Smile
 

Semantically Secure Order-Revealing Encryption: Multi-Input Functional Encryption Without Obfuscation , Dan Boneh, Kevin Lewi, Mariana Raykova, Amit Sahai, Mark Zhandry, Joe Zimmerman, Eurocrypt 2015
Outsourcing Private RAM Computation, Craig Gentry, Shai Halevi, Mariana Raykova, Daniel Wichs, Paper
Garbled RAM Revisited , Sanjam Garg, Craig Gentry, Shai Halevi, Steve Lu, Rafail Ostrovsky, Mariana Raykova, Daniel Wichs Eurocrypt 2014, Part I
Two-round secure MPC from Indistinguishability Obfuscation, Sanjam Garg, Craig Gentry, Shai Halevi, Mariana Raykova, TCC 2014, Paper
Co-Location-Resistant Clouds,Yossi Azar, Seny Kamara, Ishai Menache, Mariana Raykova, Bruce Shepherd, CCSW 2014
Scaling Private Set Intersection to Billion-Element Sets, Seny Kamara, Payman Mohassel, Mariana Raykova, Saeed Sadeghian, International Conference on Financial Cryptography and Data Security(FC) 2014
Candidate Indistinguishability Obfuscation and Functional Encryption for All Circuits, Sanjam Garg, Craig Gentry, Shai Halevi, Mariana Raykova, Amit Sahai, Brent Waters, FOCS 2013, Paper
Pinocchio: Nearly Practical Verifiable Computation, Bryan Parno, Craig Gentry, Jon Howell, Mariana Raykova IEEE Symposium on Security and Privacy, 2013, Best Paper Award, Paper
Quadratic Span Programs and Succinct NIZKs without PCPs, Rosario Gennaro, Craig Gentry, Bryan Parno, Mariana Raykova, Eurocrypt 2013, Paper
Shroud: Enabling Private Access to Large-Scale Data in the Data Center, Jacob R. Lorch, James Mickens, Bryan Parno, Mariana Raykova, Joshua Schiffman, USENIX Conference on File and Storage Technologies (FAST), 2013, Paper
Optimizing ORAM and Using It Efficiently for Secure Computation,Craig Gentry, Kenny A. Gold- man, Shai Halevi, Charanjit S. Jutla, Mariana Raykova, Daniel Wichs, Privacy Enhanc- ing Technologies Symposium (PETS) 2013
Adaptive and Concurrent Secure Computation from New Notions of Non-Malleability, Dana Dachman-Soled, Tal Malkin, Mariana Raykova, Muthuramakrishnan Venkitasubramaniam, Asiacrypt 2013, Paper
Secure Two-Party Computation with Sublinear Amortized Work, Dov Gordon, Jonathan Katz, Vladimir Kolesnikov, Tal Malkin, Mariana Raykova, Yevgeniy Vahlis, CCS 2012, Paper
How to Delegate and Verify in Public: Verifiable Computation from Attribute-based Encryption, Bryan Parno, Mariana Raykova, Vinod Vaikuntanathan, Theory of Cryptography Conference (TCC) 2012, Paper
Privacy Enhanced Access Control for Outsourced Data Sharing, Mariana Raykova, Hang Zhao, Steven Bellovin, Financial Cryptography 2012, Paper
Outsourcing Multi-Party Computation, Seny Kamara, Payman Mohassel, Mariana Raykova, In submission, Paper
Parallel Homomorphic Encryption, Seny, Kamara, Mariana Raykova, Workshop on Applied Homomorphic Cryptography (WAHC), 2013, Paper
Multiparty Secure Computation over Multivariate Polynomials, Dana Dachman-Soled, Tal Malkin, Mariana Raykova, Moti Yung, Applied Cryptography and Network Security (ACNS), 2011, Paper
Private Search in the Real World, Vasilis Pappas, Mariana Raykova, Binh Vo, Steven Bellovin, Tal Malkin, Annual Computer Security Applications Conference (ACSAC), 2011 , Paper
Amortized Sublinear Secure Multi Party Computation, Dov Gordon, Jonathan Katz, Vladimir Kolesnikov, Tal Malkin, Mariana Raykova, Yevgeniy Vahlis, Workshop on Cryptography and Security in Clouds, IBM Zurich, 2011, Short Paper
Secure Outsourced Computation in a Multi-Tenant Cloud, Seny Kamara, Mariana Raykova, Workshop on Cryptography and Security in Clouds, IBM Zurich, 2011, Short Paper
Usable Secure Private Search, Mariana Raykova, Ang Cui, Binh Vo, Bin Liu, Tal Malkin, Steven M. Bellovin, Salvatore J. Stolfo, IEEE Security & Privacy, Paper
Verifiable Remote Voting with Large Scale Coercion Resistance, Mariana Raykova, David Wagner, Technical Report CUCS-041-11, Columbia University, 2011, Paper
Secure Anonymous Database Search, Mariana Raykova, Binh Vo, Steven Bellovin, Tal Malkin, Cloud Computing Security Workshop (CCSW), 2009, Paper
Efficient Robust Private Set Intersection , Dana Dachman-Soled, Tal Malkin, Mariana Raykova, Moti Yung, Applied Cryptography and Network Security (ACNS), 2009, Paper
The Zodiac Policy Subsystem: a Policy-Based Management System for a High-security MANET, Yuu-Heng Cheng, Scott Alexander, Alexander Poylisher, Mariana Raykova, Steven Bellovin, IEEE International Symposium on Policies for Distributed Systems and Networks, 2009, Paper
PAR: Paying for Anonymous Routing, Elli Androulaki, Mariana Raykova, Shreyas Srivatsan, Angelos Stavrou, and Steven M. Bellovin, Privacy Enhancing Technologies Symposium (PETS), 2008 , Paper
RUST: A Retargetable Usability Testbed for Web Site Authentication Technologies, Maritza Johnson, Chaitanya Atreya, Adam Aviv, Mariana Raykova, Steven Bellovin, Gail Kaiser, Usability, Psychology, and Security (UPSEC), 2008, Paper
Permutation Reconstruction from Minors, Mariana Raykova, Electronic Journal of Combinatorics, Volume 13(I), 2006, Paper