New constructions of identity-based and key-dependent message secure encryption schemes N Döttling, S Garg, M Hajiabadi, D Masny IACR International Workshop on Public Key Cryptography, 3-31, 2018 | 38 | 2018 |
Linear-time zero-knowledge proofs for arithmetic circuit satisfiability J Bootle, A Cerulli, E Ghadafi, J Groth, M Hajiabadi, SK Jakobsen International Conference on the Theory and Application of Cryptology and …, 2017 | 35 | 2017 |
Two-round oblivious transfer from CDH or LPN N Döttling, S Garg, M Hajiabadi, D Masny, D Wichs Annual International Conference on the Theory and Applications of …, 2020 | 15 | 2020 |
New techniques for efficient trapdoor functions and applications S Garg, R Gay, M Hajiabadi Annual International Conference on the Theory and Applications of …, 2019 | 12 | 2019 |
Trapdoor functions from the computational Diffie-Hellman assumption S Garg, M Hajiabadi Annual International Cryptology Conference, 362-391, 2018 | 11 | 2018 |
Registration-based encryption: Removing private-key generator from IBE S Garg, M Hajiabadi, M Mahmoody, A Rahimi Theory of Cryptography Conference, 689-718, 2018 | 10 | 2018 |
Limits on the power of garbling techniques for public-key encryption S Garg, M Hajiabadi, M Mahmoody, A Mohammed Annual International Cryptology Conference, 335-364, 2018 | 8 | 2018 |
Registration-based encryption from standard assumptions S Garg, M Hajiabadi, M Mahmoody, A Rahimi, S Sekar IACR International Workshop on Public Key Cryptography, 63-93, 2019 | 7 | 2019 |
Reproducible Circularly Secure Bit Encryption: Applications and Realizations M Hajiabadi, BM Kapron Journal of Cryptology 30 (4), 1187-1237, 2017 | 7 | 2017 |
On generic constructions of circularly-secure, leakage-resilient public-key encryption schemes M Hajiabadi, BM Kapron, V Srinivasan Public-Key Cryptography--PKC 2016, 129-158, 2016 | 4 | 2016 |
Toward fine-grained blackbox separations between semantic and circular-security notions M Hajiabadi, BM Kapron Annual International Conference on the Theory and Applications of …, 2017 | 3 | 2017 |
Computational soundness of coinductive symbolic security under active attacks M Hajiabadi, BM Kapron Theory of Cryptography Conference, 539-558, 2013 | 3 | 2013 |
Efficient range-trapdoor functions and applications: Rate-1 OT and more S Garg, M Hajiabadi, R Ostrovsky Theory of Cryptography Conference, 88-116, 2020 | 1 | 2020 |
Master-Key KDM-Secure IBE from Pairings S Garg, R Gay, M Hajiabadi IACR International Conference on Public-Key Cryptography, 123-152, 2020 | 1 | 2020 |
Rate-1 Trapdoor Functions from the Diffie-Hellman Problem N Döttling, S Garg, M Hajiabadi, K Liu, G Malavolta International Conference on the Theory and Application of Cryptology and …, 2019 | 1 | 2019 |
Enhancements are Blackbox Non-trivial: Impossibility of Enhanced Trapdoor Permutations from Standard Trapdoor Permutations M Hajiabadi Theory of Cryptography Conference, 448-475, 2018 | | 2018 |
Encryption security against key-dependent-message attacks: applications, realizations and separations M Hajiabadi | | 2016 |
Gambling, Computational Information and Encryption Security M Hajiabadi, BM Kapron International Conference on Information Theoretic Security, 141-158, 2015 | | 2015 |