Chung, Kai-Min; Lin, Yao-Ting; Mahmoody, Mohammad Black-box separations for non-interactive classical commitments in a quantum world. (English) Zbl 07789159 Hazay, Carmit (ed.) et al., Advances in cryptology – EUROCRYPT 2023. 42nd annual international conference on the theory and applications of cryptographic techniques, Lyon, France, April 23–27, 2023. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 14004, 144-172 (2023). MSC: 81P94 94A60 PDFBibTeX XMLCite \textit{K.-M. Chung} et al., Lect. Notes Comput. Sci. 14004, 144--172 (2023; Zbl 07789159) Full Text: DOI
Afshar, Abtin; Couteau, Geoffroy; Mahmoody, Mohammad; Sadeghi, Elahe Fine-grained non-interactive key-exchange: constructions and lower bounds. (English) Zbl 07789156 Hazay, Carmit (ed.) et al., Advances in cryptology – EUROCRYPT 2023. 42nd annual international conference on the theory and applications of cryptographic techniques, Lyon, France, April 23–27, 2023. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 14004, 55-85 (2023). MSC: 94A60 PDFBibTeX XMLCite \textit{A. Afshar} et al., Lect. Notes Comput. Sci. 14004, 55--85 (2023; Zbl 07789156) Full Text: DOI
Mahmoody, Mohammad; Qi, Wei; Rahimi, Ahmadreza Lower bounds for the number of decryption updates in registration-based encryption. (English) Zbl 1519.94171 Kiltz, Eike (ed.) et al., Theory of cryptography. 20th international conference, TCC 2022, Chicago, IL, USA, November 7–10, 2022. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 13747, 559-587 (2023). MSC: 94A60 PDFBibTeX XMLCite \textit{M. Mahmoody} et al., Lect. Notes Comput. Sci. 13747, 559--587 (2023; Zbl 1519.94171) Full Text: DOI
Austrin, Per; Chung, Hao; Chung, Kai-Min; Fu, Shiuan; Lin, Yao-Ting; Mahmoody, Mohammad On the impossibility of key agreements from quantum random oracles. (English) Zbl 1527.81037 Dodis, Yevgeniy (ed.) et al., Advances in cryptology – CRYPTO 2022. 42nd annual international cryptology conference, CRYPTO 2022, Santa Barbara, CA, USA, August 15–18, 2022. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 13508, 165-194 (2022). MSC: 81P94 94A60 68Q12 81P45 81P70 08A40 PDFBibTeX XMLCite \textit{P. Austrin} et al., Lect. Notes Comput. Sci. 13508, 165--194 (2022; Zbl 1527.81037) Full Text: DOI
Etesami, Omid; Gao, Ji; Mahloujifar, Saeed; Mahmoody, Mohammad Polynomial-time targeted attacks on coin tossing for any number of corruptions. (English) Zbl 1511.94097 Nissim, Kobbi (ed.) et al., Theory of cryptography. 19th international conference, TCC 2021, Raleigh, NC, USA, November 8–11, 2021. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 13043, 718-750 (2021). MSC: 94A60 PDFBibTeX XMLCite \textit{O. Etesami} et al., Lect. Notes Comput. Sci. 13043, 718--750 (2021; Zbl 1511.94097) Full Text: DOI
Etesami, Omid; Mahloujifar, Saeed; Mahmoody, Mohammad Computational concentration of measure: optimal bounds, reductions, and more. (English) Zbl 07304044 Chawla, Shuchi (ed.), Proceedings of the 31st annual ACM-SIAM symposium on discrete algorithms, SODA 2020, Salt Lake City, UT, USA, January 5–8, 2020. Philadelphia, PA: Society for Industrial and Applied Mathematics (SIAM); New York, NY: Association for Computing Machinery (ACM). 345-363 (2020). MSC: 68Wxx PDFBibTeX XMLCite \textit{O. Etesami} et al., in: Proceedings of the 31st annual ACM-SIAM symposium on discrete algorithms, SODA 2020, Salt Lake City, UT, USA, January 5--8, 2020. Philadelphia, PA: Society for Industrial and Applied Mathematics (SIAM); New York, NY: Association for Computing Machinery (ACM). 345--363 (2020; Zbl 07304044) Full Text: DOI arXiv
