| Registration-based encryption: removing private-key generator from IBE S Garg, M Hajiabadi, M Mahmoody, A Rahimi Theory of Cryptography Conference, 689-718, 2018 | 132 | 2018 |
| Linear-time zero-knowledge proofs for arithmetic circuit satisfiability J Bootle, A Cerulli, E Ghadafi, J Groth, M Hajiabadi, SK Jakobsen International Conference on the Theory and Application of Cryptology and …, 2017 | 121 | 2017 |
| Two-round oblivious transfer from CDH or LPN N Döttling, S Garg, M Hajiabadi, D Masny, D Wichs Annual International Conference on the Theory and Applications of …, 2020 | 83 | 2020 |
| Registration-based encryption from standard assumptions S Garg, M Hajiabadi, M Mahmoody, A Rahimi, S Sekar IACR international workshop on public key cryptography, 63-93, 2019 | 83 | 2019 |
| New constructions of identity-based and key-dependent message secure encryption schemes N Döttling, S Garg, M Hajiabadi, D Masny IACR International Workshop on Public Key Cryptography, 3-31, 2018 | 72 | 2018 |
| Laconic private set intersection and applications N Alamati, P Branco, N Döttling, S Garg, M Hajiabadi, S Pu Theory of Cryptography Conference, 94-125, 2021 | 36 | 2021 |
| Efficient range-trapdoor functions and applications: Rate-1 OT and more S Garg, M Hajiabadi, R Ostrovsky Theory of Cryptography Conference, 88-116, 2020 | 30 | 2020 |
| Trapdoor functions from the computational Diffie-Hellman assumption S Garg, M Hajiabadi Annual international cryptology conference, 362-391, 2018 | 29 | 2018 |
| Compact ring signatures from learning with errors R Chatterjee, S Garg, M Hajiabadi, D Khurana, X Liang, G Malavolta, ... Annual International Cryptology Conference, 282-312, 2021 | 26 | 2021 |
| Amortizing rate-1 OT and applications to PIR and PSI M Chase, S Garg, M Hajiabadi, J Li, P Miao Theory of Cryptography Conference, 126-156, 2021 | 25 | 2021 |
| New techniques for efficient trapdoor functions and applications S Garg, R Gay, M Hajiabadi Annual International Conference on the Theory and Applications of …, 2019 | 25 | 2019 |
| Limits on the power of garbling techniques for public-key encryption S Garg, M Hajiabadi, M Mahmoody, A Mohammed Annual International Cryptology Conference, 335-364, 2018 | 25 | 2018 |
| On the worst-case inefficiency of CGKA A Bienstock, Y Dodis, S Garg, G Grogan, M Hajiabadi, P Rösler Theory of Cryptography Conference, 213-243, 2022 | 20 | 2022 |
| Reproducible Circularly Secure Bit Encryption: Applications and Realizations M Hajiabadi, BM Kapron Journal of Cryptology 30 (4), 1187-1237, 2017 | 12 | 2017 |
| Toward fine-grained blackbox separations between semantic and circular-security notions M Hajiabadi, BM Kapron Annual International Conference on the Theory and Applications of …, 2017 | 10 | 2017 |
| Master-key KDM-secure IBE from pairings S Garg, R Gay, M Hajiabadi IACR International Conference on Public-Key Cryptography, 123-152, 2020 | 9 | 2020 |
| Algebraic restriction codes and their applications D Aggarwal, N Döttling, J Dujmovic, M Hajiabadi, G Malavolta, ... Algorithmica 85 (12), 3602-3648, 2023 | 8 | 2023 |
| On generic constructions of circularly-secure, leakage-resilient public-key encryption schemes M Hajiabadi, BM Kapron, V Srinivasan Public-Key Cryptography--PKC 2016, 129-158, 2016 | 8 | 2016 |
| Lower bounds on assumptions behind registration-based encryption M Hajiabadi, M Mahmoody, W Qi, S Sarfaraz Theory of Cryptography Conference, 306-334, 2023 | 7 | 2023 |
| On the black-box complexity of private-key inner-product functional encryption M Hajiabadi, R Langrehr, A O’Neill, M Wang Theory of Cryptography Conference, 318-343, 2024 | 6 | 2024 |