What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Mariana Raykova
Google Scholar
55
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/popets
On the Differential Privacy and Interactivity of Privacy Sandbox Reports.
Badih Ghazi
Charlie Harrison
Arpana Hosabettu
Pritish Kamath
Alexander Knop
Ravi Kumar
Ethan Leeman
Pasin Manurangsi
Mariana Raykova
Vikas Sahu
Phillipp Schoppmann
2025
conf/sp
Hash-Prune-Invert: Improved Differentially Private Heavy-Hitter Detection in the Two-Server Model.
Borja Balle
James Bell-Clark
Albert Cheu
Adrià Gascón
Jonathan Katz
Mariana Raykova
Phillipp Schoppmann
Thomas Steinke
2025
conf/crypto
Willow: Secure Aggregation with One-Shot Clients.
James Bell-Clark
Adrià Gascón
Baiyu Li
Mariana Raykova
Phillipp Schoppmann
2025
conf/asiaccs
Prior-Based Label Differential Privacy via Secure Two-Party Computation.
Amit Agarwal
Stanislav Peceny
Mariana Raykova
Phillipp Schoppmann
Karn Seth
2024
journals/popets
Differentially Private Ad Conversion Measurement.
John Delaney
Badih Ghazi
Charlie Harrison
Christina Ilvento
Ravi Kumar
Pasin Manurangsi
Martin Pál
Karthik Prabhakar
Mariana Raykova
2024
conf/ccs
Computationally Secure Aggregation and Private Information Retrieval in the Shuffle Model.
Adrià Gascón
Yuval Ishai
Mahimna Kelkar
Baiyu Li
Yiping Ma
Mariana Raykova
2024
conf/ccs
Actively Secure Private Set Intersection in the Client-Server Setting.
Yunqing Sun
Jonathan Katz
Mariana Raykova
Phillipp Schoppmann
Xiao Wang
2024
conf/crypto
Hintless Single-Server Private Information Retrieval.
Baiyu Li
Daniele Micciancio
Mariana Raykova
Mark Schultz
2024
conf/eurosp
Communication-Efficient Secure Logistic Regression.
Amit Agarwal
Stanislav Peceny
Mariana Raykova
Phillipp Schoppmann
Karn Seth
2024
conf/esorics
Privacy-Preserving Regular Expression Matching Using TNFA.
Ning Luo
Chenkai Weng
Jaspal Singh
Gefei Tan
Mariana Raykova
Ruzica Piskac
2023
conf/uss
ACORN: Input Validation for Secure Aggregation.
James Bell
Adrià Gascón
Tancrède Lepoint
Baiyu Li
Sarah Meiklejohn
Mariana Raykova
Cathie Yun
2023
conf/asiacrypt
Anonymous Counting Tokens.
Fabrice Benhamouda
Mariana Raykova
Karn Seth
2022
journals/joc
On the (in)Security of ROS.
Fabrice Benhamouda
Tancrède Lepoint
Julian Loss
Michele Orrù
Mariana Raykova
2022
conf/ccs
Distributed, Private, Sparse Histograms in the Two-Server Model.
James Bell
Adrià Gascón
Badih Ghazi
Ravi Kumar
Pasin Manurangsi
Mariana Raykova
Phillipp Schoppmann
2022
conf/uss
Secure Poisson Regression.
Mahimna Kelkar
Phi Hung Le
Mariana Raykova
Karn Seth
2021
conf/uss
Communication-Computation Trade-offs in PIR.
Asra Ali
Tancrède Lepoint
Sarvar Patel
Mariana Raykova
Phillipp Schoppmann
Karn Seth
Kevin Yeo
2021
conf/eurocrypt
On the (in)security of ROS.
Fabrice Benhamouda
Tancrède Lepoint
Julian Loss
Michele Orrù
Mariana Raykova
2021
conf/asiacrypt
Private Join and Compute from PIR with Default.
Tancrède Lepoint
Sarvar Patel
Mariana Raykova
Karn Seth
Ni Trieu
2020
conf/ccs
Secure Single-Server Aggregation with (Poly)Logarithmic Overhead.
