default search action
Mariana Raykova 0001
Person information
- affiliation: Google
- affiliation (former): Yale University
- affiliation (former): Columbia University
Other persons with the same name
- Mariana Raykova 0002 — New Bulgarian University
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j10]John Delaney, Badih Ghazi, Charlie Harrison, Christina Ilvento, Ravi Kumar, Pasin Manurangsi, Martin Pál, Karthik Prabhakar, Mariana Raykova:
Differentially Private Ad Conversion Measurement. Proc. Priv. Enhancing Technol. 2024(2): 124-140 (2024) - [c55]Baiyu Li, Daniele Micciancio, Mariana Raykova, Mark Schultz:
Hintless Single-Server Private Information Retrieval. CRYPTO (9) 2024: 183-217 - [c54]Ning Luo, Chenkai Weng, Jaspal Singh, Gefei Tan, Mariana Raykova, Ruzica Piskac:
Privacy-Preserving Regular Expression Matching Using TNFA. ESORICS (2) 2024: 225-246 - [c53]Amit Agarwal, Stanislav Peceny, Mariana Raykova, Phillipp Schoppmann, Karn Seth:
Communication-Efficient Secure Logistic Regression. EuroS&P 2024: 440-467 - [i56]John Delaney, Badih Ghazi, Charlie Harrison, Christina Ilvento, Ravi Kumar, Pasin Manurangsi, Martin Pal, Karthik Prabhakar, Mariana Raykova:
Differentially Private Ad Conversion Measurement. CoRR abs/2403.15224 (2024) - [i55]Lennart Braun, Adrià Gascón, Mariana Raykova, Phillipp Schoppmann, Karn Seth:
Malicious Security for Sparse Private Histograms. IACR Cryptol. ePrint Arch. 2024: 469 (2024) - [i54]Yunqing Sun, Jonathan Katz, Mariana Raykova, Phillipp Schoppmann, Xiao Wang:
Large-Scale Private Set Intersection in the Client-Server Setting. IACR Cryptol. ePrint Arch. 2024: 570 (2024) - [i53]Adrià Gascón, Yuval Ishai, Mahimna Kelkar, Baiyu Li, Yiping Ma, Mariana Raykova:
Computationally Secure Aggregation and Private Information Retrieval in the Shuffle Model. IACR Cryptol. ePrint Arch. 2024: 870 (2024) - [i52]James Bell-Clark, Adrià Gascón, Baiyu Li, Mariana Raykova, Phillipp Schoppmann:
Willow: Secure Aggregation with One-Shot Clients. IACR Cryptol. ePrint Arch. 2024: 936 (2024) - [i51]Miranda Christ, Sam Gunn, Tal Malkin, Mariana Raykova:
Provably Robust Watermarks for Open-Source Language Models. IACR Cryptol. ePrint Arch. 2024: 1739 (2024) - 2023
- [c52]Fabrice Benhamouda, Mariana Raykova, Karn Seth:
Anonymous Counting Tokens. ASIACRYPT (2) 2023: 245-278 - [c51]James Bell, Adrià Gascón, Tancrède Lepoint, Baiyu Li, Sarah Meiklejohn, Mariana Raykova, Cathie Yun:
ACORN: Input Validation for Secure Aggregation. USENIX Security Symposium 2023: 4805-4822 - [i50]David W. Archer, Borja de Balle Pigem, Dan Bogdanov, Mark Craddock, Adrià Gascón, Ronald Jansen, Matjaz Jug, Kim Laine, Robert McLellan, Olga Ohrimenko, Mariana Raykova, Andrew Trask, Simon Wardley:
UN Handbook on Privacy-Preserving Computation Techniques. CoRR abs/2301.06167 (2023) - [i49]Fabrice Benhamouda, Mariana Raykova, Karn Seth:
Anonymous Counting Tokens. IACR Cryptol. ePrint Arch. 2023: 320 (2023) - [i48]Ning Luo, Chenkai Weng, Jaspal Singh, Gefei Tan, Ruzica Piskac, Mariana Raykova:
