Mariana Raykova
Mariana Raykova
Google
Email verificata su cs.columbia.edu
TitoloCitata daAnno
Candidate indistinguishability obfuscation and functional encryption for all circuits
S Garg, C Gentry, S Halevi, M Raykova, A Sahai, B Waters
SIAM Journal on Computing 45 (3), 882-929, 2016
10192016
Pinocchio: Nearly practical verifiable computation
B Parno, J Howell, C Gentry, M Raykova
2013 IEEE Symposium on Security and Privacy, 238-252, 2013
5842013
Quadratic span programs and succinct NIZKs without PCPs
R Gennaro, C Gentry, B Parno, M Raykova
Annual International Conference on the Theory and Applications of …, 2013
4162013
How to delegate and verify in public: Verifiable computation from attribute-based encryption
B Parno, M Raykova, V Vaikuntanathan
Theory of Cryptography Conference, 422-439, 2012
3462012
Optimizing ORAM and using it efficiently for secure computation
C Gentry, KA Goldman, S Halevi, C Julta, M Raykova, D Wichs
International Symposium on Privacy Enhancing Technologies Symposium, 1-18, 2013
1822013
Efficient robust private set intersection
D Dachman-Soled, T Malkin, M Raykova, M Yung
International Conference on Applied Cryptography and Network Security, 125-142, 2009
1712009
Semantically secure order-revealing encryption: Multi-input functional encryption without obfuscation
D Boneh, K Lewi, M Raykova, A Sahai, M Zhandry, J Zimmerman
Annual International Conference on the Theory and Applications of …, 2015
1662015
Outsourcing Multi-Party Computation.
S Kamara, P Mohassel, M Raykova
IACR Cryptology ePrint Archive 2011, 272, 2011
1492011
Zeroizing without low-level zeroes: New MMAP attacks and their limitations
JS Coron, C Gentry, S Halevi, T Lepoint, HK Maji, E Miles, M Raykova, ...
Annual Cryptology Conference, 247-266, 2015
1472015
Secure two-party computation in sublinear (amortized) time
SD Gordon, J Katz, V Kolesnikov, F Krell, T Malkin, M Raykova, Y Vahlis
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
1402012
Two-round secure MPC from indistinguishability obfuscation
S Garg, C Gentry, S Halevi, M Raykova
Theory of Cryptography Conference, 74-94, 2014
1242014
Rapidchain: Scaling blockchain via full sharding
M Zamani, M Movahedi, M Raykova
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
1142018
Garbled RAM revisited
C Gentry, S Halevi, S Lu, R Ostrovsky, M Raykova, D Wichs
Annual International Conference on the Theory and Applications of …, 2014
1022014
Secure anonymous database search
M Raykova, B Vo, SM Bellovin, T Malkin
Proceedings of the 2009 ACM workshop on Cloud computing security, 115-126, 2009
1012009
Scaling private set intersection to billion-element sets
S Kamara, P Mohassel, M Raykova, S Sadeghian
International Conference on Financial Cryptography and Data Security, 195-215, 2014
862014
Shroud: Ensuring private access to large-scale data in the data center
JR Lorch, B Parno, J Mickens, M Raykova, J Schiffman
Presented as part of the 11th {USENIX} Conference on File and Storage …, 2013
842013
Outsourcing private RAM computation
C Gentry, S Halevi, M Raykova, D Wichs
2014 IEEE 55th Annual Symposium on Foundations of Computer Science, 404-413, 2014
632014
Co-location-resistant clouds
Y Azar, S Kamara, I Menache, M Raykova, B Shepard
Proceedings of the 6th Edition of the ACM Workshop on Cloud Computing …, 2014
592014
PAR: Payment for anonymous routing
E Androulaki, M Raykova, S Srivatsan, A Stavrou, SM Bellovin
International Symposium on Privacy Enhancing Technologies Symposium, 219-236, 2008
592008
Privacy enhanced access control for outsourced data sharing
M Raykova, H Zhao, SM Bellovin
International Conference on Financial Cryptography and Data Security, 223-238, 2012
582012
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–20