, volume = {abs/0801.3680}, year = {2008}, url = {http://arxiv.org/abs/0801.3680}, eprinttype = {arXiv}, eprint = {0801.3680}, timestamp = {Sat, 23 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-0801-3680.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BarakM08, author = {Boaz Barak and Mohammad Mahmoody{-}Ghidary}, title = {Merkle Puzzles are Optimal}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {32}, year = {2008}, url = {http://eprint.iacr.org/2008/032}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BarakM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BarakM08a, author = {Boaz Barak and Mohammad Mahmoody{-}Ghidary}, title = {Lower Bounds on Signatures From Symmetric Primitives}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {33}, year = {2008}, url = {http://eprint.iacr.org/2008/033}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BarakM08a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ajc/AkbariEMM07, author = {Saieed Akbari and Omid Etesami and H. Mahini and Mohammad Mahmoody}, title = {On rainbow cycles in edge colored complete graphs}, journal = {Australas. {J} Comb.}, volume = {37}, pages = {33--42}, year = {2007}, url = {http://ajc.maths.uq.edu.au/pdf/37/ajc\_v37\_p033.pdf}, timestamp = {Wed, 11 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ajc/AkbariEMM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/focs/BarakM07, author = {Boaz Barak and Mohammad Mahmoody{-}Ghidary}, title = {Lower Bounds on Signatures From Symmetric Primitives}, booktitle = {48th Annual {IEEE} Symposium on Foundations of Computer Science {(FOCS} 2007), October 20-23, 2007, Providence, RI, USA, Proceedings}, pages = {680--688}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/FOCS.2007.38}, doi = {10.1109/FOCS.2007.38}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/focs/BarakM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dm/AkbariEMMS06, author = {Saeed Akbari and Omid Etesami and H. Mahini and Mohammad Mahmoody and Arash Sharifi}, title = {Transversals in long rectangular arrays}, journal = {Discret. Math.}, volume = {306}, number = {23}, pages = {3011--3013}, year = {2006}, url = {https://doi.org/10.1016/j.disc.2004.02.027}, doi = {10.1016/J.DISC.2004.02.027}, timestamp = {Fri, 12 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dm/AkbariEMMS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.