Mahloujifar, Saeed; Diochnos, Dimitrios I.; Mahmoody, Mohammad Learning under \(p\)-tampering poisoning attacks. (English) Zbl 1473.68155 Ann. Math. Artif. Intell. 88, No. 7, 759-792 (2020). MSC: 68T05 94A60 PDFBibTeX XMLCite \textit{S. Mahloujifar} et al., Ann. Math. Artif. Intell. 88, No. 7, 759--792 (2020; Zbl 1473.68155) Full Text: DOI
Garg, Sanjam; Hajiabadi, Mohammad; Mahmoody, Mohammad; Rahimi, Ahmadreza; Sekar, Sruthi Registration-based encryption from standard assumptions. (English) Zbl 1453.94080 Lin, Dongdai (ed.) et al., Public-key cryptography – PKC 2019. 22nd IACR international conference on practice and theory of public-key cryptography, Beijing, China, April 14–17, 2019. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 11443, 63-93 (2019). MSC: 94A60 PDFBibTeX XMLCite \textit{S. Garg} et al., Lect. Notes Comput. Sci. 11443, 63--93 (2019; Zbl 1453.94080) Full Text: DOI
Mahmoody, Ahmad; Upfal, Eli Optimizing static and adaptive probing schedules for rapid event detection. (English) Zbl 1423.68458 Theor. Comput. Sci. 774, 14-30 (2019). MSC: 68T20 68W20 68W25 PDFBibTeX XMLCite \textit{A. Mahmoody} and \textit{E. Upfal}, Theor. Comput. Sci. 774, 14--30 (2019; Zbl 1423.68458) Full Text: DOI arXiv
Garg, Sanjam; Mahmoody, Mohammad; Masny, Daniel; Meckler, Izaak On the round complexity of OT extension. (English) Zbl 1457.94134 Shacham, Hovav (ed.) et al., Advances in cryptology – CRYPTO 2018. 38th annual international cryptology conference, Santa Barbara, CA, USA, August 19–23, 2018. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 10993, 545-574 (2018). MSC: 94A60 PDFBibTeX XMLCite \textit{S. Garg} et al., Lect. Notes Comput. Sci. 10993, 545--574 (2018; Zbl 1457.94134) Full Text: DOI
Garg, Sanjam; Hajiabadi, Mohammad; Mahmoody, Mohammad; Mohammed, Ameer Limits on the power of garbling techniques for public-key encryption. (English) Zbl 1457.94133 Shacham, Hovav (ed.) et al., Advances in cryptology – CRYPTO 2018. 38th annual international cryptology conference, Santa Barbara, CA, USA, August 19–23, 2018. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 10993, 335-364 (2018). MSC: 94A60 PDFBibTeX XMLCite \textit{S. Garg} et al., Lect. Notes Comput. Sci. 10993, 335--364 (2018; Zbl 1457.94133) Full Text: DOI
Mahloujifar, Saeed; Diochnos, Dimitrios I.; Mahmoody, Mohammad Learning under \(p\)-tampering attacks. (English) Zbl 1405.68297 Janoos, Firdaus (ed.) et al., Algorithmic learning theory 2018. Proceedings of the 29th international conference (ALT 2018), Lanzarote, Spain, April 7–9, 2018. [s.l.]: Proceedings of Machine Learning Research PMLR. Proceedings of Machine Learning Research (PMLR) 83, 572-596 (2018). MSC: 68T05 68P25 68W20 PDFBibTeX XMLCite \textit{S. Mahloujifar} et al., Proc. Mach. Learn. Res. (PMLR) 83, 572--596 (2018; Zbl 1405.68297) Full Text: arXiv Link
Garg, Sanjam; Hajiabadi, Mohammad; Mahmoody, Mohammad; Rahimi, Ahmadreza Registration-based encryption: removing private-key generator from IBE. (English) Zbl 1443.94057 Beimel, Amos (ed.) et al., Theory of cryptography. 16th international conference, TCC 2018, Panaji, India, November 11–14, 2018. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 11239, 689-718 (2018). MSC: 94A60 PDFBibTeX XMLCite \textit{S. Garg} et al., Lect. Notes Comput. Sci. 11239, 689--718 (2018; Zbl 1443.94057) Full Text: DOI
