Mohammad Hajiabadi

  • Source: Scopus
  • Calculated based on no. of publications stored in Pure and citations from Scopus
20132020

Research output per year

If you made any changes in Pure these will be visible here soon.

Fingerprint

Dive into the research topics where Mohammad Hajiabadi is active. These topic labels come from the works of this person. Together they form a unique fingerprint.
  • 1 Similar Profiles

Network

Recent external collaboration on country level. Dive into details by clicking on the dots.
  • Master-Key KDM-Secure IBE from Pairings

    Garg, S., Gay, R. & Hajiabadi, M., 2020, Public-Key Cryptography – PKC 2020 - 23rd IACR International Conference on Practice and Theory of Public-Key Cryptography, Proceedings. Kiayias, A., Kohlweiss, M., Wallden, P. & Zikas, V. (eds.). Springer, p. 123-152 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12110 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Two-Round Oblivious Transfer from CDH or LPN

    Döttling, N., Garg, S., Hajiabadi, M., Masny, D. & Wichs, D., 2020, Advances in Cryptology – EUROCRYPT 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Canteaut, A. & Ishai, Y. (eds.). Springer, p. 768-797 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12106 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • New techniques for efficient trapdoor functions and applications

    Garg, S., Gay, R. & Hajiabadi, M., 2019, Advances in Cryptology – EUROCRYPT 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Ishai, Y. & Rijmen, V. (eds.). Springer Verlag, p. 33-63 31 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11478 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Rate-1 Trapdoor Functions from the Diffie-Hellman Problem

    Döttling, N., Garg, S., Hajiabadi, M., Liu, K. & Malavolta, G., 2019, Advances in Cryptology – ASIACRYPT 2019 - 25th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Galbraith, S. D. & Moriai, S. (eds.). Springer, p. 585-606 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11923 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Registration-Based Encryption from Standard Assumptions

    Garg, S., Hajiabadi, M., Mahmoody, M., Rahimi, A. & Sekar, S., 2019, Public-Key Cryptography – PKC 2019 - 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Proceedings. Lin, D. & Sako, K. (eds.). Springer Verlag, p. 63-93 31 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11443 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

If you made any changes in Pure these will be visible here soon.