Mohammad Mahmoody

From MaRDI portal
Person:775975


List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Online mergers and applications to registration-based encryption and accumulators
 
2024-11-22Paper
On the (im)possibility of time-lock puzzles in the quantum random oracle model
 
2024-09-13Paper
Lower bounds on assumptions behind registration-based encryption
 
2024-08-02Paper
Fine-grained non-interactive key-exchange: constructions and lower bounds
Advances in Cryptology – EUROCRYPT 2023
2024-01-16Paper
Black-box separations for non-interactive classical commitments in a quantum world
Advances in Cryptology – EUROCRYPT 2023
2024-01-16Paper
Lower bounds for the number of decryption updates in registration-based encryption
Theory of Cryptography
2023-08-14Paper
On the impossibility of key agreements from quantum random oracles
Advances in Cryptology – CRYPTO 2022
2023-06-28Paper
Polynomial-time targeted attacks on coin tossing for any number of corruptions
 
2023-04-13Paper
Computational Concentration of Measure: Optimal Bounds, Reductions, and More
Proceedings of the Fourteenth Annual ACM-SIAM Symposium on Discrete Algorithms
2021-02-02Paper
Learning under \(p\)-tampering poisoning attacks
Annals of Mathematics and Artificial Intelligence
2020-09-18Paper
Limits on the power of garbling techniques for public-key encryption
 
2020-06-30Paper
On the round complexity of OT extension
 
2020-06-30Paper
Registration-based encryption from standard assumptions
 
2020-01-28Paper
Learning under \(p\)-tampering attacks
 
2019-02-06Paper
Registration-based encryption: removing private-key generator from IBE
 
2018-12-11Paper
When does functional encryption imply obfuscation?
 
2018-01-19Paper
Blockwise \(p\)-tampering attacks on cryptographic primitives, extractors, and learners
 
2018-01-19Paper
On the impossibility of cryptography with tamperable randomness
Algorithmica
2018-01-05Paper
Lower bounds on obfuscation from all-or-nothing encryption primitives
 
2017-11-03Paper
Merkle's key agreement protocol is optimal: an \(O(n^2)\) attack on any key agreement from random oracles
Journal of Cryptology
2017-10-12Paper
Limits of random oracles in secure computation (extended abstract)
Proceedings of the 5th conference on Innovations in theoretical computer science
2017-05-19Paper
On the power of nonuniformity in proofs of security
Proceedings of the 4th conference on Innovations in Theoretical Computer Science
2017-05-16Paper
Publicly verifiable proofs of sequential work
Proceedings of the 4th conference on Innovations in Theoretical Computer Science
2017-05-16Paper
On the power of hierarchical identity-based encryption
Advances in Cryptology – EUROCRYPT 2016
2016-07-15Paper
On the Impossibility of Virtual Black-Box Obfuscation in Idealized Models
Theory of Cryptography
2016-03-23Paper
Lower bounds on assumptions behind indistinguishability obfuscation
Theory of Cryptography
2016-03-23Paper
On the impossibility of cryptography with tamperable randomness
Advances in Cryptology – CRYPTO 2014
2014-08-07Paper
Can optimally-fair coin tossing be based on one-way functions?
Theory of Cryptography
2014-02-18Paper
On the power of public-key encryption in secure computation
Theory of Cryptography
2014-02-18Paper
Languages with efficient zero-knowledge PCPs are in SZK
Theory of Cryptography
2013-03-18Paper
The curious case of non-interactive commitments -- on the power of black-box vs. non-black-box use of primitives
Lecture Notes in Computer Science
2012-09-25Paper
On Efficient Zero-Knowledge PCPs
Theory of Cryptography
2012-06-15Paper
On black-box reductions between predicate encryption schemes
Theory of Cryptography
2012-06-15Paper
Time-lock puzzles in the random oracle model
Advances in Cryptology – CRYPTO 2011
2011-08-12Paper
On the Black-Box Complexity of Optimally-Fair Coin Tossing
Theory of Cryptography
2011-05-19Paper
Interactive locking, zero-knowledge PCPs, and unconditional cryptography
Advances in Cryptology – CRYPTO 2010
2010-08-24Paper
On rainbow cycles in edge colored complete graphs
 
2007-07-26Paper


Research outcomes over time


This page was built for person: Mohammad Mahmoody