Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
Mohammad Mahmoody - MaRDI portal

Mohammad Mahmoody

From MaRDI portal
Person:775975

Available identifiers

zbMath Open mahmoody.mohammadMaRDI QIDQ775975

List of research outcomes

PublicationDate of PublicationType
Fine-grained non-interactive key-exchange: constructions and lower bounds2024-01-16Paper
Black-box separations for non-interactive classical commitments in a quantum world2024-01-16Paper
Lower bounds for the number of decryption updates in registration-based encryption2023-08-14Paper
On the impossibility of key agreements from quantum random oracles2023-06-28Paper
Polynomial-time targeted attacks on coin tossing for any number of corruptions2023-04-13Paper
Computational Concentration of Measure: Optimal Bounds, Reductions, and More2021-02-02Paper
Learning under \(p\)-tampering poisoning attacks2020-09-18Paper
Limits on the power of garbling techniques for public-key encryption2020-06-30Paper
On the round complexity of OT extension2020-06-30Paper
Registration-based encryption from standard assumptions2020-01-28Paper
https://portal.mardi4nfdi.de/entity/Q46176262019-02-06Paper
Registration-based encryption: removing private-key generator from IBE2018-12-11Paper
When does functional encryption imply obfuscation?2018-01-19Paper
Blockwise \(p\)-tampering attacks on cryptographic primitives, extractors, and learners2018-01-19Paper
On the impossibility of cryptography with tamperable randomness2018-01-05Paper
Lower bounds on obfuscation from all-or-nothing encryption primitives2017-11-03Paper
Merkle's key agreement protocol is optimal: an \(O(n^2)\) attack on any key agreement from random oracles2017-10-12Paper
Limits of random oracles in secure computation2017-05-19Paper
Publicly verifiable proofs of sequential work2017-05-16Paper
On the power of nonuniformity in proofs of security2017-05-16Paper
On the Power of Hierarchical Identity-Based Encryption2016-07-15Paper
On the Impossibility of Virtual Black-Box Obfuscation in Idealized Models2016-03-23Paper
Lower Bounds on Assumptions Behind Indistinguishability Obfuscation2016-03-23Paper
On the Impossibility of Cryptography with Tamperable Randomness2014-08-07Paper
Can Optimally-Fair Coin Tossing Be Based on One-Way Functions?2014-02-18Paper
On the Power of Public-Key Encryption in Secure Computation2014-02-18Paper
Languages with Efficient Zero-Knowledge PCPs are in SZK2013-03-18Paper
The Curious Case of Non-Interactive Commitments – On the Power of Black-Box vs. Non-Black-Box Use of Primitives2012-09-25Paper
On Efficient Zero-Knowledge PCPs2012-06-15Paper
On Black-Box Reductions between Predicate Encryption Schemes2012-06-15Paper
Time-Lock Puzzles in the Random Oracle Model2011-08-12Paper
On the Black-Box Complexity of Optimally-Fair Coin Tossing2011-05-19Paper
Interactive Locking, Zero-Knowledge PCPs, and Unconditional Cryptography2010-08-24Paper
https://portal.mardi4nfdi.de/entity/Q52949112007-07-26Paper

Research outcomes over time


Doctoral students

No records found.


Known relations from the MaRDI Knowledge Graph

PropertyValue
MaRDI profile typeMaRDI person profile
instance ofhuman


This page was built for person: Mohammad Mahmoody