Mahloujifar, Saeed; Mahmoody, Mohammad Blockwise \(p\)-tampering attacks on cryptographic primitives, extractors, and learners. (English) Zbl 1406.94074 Kalai, Yael (ed.) et al., Theory of cryptography. 15th international conference, TCC 2017, Baltimore, MD, USA, November 12–15, 2017. Proceedings. Part II. Cham: Springer (ISBN 978-3-319-70502-6/pbk; 978-3-319-70503-3/ebook). Lecture Notes in Computer Science 10678, 245-279 (2017). MSC: 94A60 PDFBibTeX XMLCite \textit{S. Mahloujifar} and \textit{M. Mahmoody}, Lect. Notes Comput. Sci. 10678, 245--279 (2017; Zbl 1406.94074) Full Text: DOI
Garg, Sanjam; Mahmoody, Mohammad; Mohammed, Ameer When does functional encryption imply obfuscation? (English) Zbl 1410.94073 Kalai, Yael (ed.) et al., Theory of cryptography. 15th international conference, TCC 2017, Baltimore, MD, USA, November 12–15, 2017. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 10677, 82-115 (2017). MSC: 94A60 PDFBibTeX XMLCite \textit{S. Garg} et al., Lect. Notes Comput. Sci. 10677, 82--115 (2017; Zbl 1410.94073) Full Text: DOI
Austrin, Per; Chung, Kai-Min; Mahmoody, Mohammad; Pass, Rafael; Seth, Karn On the impossibility of cryptography with tamperable randomness. (English) Zbl 1405.94041 Algorithmica 79, No. 4, 1052-1101 (2017). MSC: 94A60 PDFBibTeX XMLCite \textit{P. Austrin} et al., Algorithmica 79, No. 4, 1052--1101 (2017; Zbl 1405.94041) Full Text: DOI
Garg, Sanjam; Mahmoody, Mohammad; Mohammed, Ameer Lower bounds on obfuscation from all-or-nothing encryption primitives. (English) Zbl 1407.94109 Katz, Jonathan (ed.) et al., Advances in cryptology – CRYPTO 2017. 37th annual international cryptology conference, Santa Barbara, CA, USA, August 20–24, 2017. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 10401, 661-695 (2017). MSC: 94A60 68Q15 PDFBibTeX XMLCite \textit{S. Garg} et al., Lect. Notes Comput. Sci. 10401, 661--695 (2017; Zbl 1407.94109) Full Text: DOI
Barak, Boaz; Mahmoody, Mohammad Merkle’s key agreement protocol is optimal: an \(O(n^2)\) attack on any key agreement from random oracles. (English) Zbl 1377.94034 J. Cryptology 30, No. 3, 699-734 (2017). MSC: 94A60 PDFBibTeX XMLCite \textit{B. Barak} and \textit{M. Mahmoody}, J. Cryptology 30, No. 3, 699--734 (2017; Zbl 1377.94034) Full Text: DOI
Mahmoody, Mohammad; Mohammed, Ameer On the power of hierarchical identity-based encryption. (English) Zbl 1369.94556 Fischlin, Marc (ed.) et al., Advances in cryptology – EUROCRYPT 2016. 35th annual international conference on the theory and applications of cryptographic techniques, Vienna, Austria, May 8–12, 2016. Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-49895-8/pbk; 978-3-662-49896-5/ebook). Lecture Notes in Computer Science 9666, 243-272 (2016). MSC: 94A60 PDFBibTeX XMLCite \textit{M. Mahmoody} and \textit{A. Mohammed}, Lect. Notes Comput. Sci. 9666, 243--272 (2016; Zbl 1369.94556) Full Text: DOI
Mahmoody, Mohammad; Mohammed, Ameer; Nematihaji, Soheil; Pass, Rafael; Shelat, Abhi Lower bounds on assumptions behind indistinguishability obfuscation. (English) Zbl 1388.94072 Kushilevitz, Eyal (ed.) et al., Theory of cryptography. 13th international conference, TCC 2016-A, Tel Aviv, Israel, January 10–13, 2016. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-49095-2/pbk; 978-3-662-49096-9/ebook). Lecture Notes in Computer Science 9562, 49-66 (2016). MSC: 94A60 PDFBibTeX XMLCite \textit{M. Mahmoody} et al., Lect. Notes Comput. Sci. 9562, 49--66 (2016; Zbl 1388.94072) Full Text: DOI
Mahmoody, Mohammad; Mohammed, Ameer; Nematihaji, Soheil On the impossibility of virtual black-box obfuscation in idealized models. (English) Zbl 1388.94071 Kushilevitz, Eyal (ed.) et al., Theory of cryptography. 13th international conference, TCC 2016-A, Tel Aviv, Israel, January 10–13, 2016. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-49095-2/pbk; 978-3-662-49096-9/ebook). Lecture Notes in Computer Science 9562, 18-48 (2016). MSC: 94A60 PDFBibTeX XMLCite \textit{M. Mahmoody} et al., Lect. Notes Comput. Sci. 9562, 18--48 (2016; Zbl 1388.94071) Full Text: DOI
