K
v
ire
.com
←
Back
Night
Docs
Library
Review
…
Author
Mariana Raykova
also known as M. Raykova, Mariana Raykova, Raykova, Mariana
Google (United States) · New Bulgarian University · SRI International · IBM (United States)
About this author
Works
119
Cited by
8,124
h-index
36
i10
63
ORCID ↗
Top papers
Candidate Indistinguishability Obfuscation and Functional Encryption for all Circuits
Sanjam Garg, Craig Gentry, Shai Halevi, et al.
·
2013
↗ 1,131
RapidChain
Mahdi Zamani, Mahnush Movahedi, Mariana Raykova
·
2018
↗ 1,052
OA
Pinocchio: Nearly Practical Verifiable Computation
Bryan Parno, Jon Howell, Craig Gentry, et al.
·
2013
↗ 826
OA
Quadratic Span Programs and Succinct NIZKs without PCPs
Rosario Gennaro, Craig Gentry, Bryan Parno, et al.
·
2013
·
Lecture notes in computer science
↗ 695
OA
How to Delegate and Verify in Public: Verifiable Computation from Attribute-Based Encryption
Bryan Parno, Mariana Raykova, Vinod Vaikuntanathan
·
2012
·
Lecture notes in computer science
↗ 353
Semantically Secure Order-Revealing Encryption: Multi-input Functional Encryption Without Obfuscation
Dan Boneh, Kevin Lewi, Mariana Raykova, et al.
·
2015
·
Lecture notes in computer science
↗ 224
OA
Candidate Indistinguishability Obfuscation and Functional Encryption for All Circuits
Sanjam Garg, Craig Gentry, Shai Halevi, et al.
·
2016
·
SIAM Journal on Computing
↗ 198
Pinocchio
Bryan Parno, Jon Howell, Craig Gentry, et al.
·
2016
·
Communications of the ACM
↗ 193
Privacy-Preserving Distributed Linear Regression on High-Dimensional Data
Adrià Gascón, Phillipp Schoppmann, Borja Balle, et al.
·
2017
·
Proceedings on Privacy Enhancing Technologies
↗ 189
OA
Two-Round Secure MPC from Indistinguishability Obfuscation
Sanjam Garg, Craig Gentry, Shai Halevi, et al.
·
2014
·
Lecture notes in computer science
↗ 183
Secure two-party computation in sublinear (amortized) time
Steven Gordon, Jonathan Katz, Vladimir Kolesnikov, et al.
·
2012
↗ 175
Outsourcing Multi-Party Computation.
Seny Kamara, Payman Mohassel, Mariana Raykova
·
2011
·
IACR Cryptology ePrint Archive
↗ 174
Books
Brand New, Out of Fashion
2020
·
Independently Published
Secure Computation in Heterogeneous Environments
2012
·
[publisher not identified]