James Henry Bell
Kallista A. Bonawitz
Adrià Gascón
Tancrède Lepoint
Mariana Raykova
2020
conf/crypto
Anonymous Tokens with Private Metadata Bit.
Ben Kreuter
Tancrède Lepoint
Michele Orrù
Mariana Raykova
2020
conf/crypto
Two-Sided Malicious Security for Private Intersection-Sum with Cardinality.
Peihan Miao
Sarvar Patel
Mariana Raykova
Karn Seth
Moti Yung
2020
conf/eurosp
On Deploying Secure Computing: Private Intersection-Sum-with-Cardinality.
Mihaela Ion
Ben Kreuter
Ahmet Erhan Nergiz
Sarvar Patel
Shobhit Saxena
Karn Seth
Mariana Raykova
David Shanahan
Moti Yung
2019
conf/ccs
PPML '19: Privacy Preserving Machine Learning.
Borja Balle
Adrià Gascón
Olya Ohrimenko
Mariana Raykova
Phillipp Schoppmann
Carmela Troncoso
2019
conf/ccs
Distributed Vector-OLE: Improved Constructions and Implementation.
Phillipp Schoppmann
Adrià Gascón
Leonie Reichert
Mariana Raykova
2019
conf/ccs
Make Some ROOM for the Zeros: Data Sparsity in Secure Distributed Machine Learning.
Phillipp Schoppmann
Adrià Gascón
Mariana Raykova
Benny Pinkas
2019
conf/asiacrypt
Public-Key Function-Private Hidden Vector Encryption (and More).
James Bartusek
Brent Carmer
Abhishek Jain
Zhengzhong Jin
Tancrède Lepoint
Fermi Ma
Tal Malkin
Alex J. Malozemoff
Mariana Raykova
2018
conf/ccs
RapidChain: Scaling Blockchain via Full Sharding.
Mahdi Zamani
Mahnush Movahedi
Mariana Raykova
2018
conf/crypto
A Simple Obfuscation Scheme for Pattern-Matching with Wildcards.
Allison Bishop
Lucas Kowalczyk
Tal Malkin
Valerio Pastro
Mariana Raykova
Kevin Shi
2017
journals/popets
Privacy-Preserving Distributed Linear Regression on High-Dimensional Data.
Adrià Gascón
Phillipp Schoppmann
Borja Balle
Mariana Raykova
Jack Doerner
Samee Zahur
David Evans
2017
conf/ccs
5Gen-C: Multi-input Functional Encryption and Program Obfuscation for Arithmetic Circuits.
Brent Carmer
Alex J. Malozemoff
Mariana Raykova
2017
conf/ctrsa
Low-Leakage Secure Search for Boolean Expressions.
Fernando Krell
Gabriela F. Ciocarlie
Ashish Gehani
Mariana Raykova
2017
conf/eurocrypt
Multi-input Inner-Product Functional Encryption from Pairings.
Michel Abdalla
Romain Gay
Mariana Raykova
Hoeteck Wee
2017
conf/asiacrypt
Optimal-Rate Non-Committing Encryption.
Ran Canetti
Oxana Poburinnaya
Mariana Raykova
2016
conf/ccs
5Gen: A Framework for Prototyping Applications Using Multilinear Maps and Matrix Branching Programs.
Kevin Lewi
Alex J. Malozemoff
Daniel Apon
Brent Carmer
Adam Foltzer
Daniel Wagner
David W. Archer
Dan Boneh
Jonathan Katz
Mariana Raykova
2016
conf/sp
Revisiting Square-Root ORAM: Efficient Random Access in Multi-party Computation.
Samee Zahur
Xiao Wang
Mariana Raykova
Adrià Gascón
Jack Doerner
David Evans
Jonathan Katz
2016
conf/tcc
Adaptive Succinct Garbled RAM or: How to Delegate Your Database.
Ran Canetti
Yilei Chen
Justin Holmgren
Mariana Raykova
2015
conf/crypto
Zeroizing Without Low-Level Zeroes: New MMAP Attacks and their Limitations.