Mahmoody, Ahmad; Kornaropoulos, Evgenios M.; Upfal, Eli Optimizing static and adaptive probing schedules for rapid event detection. (English) Zbl 1473.68188 Lu, Zaixin (ed.) et al., Combinatorial optimization and applications. 9th international conference, COCOA 2015, Houston, TX, USA, December 18–20, 2015. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 9486, 377-391 (2015). MSC: 68T20 68W20 68W25 PDFBibTeX XMLCite \textit{A. Mahmoody} et al., Lect. Notes Comput. Sci. 9486, 377--391 (2015; Zbl 1473.68188) Full Text: DOI arXiv
Mahmoody, Mohammad; Maji, Hemanta K.; Prabhakaran, Manoj Limits of random oracles in secure computation (extended abstract). (English) Zbl 1364.68206 Proceedings of the 5th conference on innovations in theoretical computer science, ITCS’14, Princeton, NJ, USA, January 11–14, 2014. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-4503-2243-0). 23-33 (2014). MSC: 68Q05 68Q10 94A60 PDFBibTeX XMLCite \textit{M. Mahmoody} et al., in: Proceedings of the 5th conference on innovations in theoretical computer science, ITCS'14, Princeton, NJ, USA, January 11--14, 2014. New York, NY: Association for Computing Machinery (ACM). 23--33 (2014; Zbl 1364.68206) Full Text: DOI
Austrin, Per; Chung, Kai-Min; Mahmoody, Mohammad; Pass, Rafael; Seth, Karn On the impossibility of cryptography with tamperable randomness. (English) Zbl 1345.94033 Garay, Juan A. (ed.) et al., Advances in cryptology – CRYPTO 2014. 34th annual cryptology conference, Santa Barbara, CA, USA, August 17–21, 2014. Proceedings, Part I. Berlin: Springer (ISBN 978-3-662-44370-5/pbk). Lecture Notes in Computer Science 8616, 462-479 (2014). MSC: 94A60 PDFBibTeX XMLCite \textit{P. Austrin} et al., Lect. Notes Comput. Sci. 8616, 462--479 (2014; Zbl 1345.94033) Full Text: DOI
Mahmoody, Mohammad; Maji, Hemanta K.; Prabhakaran, Manoj On the power of public-key encryption in secure computation. (English) Zbl 1326.94112 Lindell, Yehuda (ed.), Theory of cryptography. 11th theory of cryptography conference, TCC 2014, San Diego, CA, USA, February 24–26, 2014. Proceedings. Berlin: Springer (ISBN 978-3-642-54241-1/pbk). Lecture Notes in Computer Science 8349, 240-264 (2014). MSC: 94A60 PDFBibTeX XMLCite \textit{M. Mahmoody} et al., Lect. Notes Comput. Sci. 8349, 240--264 (2014; Zbl 1326.94112) Full Text: DOI
Dachman-Soled, Dana; Mahmoody, Mohammad; Malkin, Tal Can optimally-fair coin tossing be based on one-way functions? (English) Zbl 1323.94108 Lindell, Yehuda (ed.), Theory of cryptography. 11th theory of cryptography conference, TCC 2014, San Diego, CA, USA, February 24–26, 2014. Proceedings. Berlin: Springer (ISBN 978-3-642-54241-1/pbk). Lecture Notes in Computer Science 8349, 217-239 (2014). MSC: 94A60 68Q15 PDFBibTeX XMLCite \textit{D. Dachman-Soled} et al., Lect. Notes Comput. Sci. 8349, 217--239 (2014; Zbl 1323.94108) Full Text: DOI
Chung, Kai-Min; Lin, Huijia; Mahmoody, Mohammad; Pass, Rafael On the power of nonuniformity in proofs of security. (English) Zbl 1361.94038 Proceedings of the 4th conference on innovations in theoretical computer science, ITCS’13, Berkeley, CA, USA, January 9–12, 2013. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-4503-1859-4). 389-400 (2013). MSC: 94A60 PDFBibTeX XMLCite \textit{K.-M. Chung} et al., in: Proceedings of the 4th conference on innovations in theoretical computer science, ITCS'13, Berkeley, CA, USA, January 9--12, 2013. New York, NY: Association for Computing Machinery (ACM). 389--400 (2013; Zbl 1361.94038) Full Text: DOI
