Mariana Raykova

From MaRDI portal
(Redirected from Person:776018)



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Willow: secure aggregation with one-shot clients2026-02-06Paper
PanORAMa: oblivious RAM with logarithmic overhead2025-08-12Paper
Hintless single-server private information retrieval2024-12-13Paper
Anonymous counting tokens2024-06-26Paper
Private join and compute from PIR with default
Lecture Notes in Computer Science
2023-05-12Paper
Two-sided malicious security for private intersection-sum with cardinality2022-12-07Paper
Anonymous tokens with private metadata bit2022-11-09Paper
On the (in)security of ROS
Journal of Cryptology
2022-09-23Paper
On the (in)security of ROS
Lecture Notes in Computer Science
2021-12-08Paper
A simple obfuscation scheme for pattern-matching with wildcards2020-06-30Paper
Public-key function-private hidden vector encryption (and more)2020-05-11Paper
Obfuscation from polynomial hardness: beyond decomposable obfuscation2018-10-17Paper
Optimal-rate non-committing encryption2018-02-23Paper
Multi-input inner-product functional encryption from pairings
Lecture Notes in Computer Science
2017-06-13Paper
Low-leakage secure search for Boolean expressions
Topics in Cryptology – CT-RSA 2017
2017-04-12Paper
Adaptive succinct garbled RAM or: how to delegate your database
Theory of Cryptography
2016-12-22Paper
Candidate indistinguishability obfuscation and functional encryption for all circuits
SIAM Journal on Computing
2016-07-04Paper
Private database access with HE-over-ORAM architecture
Applied Cryptography and Network Security
2016-03-10Paper
Zeroizing Without Low-Level Zeroes: New MMAP Attacks and their Limitations
Lecture Notes in Computer Science
2015-12-10Paper
Semantically secure order-revealing encryption: multi-input functional encryption without obfuscation
Advances in Cryptology - EUROCRYPT 2015
2015-09-30Paper
Optimizing ORAM and Using It Efficiently for Secure Computation
Privacy Enhancing Technologies
2014-08-19Paper
Garbled RAM revisited
Advances in Cryptology – EUROCRYPT 2014
2014-05-27Paper
Two-round secure MPC from indistinguishability obfuscation
Theory of Cryptography
2014-02-18Paper
Adaptive and concurrent secure computation from new adaptive, non-malleable commitments
Advances in Cryptology - ASIACRYPT 2013
2013-12-10Paper
Quadratic span programs and succinct NIZKs without PCPs
Advances in cryptology -- EUROCRYPT 2013. 32nd annual international conference on the theory and applications of cryptographic techniques, Athens, Greece, May 26--30, 2013. Proceedings
2013-05-31Paper
Efficient robust private set intersection
International Journal of Applied Cryptography
2012-11-16Paper
How to delegate and verify in public: verifiable computation from attribute-based encryption
Theory of Cryptography
2012-06-15Paper
Permutation reconstruction from minors
The Electronic Journal of Combinatorics
2006-08-30Paper
Permutation reconstruction from minors
The Electronic Journal of Combinatorics
2006-08-30Paper


Research outcomes over time


This page was built for person: Mariana Raykova