Homepage of Mohammad Mahmoody (original) (raw)



CV | Teaching | Advising | Publications | Service | Talks


I am an associate professor in the Computer Science Department of the University of Virginia (UVA).

I am a theoretical computer scientist. In particular, I am interested in theoretical aspects of cryptography and their interplay with computational assumptions. I am also interested in theoretical aspects of machine learning. In all of these areas, I am mostly interested in understanding the inherent barriers, also known as "lower bounds", "impossibility results", or "separations".


Curriculum Vitae:

Here is my CV.


Teaching:


Advising:


Publications: Conference Papers | Journal Papers | Other Manuscripts

Conference Papers:

Journal Papers:

Other Manuscripts:


Service:

Program Committees: * International Conference on Machine Learning (ICML) 2023 * Theory of Cryptography Conference (TCC) 2023 * International Conference on Learning Representations (ICLR) 2023 * Conference on Neural Information Processing Systems (NeurIPS) 2022 * Theory of Cryptography Conference (TCC) 2022 * International Cryptology Conference (CRYPTO) 2022 * International Conference on Machine Learning (ICML) 2022 * Conference on Information-Theoretic Cryptography (ITC) 2022 * International Conference on Learning Representations (ICLR) 2022 * Conference on Neural Information Processing Systems (NeurIPS) 2021 * Conference on Information-Theoretic Cryptography (ITC) 2021 * International Conference on Learning Representations (ICLR) 2021(Outstanding reviewer award.) * Theory of Cryptography Conference (TCC) 2020 * Conference on Neural Information Processing Systems (NeurIPS) 2020 * International Cryptology Conference (CRYPTO) 2020 * Topics in Theoretical Computer Science (TTCS) 2020 * Theory of Cryptography Conference (TCC) 2019 * Theory and Applications of Cryptographic Techniques (EUROCRYPT) 2019 * Theory and Applications of Cryptographic Techniques (EUROCRYPT) 2018 * ACM Conference on Computer and Communications Security (CCS) 2017 * International Cryptology Conference (CRYPTO) 2017 * Topics in Theoretical Computer Science (TTCS) 2017 * Theory of Cryptography Conference (TCC) 2015 * Topics in Theoretical Computer Science (TTCS) 2015 * Theory of Cryptography Conference (TCC) 2014 * Theory of Cryptography Conference (TCC) 2013 * Theory of Cryptography Conference (TCC) 2011 Organized Events/Workshops: * Organizing (together with Pooya Farshim, Iftach Haitner, Yuval Ishai) the workshop "Lower Bounds in Cryptography" Bertinoro, Italy, July 2019
* Helped organize Cyberwars at UVA, A GenCyber Camp, June 2018.
* Helped organize DC-area crypto days (going on since Sept 2014)

Selected Talks:

See my CV for a more complete list * On Privacy Implications of Machine Unlearning.
Invited speaker to Google's virtual seminar on privacy, June 2022 [video]
* Deletion Inference, Reconstruction, and Compliance in Machine (Un)Learning.
Invited speaker to the 56th Annual Conference on Information Sciences and Systems (CISS), Princeton (virtual), March 2022
* Connections between cryptographic coin flipping and adversarially robust learning.
Privacy-Preserving Machine Learning Workshop at Crypto, August 2020 [video]
* (Im)possibility of (forms of) VDFs in the Random Oracle Mode.
VDF Day, Stanford, Feb 2020 [video]
* Computational concentration of measure.
Theory Seminar, Computer Science Department, UC Berkeley, Oct 2019
* Coin-tossing attacks, concentration of products, and robust learning
Lower Bounds in Cryptography Workshop, Bertinoro, Italy, July 2019 [video]
* Coin-tossing attacks, computational concentration of products, and limits of robust learning
Theory Seminar, Computer Science Department, University of Washington, April 2019
* Registration-Based Encryption
DC Area Crypto Day, National Institute of Standards and Technology (NIST), April 2019
* Coin Tossing, Concentration of Products, and Limits of Robust Learning
Charles River Crypto Day, MIT, March 2019
* Learning under p-Tampering Attacks.
DC-Area Anonymity, Privacy, and Security Seminar, George Mason University, February 2018
* Blockwise p-Tampering Attacks on Cryptographic Primitives, Extractors, and Learners
Bay Area Crypto Day, Berkeley, November 2017
* Black-box and Non-black-box Lower Bounds on Assumptions behind IO
DIMACS Workshop on Complexity of Crypto Primitives and Assumptions, City College of New York, June 2017 [video]
* Lower bounds on Indistinguishability Obfuscation from All-or-Nothing Encryption
Theory Seminar, Computer Science Department, Johns Hopkins University, March 2017
* Lower Bounds on Indistinguishability Obfuscation
DIMACS/CEF Workshop on Cryptography and Software Obfuscation, Stanford, Nov 2016 [video]
* Lower Bounds on VBB and Indistinguishability Obfuscations in Idealized Models
Cryptography Reunion Workshop, Simons Institute, Berkeley, August 2016
* Assumptions in Cryptography: How Do Cryptographers Sleep Well?
TEDx UVA, University of Virginia, Feb 2015 [video]
* On the (Im)Possibility of Cryptography with Tamperable Randomness
New York Crypto Day, Cornell Tech, Nov 2014
* Program Checkers for NP and Black-box separations (tutorial)
Summer School on Black-Box Impossibility Results, Bertinoro Italy, July 2014