Mahmoody, Mohammad; Moran, Tal; Vadhan, Salil Publicly verifiable proofs of sequential work. (English) Zbl 1362.94041 Proceedings of the 4th conference on innovations in theoretical computer science, ITCS’13, Berkeley, CA, USA, January 9–12, 2013. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-4503-1859-4). 373-388 (2013). MSC: 94A60 68Q05 68Q10 PDFBibTeX XMLCite \textit{M. Mahmoody} et al., in: Proceedings of the 4th conference on innovations in theoretical computer science, ITCS'13, Berkeley, CA, USA, January 9--12, 2013. New York, NY: Association for Computing Machinery (ACM). 373--388 (2013; Zbl 1362.94041) Full Text: DOI Link
Mahmoody, Mohammad; Xiao, David Languages with efficient zero-knowledge PCPs are in SZK. (English) Zbl 1315.94089 Sahai, Amit (ed.), Theory of cryptography. 10th theory of cryptography conference, TCC 2013, Tokyo, Japan, March 3–6, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-36593-5/pbk). Lecture Notes in Computer Science 7785, 297-314 (2013). MSC: 94A60 68Q15 PDFBibTeX XMLCite \textit{M. Mahmoody} and \textit{D. Xiao}, Lect. Notes Comput. Sci. 7785, 297--314 (2013; Zbl 1315.94089) Full Text: DOI
Mahmoody, Mohammad; Pass, Rafael The curious case of non-interactive commitments – on the power of black-box vs. non-black-box use of primitives. (English) Zbl 1296.94131 Safavi-Naini, Reihaneh (ed.) et al., Advances in cryptology – CRYPTO 2012. 32nd annual cryptology conference, Santa Barbara, CA, USA, August 19–23, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-32008-8/pbk). Lecture Notes in Computer Science 7417, 701-718 (2012). MSC: 94A60 PDFBibTeX XMLCite \textit{M. Mahmoody} and \textit{R. Pass}, Lect. Notes Comput. Sci. 7417, 701--718 (2012; Zbl 1296.94131) Full Text: DOI
Goyal, Vipul; Kumar, Virendra; Lokam, Satya; Mahmoody, Mohammad On black-box reductions between predicate encryption schemes. (English) Zbl 1303.94081 Cramer, Ronald (ed.), Theory of cryptography. 9th theory of cryptography conference, TCC 2012, Taormina, Sicily, Italy, March 19–21, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-28913-2/pbk). Lecture Notes in Computer Science 7194, 440-457 (2012). MSC: 94A60 68P25 68Q15 PDFBibTeX XMLCite \textit{V. Goyal} et al., Lect. Notes Comput. Sci. 7194, 440--457 (2012; Zbl 1303.94081) Full Text: DOI
Ishai, Yuval; Mahmoody, Mohammad; Sahai, Amit On efficient zero-knowledge PCPs. (English) Zbl 1304.68056 Cramer, Ronald (ed.), Theory of cryptography. 9th theory of cryptography conference, TCC 2012, Taormina, Sicily, Italy, March 19–21, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-28913-2/pbk). Lecture Notes in Computer Science 7194, 151-168 (2012). MSC: 68Q15 94A60 PDFBibTeX XMLCite \textit{Y. Ishai} et al., Lect. Notes Comput. Sci. 7194, 151--168 (2012; Zbl 1304.68056) Full Text: DOI
Mahmoody, Mohammad; Moran, Tal; Vadhan, Salil Time-lock puzzles in the random oracle model. (English) Zbl 1287.94083 Rogaway, Phillip (ed.), Advances in cryptology – CRYPTO 2011. 31st annual cryptology conference, Santa Barbara, CA, USA, August 14–18, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-22791-2/pbk). Lecture Notes in Computer Science 6841, 39-50 (2011). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{M. Mahmoody} et al., Lect. Notes Comput. Sci. 6841, 39--50 (2011; Zbl 1287.94083) Full Text: DOI