Privacy-Preserving Regular Expression Matching using Nondeterministic Finite Automata. IACR Cryptol. ePrint Arch. 2023: 643 (2023) - [i47]Baiyu Li, Daniele Micciancio, Mariana Raykova, Mark Schultz:
Hintless Single-Server Private Information Retrieval. IACR Cryptol. ePrint Arch. 2023: 1733 (2023) - 2022
- [j9]Fabrice Benhamouda, Tancrède Lepoint, Julian Loss, Michele Orrù, Mariana Raykova:
On the (in)Security of ROS. J. Cryptol. 35(4): 25 (2022) - [c50]James Bell, Adrià Gascón, Badih Ghazi, Ravi Kumar, Pasin Manurangsi, Mariana Raykova, Phillipp Schoppmann:
Distributed, Private, Sparse Histograms in the Two-Server Model. CCS 2022: 307-321 - [c49]Mohamed El Massad, Nahid Juma, Jonathan Shahen, Mariana Raykova, Siddharth Garg, Mahesh Tripunitara:
Locked Circuit Indistinguishability: A Notion of Security for Logic Locking. CSF 2022: 455-470 - [c48]Mahimna Kelkar, Phi Hung Le, Mariana Raykova, Karn Seth:
Secure Poisson Regression. USENIX Security Symposium 2022: 791-808 - [i46]Fabrice Benhamouda, Tancrède Lepoint, Michele Orrù, Mariana Raykova:
Publicly verifiable anonymous tokens with private metadata bit. IACR Cryptol. ePrint Arch. 2022: 4 (2022) - [i45]Amit Agarwal, Stanislav Peceny, Mariana Raykova, Phillipp Schoppmann, Karn Seth:
Communication Efficient Secure Logistic Regression. IACR Cryptol. ePrint Arch. 2022: 866 (2022) - [i44]James Bell, Adrià Gascón, Badih Ghazi, Ravi Kumar, Pasin Manurangsi, Mariana Raykova, Phillipp Schoppmann:
Distributed, Private, Sparse Histograms in the Two-Server Model. IACR Cryptol. ePrint Arch. 2022: 920 (2022) - [i43]James Bell, Adrià Gascón, Tancrède Lepoint, Baiyu Li, Sarah Meiklejohn, Mariana Raykova, Cathie Yun:
ACORN: Input Validation for Secure Aggregation. IACR Cryptol. ePrint Arch. 2022: 1461 (2022) - 2021
- [j8]Peter Kairouz, H. Brendan McMahan, Brendan Avent, Aurélien Bellet, Mehdi Bennis, Arjun Nitin Bhagoji, Kallista A. Bonawitz, Zachary Charles, Graham Cormode, Rachel Cummings, Rafael G. L. D'Oliveira, Hubert Eichner, Salim El Rouayheb, David Evans, Josh Gardner, Zachary Garrett, Adrià Gascón, Badih Ghazi, Phillip B. Gibbons, Marco Gruteser, Zaïd Harchaoui, Chaoyang He, Lie He, Zhouyuan Huo, Ben Hutchinson, Justin Hsu, Martin Jaggi, Tara Javidi, Gauri Joshi, Mikhail Khodak, Jakub Konecný, Aleksandra Korolova, Farinaz Koushanfar, Sanmi Koyejo, Tancrède Lepoint, Yang Liu, Prateek Mittal, Mehryar Mohri, Richard Nock, Ayfer Özgür, Rasmus Pagh, Hang Qi, Daniel Ramage, Ramesh Raskar, Mariana Raykova, Dawn Song, Weikang Song, Sebastian U. Stich, Ziteng Sun, Ananda Theertha Suresh, Florian Tramèr, Praneeth Vepakomma, Jianyu Wang, Li Xiong, Zheng Xu, Qiang Yang, Felix X. Yu, Han Yu, Sen Zhao:
Advances and Open Problems in Federated Learning. Found. Trends Mach. Learn. 14(1-2): 1-210 (2021) - [c47]Tancrède Lepoint, Sarvar Patel, Mariana Raykova, Karn Seth, Ni Trieu:
Private Join and Compute from PIR with Default. ASIACRYPT (2) 2021: 605-634 - [c46]Fabrice Benhamouda, Tancrède Lepoint, Julian Loss, Michele Orrù, Mariana Raykova:
On the (in)security of ROS. EUROCRYPT (1) 2021: 33-53 - [c45]Asra Ali, Tancrède Lepoint, Sarvar Patel, Mariana Raykova, Phillipp Schoppmann, Karn Seth, Kevin Yeo:
Communication-Computation Trade-offs in PIR. USENIX Security Symposium 2021: 1811-1828 - [i42]Mahimna Kelkar, Phi Hung Le, Mariana Raykova, Karn Seth:
Secure Poisson Regression. IACR Cryptol. ePrint Arch. 2021: 208 (2021) - 2020
- [c44]James Henry Bell, Kallista A. Bonawitz, Adrià Gascón, Tancrède Lepoint, Mariana Raykova:
Secure Single-Server Aggregation with (Poly)Logarithmic Overhead. CCS 2020: 1253-1269 - [c43]Peihan Miao, Sarvar Patel, Mariana Raykova, Karn Seth, Moti Yung:
Two-Sided Malicious Security for Private Intersection-Sum with Cardinality. CRYPTO (3) 2020: 3-33 - [c42]Ben Kreuter, Tancrède Lepoint, Michele Orrù, Mariana Raykova:
Anonymous Tokens with Private Metadata Bit. CRYPTO (1) 2020: 308-336 - [c41]Mihaela Ion, Ben Kreuter, Ahmet Erhan Nergiz, Sarvar Patel, Shobhit Saxena, Karn Seth, Mariana Raykova, David Shanahan, Moti Yung:
On Deploying Secure Computing: Private Intersection-Sum-with-Cardinality. EuroS&P 2020: 370-389 - [i41]Sarah Meiklejohn, Pavel Kalinnikov, Cindy S. Lin, Martin Hutchinson, Gary Belvin, Mariana Raykova, Al Cutter:
Think Global, Act Local: Gossip and Client Audits in Verifiable Data Structures. CoRR abs/2011.04551 (2020) - [i40]Ben Kreuter, Tancrède Lepoint, Michele Orrù, Mariana Raykova:
Anonymous Tokens with Private Metadata Bit. IACR Cryptol. ePrint Arch. 2020: 72 (2020) - [i39]Peihan Miao, Sarvar Patel, Mariana Raykova, Karn Seth, Moti Yung:
Two-Sided Malicious Security for Private Intersection-Sum with Cardinality. IACR Cryptol. ePrint Arch. 2020: 385 (2020) - [i38]James Bell, Kallista A. Bonawitz, Adrià Gascón, Tancrède Lepoint, Mariana Raykova:
Secure Single-Server Aggregation with (Poly)Logarithmic Overhead. IACR Cryptol. ePrint Arch. 2020: 704 (2020) - [i37]Fabrice Benhamouda, Tancrède Lepoint, Michele Orrù, Mariana Raykova:
On the (in)security of ROS. IACR Cryptol. ePrint Arch. 2020: 945 (2020) - [i36]Tancrède Lepoint, Sarvar Patel, Mariana Raykova, Karn Seth, Ni Trieu:
Private Join and Compute from PIR with Default. IACR Cryptol. ePrint Arch. 2020: 1011 (2020)
2010 – 2019
- 2019
- [c40]James Bartusek, Brent Carmer, Abhishek Jain, Zhengzhong Jin, Tancrède Lepoint, Fermi Ma, Tal Malkin, Alex J. Malozemoff, Mariana Raykova:
Public-Key Function-Private Hidden Vector Encryption (and More). ASIACRYPT (3) 2019: 489-519 - [c39]Phillipp Schoppmann, Adrià Gascón, Leonie Reichert, Mariana Raykova:
Distributed Vector-OLE: Improved Constructions and Implementation. CCS 2019: 1055-1072 - [c38]Phillipp Schoppmann, Adrià Gascón, Mariana Raykova, Benny Pinkas:
Make Some ROOM for the Zeros: Data Sparsity in Secure Distributed Machine Learning. CCS 2019: 1335-1350 - [c37]Borja Balle, Adrià Gascón, Olya Ohrimenko, Mariana Raykova, Phillipp Schoppmann, Carmela Troncoso:
PPML '19: Privacy Preserving Machine Learning. CCS 2019: 2717-2718 - [i35]Valerie Chen, Valerio Pastro, Mariana Raykova:
Secure Computation for Machine Learning With SPDZ. CoRR abs/1901.00329 (2019) - [i34]Peter Kairouz, H. Brendan McMahan, Brendan Avent, Aurélien Bellet, Mehdi Bennis, Arjun Nitin Bhagoji, Kallista A. Bonawitz, Zachary Charles, Graham Cormode, Rachel Cummings, Rafael G. L. D'Oliveira, Salim El Rouayheb, David Evans, Josh Gardner, Zachary Garrett, Adrià Gascón, Badih Ghazi, Phillip B. Gibbons, Marco Gruteser, Zaïd Harchaoui, Chaoyang He, Lie He, Zhouyuan Huo, Ben Hutchinson, Justin Hsu, Martin Jaggi, Tara Javidi, Gauri Joshi, Mikhail Khodak, Jakub Konecný, Aleksandra Korolova, Farinaz Koushanfar, Sanmi Koyejo, Tancrède Lepoint, Yang Liu, Prateek Mittal, Mehryar Mohri, Richard Nock, Ayfer Özgür, Rasmus Pagh, Mariana Raykova, Hang Qi, Daniel Ramage, Ramesh Raskar, Dawn Song, Weikang Song, Sebastian U. Stich, Ziteng Sun, Ananda Theertha Suresh, Florian Tramèr, Praneeth Vepakomma, Jianyu Wang, Li Xiong, Zheng Xu, Qiang Yang, Felix X. Yu, Han Yu, Sen Zhao:
Advances and Open Problems in Federated Learning. CoRR abs/1912.04977 (2019) - [i33]Phillipp Schoppmann, Adrià Gascón, Mariana Raykova, Benny Pinkas:
Make Some ROOM for the Zeros: Data Sparsity in Secure Distributed Machine Learning. IACR Cryptol. ePrint Arch. 2019: 281 (2019) - [i32]Yuan Kang, Chengyu Lin, Tal Malkin, Mariana Raykova:
Obfuscation from Polynomial Hardness: Beyond Decomposable Obfuscation. IACR Cryptol. ePrint Arch. 2019: 308 (2019) - [i31]Allison Bishop, Lucas Kowalczyk, Tal Malkin, Valerio Pastro, Mariana Raykova, Kevin Shi:
In Pursuit of Clarity In Obfuscation. IACR Cryptol. ePrint Arch. 2019: 463 (2019) - [i30]Mihaela Ion, Ben Kreuter, Ahmet Erhan Nergiz, Sarvar Patel, Mariana Raykova, Shobhit Saxena, Karn Seth, David Shanahan, Moti Yung:
On Deploying Secure Computing Commercially: Private Intersection-Sum Protocols and their Business Applications. IACR Cryptol. ePrint Arch. 2019: 723 (2019) - [i29]James Bartusek, Brent Carmer, Abhishek Jain, Zhengzhong Jin, Tancrède Lepoint, Fermi Ma, Tal Malkin, Alex J. Malozemoff, Mariana Raykova:
Public-Key Function-Private Hidden Vector Encryption (and More). IACR Cryptol. ePrint Arch. 2019: 746 (2019) - [i28]Phillipp Schoppmann, Adrià Gascón, Leonie Reichert, Mariana Raykova:
Distributed Vector-OLE: Improved Constructions and Implementation. IACR Cryptol. ePrint Arch. 2019: 1084 (2019) - [i27]Asra Ali, Tancrède Lepoint, Sarvar Patel, Mariana Raykova, Phillipp Schoppmann, Karn Seth, Kevin Yeo:
Communication-Computation Trade-offs in PIR. IACR Cryptol. ePrint Arch. 2019: 1483 (2019) - 2018
- [c36]Mahdi Zamani, Mahnush Movahedi, Mariana Raykova:
RapidChain: Scaling Blockchain via Full Sharding. CCS 2018: 931-948 - [c35]Allison Bishop, Lucas Kowalczyk, Tal Malkin, Valerio Pastro, Mariana Raykova, Kevin Shi:
A Simple Obfuscation Scheme for Pattern-Matching with Wildcards. CRYPTO (3) 2018: 731-752 - [c34]Sarvar Patel, Giuseppe Persiano, Mariana Raykova, Kevin Yeo:
PanORAMa: Oblivious RAM with Logarithmic Overhead. FOCS 2018: 871-882 - [c33]Yuan Kang, Chengyu Lin, Tal Malkin, Mariana Raykova:
Obfuscation from Polynomial Hardness: Beyond Decomposable Obfuscation. SCN 2018: 407-424 - [i26]Allison Bishop, Lucas Kowalczyk, Tal Malkin, Valerio Pastro, Mariana Raykova, Kevin Shi:
A Simple Obfuscation Scheme for Pattern-Matching with Wildcards. IACR Cryptol. ePrint Arch. 2018: 210 (2018) - [i25]Sarvar Patel, Giuseppe Persiano, Mariana Raykova, Kevin Yeo:
PanORAMa: Oblivious RAM with Logarithmic Overhead. IACR Cryptol. ePrint Arch. 2018: 373 (2018) - [i24]Mahdi Zamani, Mahnush Movahedi, Mariana Raykova:
RapidChain: A Fast Blockchain Protocol via Full Sharding. IACR Cryptol. ePrint Arch. 2018: 460 (2018) - 2017
- [j7]Adrià Gascón, Phillipp Schoppmann, Borja Balle, Mariana Raykova, Jack Doerner, Samee Zahur, David Evans:
Privacy-Preserving Distributed Linear Regression on High-Dimensional Data. Proc. Priv. Enhancing Technol. 2017(4): 345-364 (2017) - [c32]Ran Canetti, Oxana Poburinnaya, Mariana Raykova:
Optimal-Rate Non-Committing Encryption. ASIACRYPT (3) 2017: 212-241 - [c31]Brent Carmer, Alex J. Malozemoff, Mariana Raykova:
5Gen-C: Multi-input Functional Encryption and Program Obfuscation for Arithmetic Circuits. CCS 2017: 747-764 - [c30]Fernando Krell, Gabriela F. Ciocarlie, Ashish Gehani, Mariana Raykova:
Low-Leakage Secure Search for Boolean Expressions. CT-RSA 2017: 397-413 - [c29]Michel Abdalla, Romain Gay, Mariana Raykova, Hoeteck Wee:
Multi-input Inner-Product Functional Encryption from Pairings. EUROCRYPT (1) 2017: 601-626 - [i23]Brent Carmer, Alex J. Malozemoff, Mariana Raykova:
5Gen-C: Multi-input Functional Encryption and Program Obfuscation for Arithmetic Circuits. IACR Cryptol. ePrint Arch. 2017: 826 (2017) - 2016
- [j6]Bryan Parno, Jon Howell, Craig Gentry, Mariana Raykova:
Pinocchio: nearly practical verifiable computation. Commun. ACM 59(2): 103-112 (2016) - [j5]Sanjam Garg, Craig Gentry, Shai Halevi, Mariana Raykova, Amit Sahai, Brent Waters:
Hiding secrets in software: a cryptographic approach to program obfuscation. Commun. ACM 59(5): 113-120 (2016) - [j4]Sanjam Garg, Craig Gentry, Shai Halevi, Mariana Raykova, Amit Sahai, Brent Waters:
Candidate Indistinguishability Obfuscation and Functional Encryption for All Circuits. SIAM J. Comput. 45(3): 882-929 (2016) - [c28]Kevin Lewi, Alex J. Malozemoff, Daniel Apon, Brent Carmer, Adam Foltzer, Daniel Wagner, David W. Archer, Dan Boneh, Jonathan Katz, Mariana Raykova:
5Gen: A Framework for Prototyping Applications Using Multilinear Maps and Matrix Branching Programs. CCS 2016: 981-992 - [c27]Samee Zahur, Xiao Wang, Mariana Raykova, Adrià Gascón, Jack Doerner, David Evans, Jonathan Katz:
Revisiting Square-Root ORAM: Efficient Random Access in Multi-party Computation. IEEE Symposium on Security and Privacy 2016: 218-234 - [c26]Ran Canetti, Yilei Chen, Justin Holmgren, Mariana Raykova:
Adaptive Succinct Garbled RAM or: How to Delegate Your Database. TCC (B2) 2016: 61-90 - [i22]Michel Abdalla, Mariana Raykova, Hoeteck Wee:
Multi-Input Inner-Product Functional Encryption from Pairings. IACR Cryptol. ePrint Arch. 2016: 425 (2016) - [i21]Ran Canetti, Oxana Poburinnaya, Mariana Raykova:
Optimal-Rate Non-Committing Encryption in a CRS Model. IACR Cryptol. ePrint Arch. 2016: 511 (2016) - [i20]Kevin Lewi, Alex J. Malozemoff, Daniel Apon, Brent Carmer, Adam Foltzer, Daniel Wagner, David W. Archer, Dan Boneh, Jonathan Katz, Mariana Raykova:
5Gen: A Framework for Prototyping Applications Using Multilinear Maps and Matrix Branching Programs. IACR Cryptol. ePrint Arch. 2016: 619 (2016) - [i19]Adrià Gascón, Phillipp Schoppmann, Borja Balle, Mariana Raykova, Jack Doerner, Samee Zahur, David Evans:
Secure Linear Regression on Vertically Partitioned Datasets. IACR Cryptol. ePrint Arch. 2016: 892 (2016) - 2015
- [c25]Craig Gentry, Shai Halevi, Charanjit S. Jutla, Mariana Raykova:
Private Database Access with HE-over-ORAM Architecture. ACNS 2015: 172-191 - [c24]Mariana Raykova, Hasnain Lakhani, Hasanat Kazmi, Ashish Gehani:
Decentralized Authorization and Privacy-Enhanced Routing for Information-Centric Networks. ACSAC 2015: 31-40 - [c23]Jean-Sébastien Coron, Craig Gentry, Shai Halevi, Tancrède Lepoint, Hemanta K. Maji, Eric Miles, Mariana Raykova, Amit Sahai, Mehdi Tibouchi:
Zeroizing Without Low-Level Zeroes: New MMAP Attacks and their Limitations. CRYPTO (1) 2015: 247-266 - [c22]Dan Boneh, Kevin Lewi, Mariana Raykova, Amit Sahai, Mark Zhandry, Joe Zimmerman:
Semantically Secure Order-Revealing Encryption: Multi-input Functional Encryption Without Obfuscation. EUROCRYPT (2) 2015: 563-594 - [i18]Jean-Sébastien Coron, Craig Gentry, Shai Halevi, Tancrède Lepoint, Hemanta K. Maji, Eric Miles, Mariana Raykova, Amit Sahai, Mehdi Tibouchi:
Zeroizing Without Low-Level Zeroes: New MMAP Attacks and Their Limitations. IACR Cryptol. ePrint Arch. 2015: 596 (2015) - [i17]Ran Canetti, Yilei Chen, Justin Holmgren, Mariana Raykova:
Succinct Adaptive Garbled RAM. IACR Cryptol. ePrint Arch. 2015: 1074 (2015) - 2014
- [c21]Yossi Azar, Seny Kamara, Ishai Menache, Mariana Raykova, F. Bruce Shepherd:
Co-Location-Resistant Clouds. CCSW 2014: 9-20 - [c20]Craig Gentry, Shai Halevi, Steve Lu, Rafail Ostrovsky, Mariana Raykova, Daniel Wichs:
Garbled RAM Revisited. EUROCRYPT 2014: 405-422 - [c19]Seny Kamara, Payman Mohassel, Mariana Raykova, Seyed Saeed Sadeghian:
Scaling Private Set Intersection to Billion-Element Sets. Financial Cryptography 2014: 195-215 - [c18]Craig Gentry, Shai Halevi, Mariana Raykova, Daniel Wichs:
Outsourcing Private RAM Computation. FOCS 2014: 404-413 - [c17]Sanjam Garg, Craig Gentry, Shai Halevi, Mariana Raykova:
Two-Round Secure MPC from Indistinguishability Obfuscation. TCC 2014: 74-94 - [i16]Craig Gentry, Shai Halevi, Mariana Raykova, Daniel Wichs:
Garbled RAM Revisited, Part I. IACR Cryptol. ePrint Arch. 2014: 82 (2014) - [i15]Craig Gentry, Shai Halevi, Mariana Raykova, Daniel Wichs:
Outsourcing Private RAM Computation. IACR Cryptol. ePrint Arch. 2014: 148 (2014) - [i14]Craig Gentry, Shai Halevi, Charanjit S. Jutla, Mariana Raykova:
Private Database Access With HE-over-ORAM Architecture. IACR Cryptol. ePrint Arch. 2014: 345 (2014) - [i13]Yossi Azar, Seny Kamara, Ishai Menache, Mariana Raykova, F. Bruce Shepherd:
Co-Location-Resistant Clouds. IACR Cryptol. ePrint Arch. 2014: 713 (2014) - [i12]Dan Boneh, Kevin Lewi, Mariana Raykova, Amit Sahai, Mark Zhandry, Joe Zimmerman:
Semantically Secure Order-Revealing Encryption: Multi-Input Functional Encryption Without Obfuscation. IACR Cryptol. ePrint Arch. 2014: 834 (2014) - 2013
- [c16]Dana Dachman-Soled, Tal Malkin, Mariana Raykova, Muthuramakrishnan Venkitasubramaniam:
Adaptive and Concurrent Secure Computation from New Adaptive, Non-malleable Commitments. ASIACRYPT (1) 2013: 316-336 - [c15]Rosario Gennaro, Craig Gentry, Bryan Parno, Mariana Raykova:
Quadratic Span Programs and Succinct NIZKs without PCPs. EUROCRYPT 2013: 626-645 - [c14]Jacob R. Lorch, Bryan Parno, James W. Mickens, Mariana Raykova, Joshua Schiffman:
Shroud: ensuring private access to large-scale data in the data center. FAST 2013: 199-214 - [c13]Seny Kamara, Mariana Raykova:
Parallel Homomorphic Encryption. Financial Cryptography Workshops 2013: 213-225 - [c12]Sanjam Garg, Craig Gentry, Shai Halevi, Mariana Raykova, Amit Sahai, Brent Waters:
Candidate Indistinguishability Obfuscation and Functional Encryption for all Circuits. FOCS 2013: 40-49 - [c11]Craig Gentry, Kenny A. Goldman, Shai Halevi, Charanjit S. Jutla, Mariana Raykova, Daniel Wichs:
Optimizing ORAM and Using It Efficiently for Secure Computation. Privacy Enhancing Technologies 2013: 1-18 - [c10]Bryan Parno, Jon Howell, Craig Gentry, Mariana Raykova:
Pinocchio: Nearly Practical Verifiable Computation. IEEE Symposium on Security and Privacy 2013: 238-252 - [i11]Craig Gentry, Kenny A. Goldman, Shai Halevi, Charanjit S. Jutla, Mariana Raykova, Daniel Wichs:
Optimizing ORAM and Using it Efficiently for Secure Computation. IACR Cryptol. ePrint Arch. 2013: 239 (2013) - [i10]Bryan Parno, Craig Gentry, Jon Howell, Mariana Raykova:
Pinocchio: Nearly Practical Verifiable Computation. IACR Cryptol. ePrint Arch. 2013: 279 (2013) - [i9]Sanjam Garg, Craig Gentry, Shai Halevi, Mariana Raykova, Amit Sahai, Brent Waters:
Candidate Indistinguishability Obfuscation and Functional Encryption for all circuits. IACR Cryptol. ePrint Arch. 2013: 451 (2013) - [i8]Sanjam Garg, Craig Gentry, Shai Halevi, Mariana Raykova:
Two-round secure MPC from Indistinguishability Obfuscation. IACR Cryptol. ePrint Arch. 2013: 601 (2013) - 2012
- [b1]Mariana Raykova:
Secure Computation in Heterogeneous Environments: How to Bring Multiparty Computation Closer to Practice? Columbia University, USA, 2012 - [j3]Mariana Raykova, Ang Cui, Binh Vo, Bin Liu, Tal Malkin, Steven M. Bellovin, Salvatore J. Stolfo:
Usable, Secure, Private Search. IEEE Secur. Priv. 10(5): 53-60 (2012) - [j2]Dana Dachman-Soled, Tal Malkin, Mariana Raykova, Moti Yung:
