Mohammad Mahmoody

From MaRDI portal
Person:775975

Available identifiers

zbMath Open mahmoody.mohammadMaRDI QIDQ775975

List of research outcomes





PublicationDate of PublicationType
Online mergers and applications to registration-based encryption and accumulators2024-11-22Paper
On the (im)possibility of time-lock puzzles in the quantum random oracle model2024-09-13Paper
Lower bounds on assumptions behind registration-based encryption2024-08-02Paper
Fine-grained non-interactive key-exchange: constructions and lower bounds2024-01-16Paper
Black-box separations for non-interactive classical commitments in a quantum world2024-01-16Paper
Lower bounds for the number of decryption updates in registration-based encryption2023-08-14Paper
On the impossibility of key agreements from quantum random oracles2023-06-28Paper
Polynomial-time targeted attacks on coin tossing for any number of corruptions2023-04-13Paper
Computational Concentration of Measure: Optimal Bounds, Reductions, and More2021-02-02Paper
Learning under \(p\)-tampering poisoning attacks2020-09-18Paper
Limits on the power of garbling techniques for public-key encryption2020-06-30Paper
On the round complexity of OT extension2020-06-30Paper
Registration-based encryption from standard assumptions2020-01-28Paper
https://portal.mardi4nfdi.de/entity/Q46176262019-02-06Paper
Registration-based encryption: removing private-key generator from IBE2018-12-11Paper
When does functional encryption imply obfuscation?2018-01-19Paper
Blockwise \(p\)-tampering attacks on cryptographic primitives, extractors, and learners2018-01-19Paper
On the impossibility of cryptography with tamperable randomness2018-01-05Paper
Lower bounds on obfuscation from all-or-nothing encryption primitives2017-11-03Paper
Merkle's key agreement protocol is optimal: an \(O(n^2)\) attack on any key agreement from random oracles2017-10-12Paper
Limits of random oracles in secure computation2017-05-19Paper
On the power of nonuniformity in proofs of security2017-05-16Paper
Publicly verifiable proofs of sequential work2017-05-16Paper
On the Power of Hierarchical Identity-Based Encryption2016-07-15Paper
On the Impossibility of Virtual Black-Box Obfuscation in Idealized Models2016-03-23Paper
Lower Bounds on Assumptions Behind Indistinguishability Obfuscation2016-03-23Paper
On the Impossibility of Cryptography with Tamperable Randomness2014-08-07Paper
Can Optimally-Fair Coin Tossing Be Based on One-Way Functions?2014-02-18Paper
On the Power of Public-Key Encryption in Secure Computation2014-02-18Paper
Languages with Efficient Zero-Knowledge PCPs are in SZK2013-03-18Paper
The Curious Case of Non-Interactive Commitments – On the Power of Black-Box vs. Non-Black-Box Use of Primitives2012-09-25Paper
On Efficient Zero-Knowledge PCPs2012-06-15Paper
On Black-Box Reductions between Predicate Encryption Schemes2012-06-15Paper
Time-Lock Puzzles in the Random Oracle Model2011-08-12Paper
On the Black-Box Complexity of Optimally-Fair Coin Tossing2011-05-19Paper
Interactive Locking, Zero-Knowledge PCPs, and Unconditional Cryptography2010-08-24Paper
https://portal.mardi4nfdi.de/entity/Q52949112007-07-26Paper

Research outcomes over time

This page was built for person: Mohammad Mahmoody