Dachman-Soled, Dana; Lindell, Yehuda; Mahmoody, Mohammad; Malkin, Tal On the black-box complexity of optimally-fair coin tossing. (English) Zbl 1295.94044 Ishai, Yuval (ed.), Theory of cryptography. 8th theory of cryptography conference, TCC 2011, Providence, RI, USA, March 28–30, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-19570-9/pbk). Lecture Notes in Computer Science 6597, 450-467 (2011). MSC: 94A60 PDFBibTeX XMLCite \textit{D. Dachman-Soled} et al., Lect. Notes Comput. Sci. 6597, 450--467 (2011; Zbl 1295.94044) Full Text: DOI
Goyal, Vipul; Ishai, Yuval; Mahmoody, Mohammad; Sahai, Amit Interactive locking, zero-knowledge PCPs, and unconditional cryptography. (English) Zbl 1280.94063 Rabin, Tal (ed.), Advances in cryptology - CRYPTO 2010. 30th annual cryptology conference, Santa Barbara, CA, USA, August 15–19, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-14622-0/pbk). Lecture Notes in Computer Science 6223, 173-190 (2010). MSC: 94A60 68T15 PDFBibTeX XMLCite \textit{V. Goyal} et al., Lect. Notes Comput. Sci. 6223, 173--190 (2010; Zbl 1280.94063) Full Text: DOI
Mahmoody, Ahmad A note on graceful graphs with large chromatic numbers. (English) Zbl 1224.05453 Ars Comb. 90, 423-424 (2009). MSC: 05C78 05C15 PDFBibTeX XMLCite \textit{A. Mahmoody}, Ars Comb. 90, 423--424 (2009; Zbl 1224.05453)
Akbari, S.; Jamaali, M.; Mahmoody, A.; Fakhari, Seyed S. A. On the size of graphs whose cycles have length divisible by a fixed integer. (English) Zbl 1207.05103 Australas. J. Comb. 45, 67-72 (2009). MSC: 05C38 PDFBibTeX XMLCite \textit{S. Akbari} et al., Australas. J. Comb. 45, 67--72 (2009; Zbl 1207.05103)
Barak, Boaz; Mahmoody-Ghidary, Mohammad Merkle puzzles are optimal – an \(O(n^2)\)-query attack on any key exchange from a random oracle. (English) Zbl 1252.94046 Halevi, Shai (ed.), Advances in cryptology – CRYPTO 2009. 29th annual international cryptology conference, Santa Barbara, CA, USA, August 16–20, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-03355-1/pbk). Lecture Notes in Computer Science 5677, 374-390 (2009). MSC: 94A60 PDFBibTeX XMLCite \textit{B. Barak} and \textit{M. Mahmoody-Ghidary}, Lect. Notes Comput. Sci. 5677, 374--390 (2009; Zbl 1252.94046) Full Text: DOI
Akbari, S.; Ghareghani, N.; Khosrovshahi, G. B.; Mahmoody, A. On zero-sum 6-flows of graphs. (English) Zbl 1169.05326 Linear Algebra Appl. 430, No. 11-12, 3047-3052 (2009). MSC: 05C20 05C50 05C78 PDFBibTeX XMLCite \textit{S. Akbari} et al., Linear Algebra Appl. 430, No. 11--12, 3047--3052 (2009; Zbl 1169.05326) Full Text: DOI
Nayyeri, Amir; Zarifzadeh, Sajjad; Yazdani, Nasser; Mahmoody-Ghidary, Mohammad Load sensitive topology control: towards minimum energy consumption in dense ad hoc sensor networks. (English) Zbl 1151.68005 Comput. Netw. 52, No. 3, 493-513 (2008). MSC: 68M20 68M10 PDFBibTeX XMLCite \textit{A. Nayyeri} et al., Comput. Netw. 52, No. 3, 493--513 (2008; Zbl 1151.68005) Full Text: DOI
Akbari, S.; Etesami, O.; Mahini, H.; Mahmoody, M. On rainbow cycles in edge colored complete graphs. (English) Zbl 1130.05024 Australas. J. Comb. 37, 33-42 (2007). Reviewer: Ko-Wei Lih (Nankang) MSC: 05C15 05C38 05C45 PDFBibTeX XMLCite \textit{S. Akbari} et al., Australas. J. Comb. 37, 33--42 (2007; Zbl 1130.05024)
Akbari, S.; Etesami, O.; Mahini, H.; Mahmoody, M.; Sharifi, A. Transversals in long rectangular arrays. (English) Zbl 1124.05016 Discrete Math. 306, No. 23, 3011-3013 (2006). Reviewer: Peter Boyvalenkov (Sofia) MSC: 05B15 05D15 PDFBibTeX XMLCite \textit{S. Akbari} et al., Discrete Math. 306, No. 23, 3011--3013 (2006; Zbl 1124.05016) Full Text: DOI