What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Mohammad Hajiabadi
Google Scholar
29
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/crypto
A Framework for Witness Encryption from Linearly Verifiable SNARKs and Applications.
Sanjam Garg
Mohammad Hajiabadi
Dimitris Kolonelos
Abhiram Kothapalli
Guru-Vamsi Policharla
2024
journals/joc
Randomness Recoverable Secret Sharing Schemes.
Mohammad Hajiabadi
Shahram Khazaei
Behzad Vahdani
2024
conf/pkc
Laconic Branching Programs from the Diffie-Hellman Assumption.
Sanjam Garg
Mohammad Hajiabadi
Peihan Miao
Alice Murphy
2024
conf/eurocrypt
Lower-Bounds on Public-Key Operations in PIR.
Jesko Dujmovic
Mohammad Hajiabadi
2024
conf/tcc
On the Black-Box Complexity of Private-Key Inner-Product Functional Encryption.
Mohammad Hajiabadi
Roman Langrehr
Adam O'Neill
Mingyuan Wang
2023
conf/pkc
Credibility in Private Set Membership.
Sanjam Garg
Mohammad Hajiabadi
Abhishek Jain
Zhengzhong Jin
Omkant Pandey
Sina Shiehian
2023
conf/tcc
Lower Bounds on Assumptions Behind Registration-Based Encryption.
Mohammad Hajiabadi
Mohammad Mahmoody
Wei Qi
Sara Sarfaraz
2022
conf/tcc
On the Worst-Case Inefficiency of CGKA.
Alexander Bienstock
Yevgeniy Dodis
Sanjam Garg
Garrison Grogan
Mohammad Hajiabadi
Paul Rösler
2021
conf/crypto
Compact Ring Signatures from Learning with Errors.
Rohit Chatterjee
Sanjam Garg
Mohammad Hajiabadi
Dakshita Khurana
Xiao Liang
Giulio Malavolta
Omkant Pandey
Sina Shiehian
2021
conf/asiacrypt
How to Build a Trapdoor Function from an Encryption Scheme.
Sanjam Garg
Mohammad Hajiabadi
Giulio Malavolta
Rafail Ostrovsky
2021
conf/tcc
Laconic Private Set Intersection and Applications.
Navid Alamati
Pedro Branco
Nico Döttling
Sanjam Garg
Mohammad Hajiabadi
Sihang Pu
2021
conf/tcc
Amortizing Rate-1 OT and Applications to PIR and PSI.
Melissa Chase
Sanjam Garg
Mohammad Hajiabadi
Jialin Li
Peihan Miao
2020
conf/pkc
Master-Key KDM-Secure IBE from Pairings.
Sanjam Garg
Romain Gay
Mohammad Hajiabadi
2020
conf/eurocrypt
Two-Round Oblivious Transfer from CDH or LPN.
Nico Döttling
Sanjam Garg
Mohammad Hajiabadi
Daniel Masny
Daniel Wichs
2020
conf/tcc
Efficient Range-Trapdoor Functions and Applications: Rate-1 OT and More.
Sanjam Garg
Mohammad Hajiabadi
Rafail Ostrovsky
2019
conf/pkc
Registration-Based Encryption from Standard Assumptions.
Sanjam Garg
Mohammad Hajiabadi
Mohammad Mahmoody
Ahmadreza Rahimi
Sruthi Sekar
2019
conf/eurocrypt
New Techniques for Efficient Trapdoor Functions and Applications.
Sanjam Garg
Romain Gay
Mohammad Hajiabadi
2019
conf/asiacrypt
Rate-1 Trapdoor Functions from the Diffie-Hellman Problem.
Nico Döttling
Sanjam Garg
Mohammad Hajiabadi
Kevin Liu
Giulio Malavolta
2018
conf/crypto
Limits on the Power of Garbling Techniques for Public-Key Encryption.
Sanjam Garg
Mohammad Hajiabadi
Mohammad Mahmoody
Ameer Mohammed
2018
conf/crypto
Trapdoor Functions from the Computational Diffie-Hellman Assumption.
Sanjam Garg
Mohammad Hajiabadi
2018
conf/pkc
New Constructions of Identity-Based and Key-Dependent Message Secure Encryption Schemes.
Nico Döttling
Sanjam Garg
Mohammad Hajiabadi
Daniel Masny
2018
conf/tcc
Enhancements are Blackbox Non-trivial: Impossibility of Enhanced Trapdoor Permutations from Standard Trapdoor Permutations.
Mohammad Hajiabadi
2018
conf/tcc
Registration-Based Encryption: Removing Private-Key Generator from IBE.
Sanjam Garg
Mohammad Hajiabadi
Mohammad Mahmoody
Ahmadreza Rahimi
2017
journals/joc
Reproducible Circularly Secure Bit Encryption: Applications and Realizations.
Mohammad Hajiabadi
Bruce M. Kapron
2017
conf/eurocrypt
Toward Fine-Grained Blackbox Separations Between Semantic and Circular-Security Notions.
Mohammad Hajiabadi
Bruce M. Kapron
2017
conf/asiacrypt
Linear-Time Zero-Knowledge Proofs for Arithmetic Circuit Satisfiability.
Jonathan Bootle
Andrea Cerulli
Essam Ghadafi
Jens Groth
Mohammad Hajiabadi
Sune K. Jakobsen
2016
conf/pkc
On Generic Constructions of Circularly-Secure, Leakage-Resilient Public-Key Encryption Schemes.
Mohammad Hajiabadi
Bruce M. Kapron
Venkatesh Srinivasan
2015
conf/crypto
Reproducible Circularly-Secure Bit Encryption: Applications and Realizations.
Mohammad Hajiabadi
Bruce M. Kapron
2013
conf/tcc
Computational Soundness of Coinductive Symbolic Security under Active Attacks.
Mohammad Hajiabadi
Bruce M. Kapron
Coauthors
Abhiram Kothapalli
(1)
Abhishek Jain
(1)
Adam O'Neill
(1)
Ahmadreza Rahimi
(2)
Alexander Bienstock
(1)
Alice Murphy
(1)
Ameer Mohammed
(1)
Andrea Cerulli
(1)
Behzad Vahdani
(1)
Bruce M. Kapron
(5)
Dakshita Khurana
(1)
Daniel Masny
(2)
Daniel Wichs
(1)
Dimitris Kolonelos
(1)
Essam Ghadafi
(1)
Garrison Grogan
(1)
Giulio Malavolta
(3)
Guru-Vamsi Policharla
(1)
Jens Groth
(1)
Jesko Dujmovic
(1)
Jialin Li
(1)
Jonathan Bootle
(1)
Kevin Liu
(1)
Melissa Chase
(1)
Mingyuan Wang
(1)
Mohammad Hajiabadi
(29)
Mohammad Mahmoody
(4)
Navid Alamati
(1)
Nico Döttling
(4)
Omkant Pandey
(2)
Paul Rösler
(1)
Pedro Branco
(1)
Peihan Miao
(2)
Rafail Ostrovsky
(2)
Rohit Chatterjee
(1)
Romain Gay
(2)
Roman Langrehr
(1)
Sanjam Garg
(18)
Sara Sarfaraz
(1)
Shahram Khazaei
(1)
Sihang Pu
(1)
Sina Shiehian
(2)
Sruthi Sekar
(1)
Sune K. Jakobsen
(1)
Venkatesh Srinivasan
(1)
Wei Qi
(1)
Xiao Liang
(1)
Yevgeniy Dodis
(1)
Zhengzhong Jin
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to