Mariana Raykova
Orcid: 0000-0002-1744-4025Affiliations:
- Yale University (former)
- Columbia University (former)
According to our database1,
Mariana Raykova
authored at least 93 papers
between 2006 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2025
Proc. Priv. Enhancing Technol., 2025
IACR Cryptol. ePrint Arch., 2025
Hash-Prune-Invert: Improved Differentially Private Heavy-Hitter Detection in the Two-Server Model.
Proceedings of the IEEE Symposium on Security and Privacy, 2025
Proceedings of the Advances in Cryptology - CRYPTO 2025, 2025
Proceedings of the 20th ACM Asia Conference on Computer and Communications Security, 2025
2024
Proc. Priv. Enhancing Technol., 2024
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
Proceedings of the 9th IEEE European Symposium on Security and Privacy, 2024
Proceedings of the Computer Security - ESORICS 2024, 2024
Proceedings of the Advances in Cryptology - CRYPTO 2024, 2024
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
Computationally Secure Aggregation and Private Information Retrieval in the Shuffle Model.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
2023
Privacy-Preserving Regular Expression Matching using Nondeterministic Finite Automata.
IACR Cryptol. ePrint Arch., 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the Advances in Cryptology - ASIACRYPT 2023, 2023
2022
IACR Cryptol. ePrint Arch., 2022
Proceedings of the 35th IEEE Computer Security Foundations Symposium, 2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
2021
Proceedings of the 30th USENIX Security Symposium, 2021
Proceedings of the Advances in Cryptology - EUROCRYPT 2021, 2021
Proceedings of the Advances in Cryptology - ASIACRYPT 2021, 2021
2020
CoRR, 2020
Proceedings of the IEEE European Symposium on Security and Privacy, 2020
Proceedings of the Advances in Cryptology - CRYPTO 2020, 2020
Proceedings of the Advances in Cryptology - CRYPTO 2020, 2020
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020
2019
On Deploying Secure Computing Commercially: Private Intersection-Sum Protocols and their Business Applications.
IACR Cryptol. ePrint Arch., 2019
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
Proceedings of the Advances in Cryptology - ASIACRYPT 2019, 2019
2018
IACR Cryptol. ePrint Arch., 2018
Proceedings of the Security and Cryptography for Networks - 11th International Conference, 2018
Proceedings of the 59th IEEE Annual Symposium on Foundations of Computer Science, 2018
Proceedings of the Advances in Cryptology - CRYPTO 2018, 2018
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
2017
Proc. Priv. Enhancing Technol., 2017
Proceedings of the Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30, 2017
Proceedings of the Topics in Cryptology - CT-RSA 2017, 2017
5Gen-C: Multi-input Functional Encryption and Program Obfuscation for Arithmetic Circuits.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
Proceedings of the Advances in Cryptology - ASIACRYPT 2017, 2017
2016
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
Commun. ACM, 2016
Proceedings of the Theory of Cryptography - 14th International Conference, 2016
Proceedings of the IEEE Symposium on Security and Privacy, 2016
5Gen: A Framework for Prototyping Applications Using Multilinear Maps and Matrix Branching Programs.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
2015
Semantically Secure Order-Revealing Encryption: Multi-input Functional Encryption Without Obfuscation.
Proceedings of the Advances in Cryptology - EUROCRYPT 2015, 2015
Proceedings of the Advances in Cryptology - CRYPTO 2015, 2015
Decentralized Authorization and Privacy-Enhanced Routing for Information-Centric Networks.
Proceedings of the 31st Annual Computer Security Applications Conference, 2015
Proceedings of the Applied Cryptography and Network Security, 2015
2014
Proceedings of the Theory of Cryptography - 11th Theory of Cryptography Conference, 2014
Proceedings of the 55th IEEE Annual Symposium on Foundations of Computer Science, 2014
Proceedings of the Financial Cryptography and Data Security, 2014
Proceedings of the Advances in Cryptology - EUROCRYPT 2014, 2014
Proceedings of the 6th edition of the ACM Workshop on Cloud Computing Security, 2014
2013
Proceedings of the 2013 IEEE Symposium on Security and Privacy, 2013
Proceedings of the Privacy Enhancing Technologies - 13th International Symposium, 2013
Candidate Indistinguishability Obfuscation and Functional Encryption for all Circuits.
Proceedings of the 54th Annual IEEE Symposium on Foundations of Computer Science, 2013
Proceedings of the Financial Cryptography and Data Security, 2013
Proceedings of the 11th USENIX conference on File and Storage Technologies, 2013
Proceedings of the Advances in Cryptology, 2013
Adaptive and Concurrent Secure Computation from New Adaptive, Non-malleable Commitments.
Proceedings of the Advances in Cryptology - ASIACRYPT 2013, 2013
2012
Secure Computation in Heterogeneous Environments: How to Bring Multiparty Computation Closer to Practice?
PhD thesis, 2012
IACR Cryptol. ePrint Arch., 2012
How to Delegate and Verify in Public: Verifiable Computation from Attribute-Based Encryption.
Proceedings of the Theory of Cryptography - 9th Theory of Cryptography Conference, 2012
Proceedings of the Financial Cryptography and Data Security, 2012
Proceedings of the ACM Conference on Computer and Communications Security, 2012
2011
IACR Cryptol. ePrint Arch., 2011
Proceedings of the Twenty-Seventh Annual Computer Security Applications Conference, 2011
Proceedings of the Applied Cryptography and Network Security, 2011
2009
The Zodiac Policy Subsystem: A Policy-Based Management System for a High-Security MANET.
Proceedings of the POLICY 2009, 2009
Proceedings of the first ACM Cloud Computing Security Workshop, 2009
Proceedings of the Applied Cryptography and Network Security, 7th International Conference, 2009
2008
Proceedings of the Privacy Enhancing Technologies, 2008
2006