Efficient robust private set intersection. Int. J. Appl. Cryptogr. 2(4): 289-303 (2012) - [c9]S. Dov Gordon, Jonathan Katz, Vladimir Kolesnikov, Fernando Krell, Tal Malkin, Mariana Raykova, Yevgeniy Vahlis:
Secure two-party computation in sublinear (amortized) time. CCS 2012: 513-524 - [c8]Mariana Raykova, Hang Zhao, Steven M. Bellovin:
Privacy Enhanced Access Control for Outsourced Data Sharing. Financial Cryptography 2012: 223-238 - [c7]Bryan Parno, Mariana Raykova, Vinod Vaikuntanathan:
How to Delegate and Verify in Public: Verifiable Computation from Attribute-Based Encryption. TCC 2012: 422-439 - [i7]Jacob R. Lorch, James W. Mickens, Bryan Parno, Mariana Raykova, Joshua Schiffman:
Toward Practical Private Access to Data Centers via Parallel ORAM. IACR Cryptol. ePrint Arch. 2012: 133 (2012) - [i6]Rosario Gennaro, Craig Gentry, Bryan Parno, Mariana Raykova:
Quadratic Span Programs and Succinct NIZKs without PCPs. IACR Cryptol. ePrint Arch. 2012: 215 (2012) - 2011
- [c6]Dana Dachman-Soled, Tal Malkin, Mariana Raykova, Moti Yung:
Secure Efficient Multiparty Computing of Multivariate Polynomials and Applications. ACNS 2011: 130-146 - [c5]Vasilis Pappas, Mariana Raykova, Binh Vo, Steven M. Bellovin, Tal Malkin:
Private search in the real world. ACSAC 2011: 83-92 - [i5]Seny Kamara, Payman Mohassel, Mariana Raykova:
Outsourcing Multi-Party Computation. IACR Cryptol. ePrint Arch. 2011: 272 (2011) - [i4]S. Dov Gordon, Jonathan Katz, Vladimir Kolesnikov, Tal Malkin, Mariana Raykova, Yevgeniy Vahlis:
Secure Computation with Sublinear Amortized Work. IACR Cryptol. ePrint Arch. 2011: 482 (2011) - [i3]Seny Kamara, Mariana Raykova:
Parallel Homomorphic Encryption. IACR Cryptol. ePrint Arch. 2011: 596 (2011) - [i2]Bryan Parno, Mariana Raykova, Vinod Vaikuntanathan:
How to Delegate and Verify in Public: Verifiable Computation from Attribute-based Encryption. IACR Cryptol. ePrint Arch. 2011: 597 (2011) - [i1]Dana Dachman-Soled, Tal Malkin, Mariana Raykova, Muthuramakrishnan Venkitasubramaniam:
Adaptive and Concurrent Secure Computation from New Notions of Non-Malleability. IACR Cryptol. ePrint Arch. 2011: 611 (2011)
2000 – 2009
- 2009
- [c4]Dana Dachman-Soled, Tal Malkin, Mariana Raykova, Moti Yung:
Efficient Robust Private Set Intersection. ACNS 2009: 125-142 - [c3]Mariana Raykova, Binh Vo, Steven M. Bellovin, Tal Malkin:
Secure anonymous database search. CCSW 2009: 115-126 - [c2]Yuu-Heng Cheng, Mariana Raykova, Alexander Poylisher, D. Scott Alexander, Martin Eiger, Steven M. Bellovin:
The Zodiac Policy Subsystem: A Policy-Based Management System for a High-Security MANET. POLICY 2009: 174-177 - 2008
- [c1]Elli Androulaki, Mariana Raykova, Shreyas Srivatsan, Angelos Stavrou, Steven M. Bellovin:
PAR: Payment for Anonymous Routing. Privacy Enhancing Technologies 2008: 219-236 - 2006
- [j1]Mariana Raykova:
Permutation Reconstruction from Minors. Electron. J. Comb. 13(1) (2006)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-08 21:31 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint