RapidChain: A Fast Blockchain Consensus via Full Sharding, Mahdi Zamani, Mahnush Movahedi, Mariana Raykova, CCS 2018
PanORAMa: Oblivious RAM with Logarithmic Overhead, Sarvar Patel, Giuseppe Persiano, Mariana Raykova, Kevin Yeo, FOCS 2018
A Simple Obfuscation Scheme for Pattern-Matching with Wildcards, Allison Bishop, Lucas Kowalczyk, Tal Malkin, Valerio Pastro, Mariana Raykova, Kevin Shi, CRYPRO 2018
Obfuscation from Polynomial Hardness: Beyond Decomposable Obfuscation, Yuan Kang, Chengyu Lin, Tal Malkin, Mariana Raykova, SCN 2018
5Gen-C: Multi-input Functional Encryption and Program Obfuscation for Arithmetic Circuits, Alex J. Malozemoff, Brent Carmer, Mariana Raykova, CCS 2017
Optimal-Rate Non-committing Encryption, Ran Canetti, Oxana Poburinnaya, Mariana Raykova, ASIACRYPT 2017
Privacy-Preserving Distributed Linear Regression on High-Dimensional Data, Adria Gascon, Phillipp Schoppmann, Borja Balle, Mariana Raykova, Jack Doerner, Samee Zahur, David Evans, PETS 2017
Multi-Input Inner-Product Functional Encryption from Pairings, Michel Abdalla, Romain Gay, Mariana Raykova, Hoeteck Wee, EUROCRYPT 2017
Low-Leakage Secure Search for Boolean Expressions, Fernando Krell, Gabriela Ciocarlie, Ashish Gehani, Mariana Raykova, CT-RSA, 2017
Adaptive Succinct Garbled RAM or: How To Delegate Your Database , Ran Canetti, Yilei Chen, Justin Holmgren, Mariana Raykova, TCC-B 2016
5Gen: A Framework for Prototyping Applications Using Multilinear Maps and Matrix Branching Programs , Kevin Lewi, Alex J. Malozemoff, Daniel Apon, Brent Carmer, Adam Foltzer, Daniel Wagner, David W. Archer, Dan Boneh, Jonathan Katz, Mariana Raykova, CCS 2016
Revisiting Square-Root ORAM Efficient Random Access in Multi-Party Computation , Samee Zahur, Xiao Wang, Mariana Raykova, Adriá Gascón, Jack Doerner, David Evans, Jonathan Katz, IEEE Security and Privacy 2016
Decentralized Authorization and Privacy-Enhanced Routing for Information-Centric Networks , Mariana Raykova, Hasnain Lakhani, Hasanat Kazmi, Ashish Gehani, ACSAC 2015
Zeroizing Without Low-level Zeroes: New Attacks on Multilinear Maps and Their Limitations , Jean-Sèbastien Coron, Craig Gentry, Shai Halevi, Tancrède Lepoint, Hemanta K. Maji, Eric Miles, Mariana Raykova, Amit Sahai, Mehdi Tibouchi, CRYPTO 2015
Private Database Access With HE-over-ORAM Architecture , Craig Gentry, Shai Halevi, Charanjit Jutla, Mariana Raykova, ACNS 2015
Semantically Secure Order-Revealing Encryption: Multi-Input Functional Encryption Without Obfuscation , Dan Boneh, Kevin Lewi, Mariana Raykova, Amit Sahai, Mark Zhandry, Joe Zimmerman, Eurocrypt 2015
Outsourcing Private RAM Computation, Craig Gentry, Shai Halevi, Mariana Raykova, Daniel Wichs, FOCS 2014 , Paper
Garbled RAM Revisited , Sanjam Garg, Craig Gentry, Shai Halevi, Steve Lu, Rafail Ostrovsky, Mariana Raykova, Daniel Wichs Eurocrypt 2014, Part I
Two-round secure MPC from Indistinguishability Obfuscation, Sanjam Garg, Craig Gentry, Shai Halevi, Mariana Raykova, TCC 2014, Paper
Co-Location-Resistant Clouds,Yossi Azar, Seny Kamara, Ishai Menache, Mariana Raykova, Bruce Shepherd, CCSW 2014
Scaling Private Set Intersection to Billion-Element Sets, Seny Kamara, Payman Mohassel, Mariana Raykova, Saeed Sadeghian, International Conference on Financial Cryptography and Data Security(FC) 2014
Candidate Indistinguishability Obfuscation and Functional Encryption for All Circuits, Sanjam Garg, Craig Gentry, Shai Halevi, Mariana Raykova, Amit Sahai, Brent Waters, FOCS 2013, Paper
Pinocchio: Nearly Practical Verifiable Computation, Bryan Parno, Craig Gentry, Jon Howell, Mariana Raykova IEEE Symposium on Security and Privacy, 2013, Best Paper Award, Paper
Quadratic Span Programs and Succinct NIZKs without PCPs, Rosario Gennaro, Craig Gentry, Bryan Parno, Mariana Raykova, Eurocrypt 2013, Paper
Shroud: Enabling Private Access to Large-Scale Data in the Data Center, Jacob R. Lorch, James Mickens, Bryan Parno, Mariana Raykova, Joshua Schiffman, USENIX Conference on File and Storage Technologies (FAST), 2013, Paper
Optimizing ORAM and Using It Efficiently for Secure Computation,Craig Gentry, Kenny A. Gold- man, Shai Halevi, Charanjit S. Jutla, Mariana Raykova, Daniel Wichs, Privacy Enhanc- ing Technologies Symposium (PETS) 2013
Adaptive and Concurrent Secure Computation from New Notions of Non-Malleability, Dana Dachman-Soled, Tal Malkin, Mariana Raykova, Muthuramakrishnan Venkitasubramaniam, Asiacrypt 2013, Paper
Secure Two-Party Computation with Sublinear Amortized Work, Dov Gordon, Jonathan Katz, Vladimir Kolesnikov, Tal Malkin, Mariana Raykova, Yevgeniy Vahlis, CCS 2012, Paper
How to Delegate and Verify in Public: Verifiable Computation from Attribute-based Encryption, Bryan Parno, Mariana Raykova, Vinod Vaikuntanathan, Theory of Cryptography Conference (TCC) 2012, Paper
Privacy Enhanced Access Control for Outsourced Data Sharing, Mariana Raykova, Hang Zhao, Steven Bellovin, Financial Cryptography 2012, Paper
Outsourcing Multi-Party Computation, Seny Kamara, Payman Mohassel, Mariana Raykova, In submission, Paper
Parallel Homomorphic Encryption, Seny, Kamara, Mariana Raykova, Workshop on Applied Homomorphic Cryptography (WAHC), 2013, Paper
Multiparty Secure Computation over Multivariate Polynomials, Dana Dachman-Soled, Tal Malkin, Mariana Raykova, Moti Yung, Applied Cryptography and Network Security (ACNS), 2011, Paper
Private Search in the Real World, Vasilis Pappas, Mariana Raykova, Binh Vo, Steven Bellovin, Tal Malkin, Annual Computer Security Applications Conference (ACSAC), 2011 , Paper
Amortized Sublinear Secure Multi Party Computation, Dov Gordon, Jonathan Katz, Vladimir Kolesnikov, Tal Malkin, Mariana Raykova, Yevgeniy Vahlis, Workshop on Cryptography and Security in Clouds, IBM Zurich, 2011, Short Paper
Secure Outsourced Computation in a Multi-Tenant Cloud, Seny Kamara, Mariana Raykova, Workshop on Cryptography and Security in Clouds, IBM Zurich, 2011, Short Paper
Usable Secure Private Search, Mariana Raykova, Ang Cui, Binh Vo, Bin Liu, Tal Malkin, Steven M. Bellovin, Salvatore J. Stolfo, IEEE Security & Privacy, Paper
Verifiable Remote Voting with Large Scale Coercion Resistance, Mariana Raykova, David Wagner, Technical Report CUCS-041-11, Columbia University, 2011, Paper
Secure Anonymous Database Search, Mariana Raykova, Binh Vo, Steven Bellovin, Tal Malkin, Cloud Computing Security Workshop (CCSW), 2009, Paper
Efficient Robust Private Set Intersection , Dana Dachman-Soled, Tal Malkin, Mariana Raykova, Moti Yung, Applied Cryptography and Network Security (ACNS), 2009, Paper
The Zodiac Policy Subsystem: a Policy-Based Management System for a High-security MANET, Yuu-Heng Cheng, Scott Alexander, Alexander Poylisher, Mariana Raykova, Steven Bellovin, IEEE International Symposium on Policies for Distributed Systems and Networks, 2009, Paper
PAR: Paying for Anonymous Routing, Elli Androulaki, Mariana Raykova, Shreyas Srivatsan, Angelos Stavrou, and Steven M. Bellovin, Privacy Enhancing Technologies Symposium (PETS), 2008 , Paper
RUST: A Retargetable Usability Testbed for Web Site Authentication Technologies, Maritza Johnson, Chaitanya Atreya, Adam Aviv, Mariana Raykova, Steven Bellovin, Gail Kaiser, Usability, Psychology, and Security (UPSEC), 2008, Paper
Permutation Reconstruction from Minors, Mariana Raykova, Electronic Journal of Combinatorics, Volume 13(I), 2006, Paper