Jean-Sébastien Coron
Craig Gentry
Shai Halevi
Tancrède Lepoint
Hemanta K. Maji
Eric Miles
Mariana Raykova
Amit Sahai
Mehdi Tibouchi
2015
conf/acns
Private Database Access with HE-over-ORAM Architecture.
Craig Gentry
Shai Halevi
Charanjit S. Jutla
Mariana Raykova
2015
conf/eurocrypt
Semantically Secure Order-Revealing Encryption: Multi-input Functional Encryption Without Obfuscation.
Dan Boneh
Kevin Lewi
Mariana Raykova
Amit Sahai
Mark Zhandry
Joe Zimmerman
2015
conf/acsac
Decentralized Authorization and Privacy-Enhanced Routing for Information-Centric Networks.
Mariana Raykova
Hasnain Lakhani
Hasanat Kazmi
Ashish Gehani
2014
conf/ccs
Co-Location-Resistant Clouds.
Yossi Azar
Seny Kamara
Ishai Menache
Mariana Raykova
F. Bruce Shepherd
2014
conf/fc
Scaling Private Set Intersection to Billion-Element Sets.
Seny Kamara
Payman Mohassel
Mariana Raykova
Seyed Saeed Sadeghian
2014
conf/eurocrypt
Garbled RAM Revisited.
Craig Gentry
Shai Halevi
Steve Lu
Rafail Ostrovsky
Mariana Raykova
Daniel Wichs
2014
conf/tcc
Two-Round Secure MPC from Indistinguishability Obfuscation.
Sanjam Garg
Craig Gentry
Shai Halevi
Mariana Raykova
2013
conf/fc
Parallel Homomorphic Encryption.
Seny Kamara
Mariana Raykova
2013
conf/sp
Pinocchio: Nearly Practical Verifiable Computation.
Bryan Parno
Jon Howell
Craig Gentry
Mariana Raykova
2013
conf/eurocrypt
Quadratic Span Programs and Succinct NIZKs without PCPs.
Rosario Gennaro
Craig Gentry
Bryan Parno
Mariana Raykova
2013
conf/asiacrypt
Adaptive and Concurrent Secure Computation from New Adaptive, Non-malleable Commitments.
Dana Dachman-Soled
Tal Malkin
Mariana Raykova
Muthuramakrishnan Venkitasubramaniam
2012
conf/ccs
Secure two-party computation in sublinear (amortized) time.
S. Dov Gordon
Jonathan Katz
Vladimir Kolesnikov
Fernando Krell
Tal Malkin
Mariana Raykova
Yevgeniy Vahlis
2012
conf/fc
Privacy Enhanced Access Control for Outsourced Data Sharing.
Mariana Raykova
Hang Zhao
Steven M. Bellovin
2012
conf/tcc
How to Delegate and Verify in Public: Verifiable Computation from Attribute-Based Encryption.
Bryan Parno
Mariana Raykova
Vinod Vaikuntanathan
2011
conf/acns
Secure Efficient Multiparty Computing of Multivariate Polynomials and Applications.
Dana Dachman-Soled
Tal Malkin
Mariana Raykova
Moti Yung
2011
conf/acsac
Private search in the real world.
Vasilis Pappas
Mariana Raykova
Binh Vo
Steven M. Bellovin
Tal Malkin
2009
conf/ccs
Secure anonymous database search.
Mariana Raykova
Binh Vo
Steven M. Bellovin
Tal Malkin
2009
conf/acns
Efficient Robust Private Set Intersection.
Dana Dachman-Soled
Tal Malkin
Mariana Raykova
Moti Yung
Coauthors
Abhishek Jain
(1)
Adam Foltzer
(1)
Adrià Gascón
(11)
Ahmet Erhan Nergiz
(1)
Albert Cheu
(1)
Alex J. Malozemoff
(3)
Alexander Knop
(1)
Allison Bishop
(1)
Amit Agarwal
(2)
Amit Sahai
(2)
Arpana Hosabettu
(1)
Ashish Gehani
(2)
Asra Ali
(1)
Badih Ghazi
(3)
Baiyu Li
(4)
Ben Kreuter
(2)
Benny Pinkas
(1)
Binh Vo
(2)
Borja Balle
(3)
Brent Carmer
(3)
Bryan Parno
(3)
Carmela Troncoso
(1)
Cathie Yun
(1)
Charanjit S. Jutla
(1)
Charlie Harrison
(2)
Chenkai Weng
(1)
Christina Ilvento
(1)
Craig Gentry
(6)
Dan Boneh
(2)
Dana Dachman-Soled
(3)
Daniel Apon
(1)
Daniel Wagner
(1)
Daniel Wichs
(1)
Daniele Micciancio
(1)
David Evans
(2)
David Shanahan
(1)
David W. Archer
(1)
Eric Miles
(1)
Ethan Leeman
(1)
F. Bruce Shepherd
(1)
Fabrice Benhamouda
(3)
Fermi Ma
(1)
Fernando Krell
(2)
Gabriela F. Ciocarlie
(1)
Gefei Tan
(1)
Hang Zhao
(1)
Hasanat Kazmi
(1)
Hasnain Lakhani
(1)
Hemanta K. Maji
(1)
Hoeteck Wee
(1)
Ishai Menache
(1)
Jack Doerner
(2)
James Bartusek
(1)
James Bell
(2)
James Bell-Clark
(2)
James Henry Bell
(1)
Jaspal Singh
(1)
Jean-Sébastien Coron
(1)
Joe Zimmerman
(1)
John Delaney
(1)
Jon Howell
(1)
Jonathan Katz
(5)
Julian Loss
(2)
Justin Holmgren
(1)
Kallista A. Bonawitz
(1)
Karn Seth
(8)
Karthik Prabhakar
(1)
Kevin Lewi
(2)
Kevin Shi
(1)
Kevin Yeo
(1)
Leonie Reichert
(1)
Lucas Kowalczyk
(1)
Mahdi Zamani
(1)
Mahimna Kelkar
(2)
Mahnush Movahedi
(1)
Mariana Raykova
(55)
Mark Schultz
(1)
Mark Zhandry
(1)
Martin Pál
(1)
Mehdi Tibouchi
(1)
Michel Abdalla
(1)
Michele Orrù
(3)
Mihaela Ion
(1)
Moti Yung
(4)
Muthuramakrishnan Venkitasubramaniam
(1)
Ni Trieu
(1)
Ning Luo
(1)
Olya Ohrimenko
(1)
Oxana Poburinnaya
(1)
Pasin Manurangsi
(3)
Payman Mohassel
(1)
Peihan Miao
(1)
Phi Hung Le
(1)
Phillipp Schoppmann
(12)
Pritish Kamath
(1)
Rafail Ostrovsky
(1)
Ran Canetti
(2)
Ravi Kumar
(3)
Romain Gay
(1)
Rosario Gennaro
(1)
Ruzica Piskac
(1)
S. Dov Gordon
(1)
Samee Zahur
(2)
Sanjam Garg
(1)
Sarah Meiklejohn
(1)
Sarvar Patel
(4)
Seny Kamara
(3)
Seyed Saeed Sadeghian
(1)
Shai Halevi
(4)
Shobhit Saxena
(1)
Stanislav Peceny
(2)
Steve Lu
(1)
Steven M. Bellovin
(3)
Tal Malkin
(8)
Tancrède Lepoint
(9)
Thomas Steinke
(1)
Valerio Pastro
(1)
Vasilis Pappas
(1)
Vikas Sahu
(1)
Vinod Vaikuntanathan
(1)
Vladimir Kolesnikov
(1)
Xiao Wang
(2)
Yevgeniy Vahlis
(1)
Yilei Chen
(1)
Yiping Ma
(1)
Yossi Azar
(1)
Yunqing Sun
(1)
Yuval Ishai
(1)
Zhengzhong Jin
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to