Advances and open problems in federated learning P Kairouz, HB McMahan, B Avent, A Bellet, M Bennis, AN Bhagoji, ... Foundations and trends® in machine learning 14 (1–2), 1-210, 2021 | 6061 | 2021 |
Candidate indistinguishability obfuscation and functional encryption for all circuits S Garg, C Gentry, S Halevi, M Raykova, A Sahai, B Waters SIAM Journal on Computing 45 (3), 882-929, 2016 | 1625 | 2016 |
Pinocchio: Nearly practical verifiable computation B Parno, J Howell, C Gentry, M Raykova Communications of the ACM 59 (2), 103-112, 2016 | 1462 | 2016 |
Rapidchain: Scaling blockchain via full sharding M Zamani, M Movahedi, M Raykova Proceedings of the 2018 ACM SIGSAC conference on computer and communications …, 2018 | 1237 | 2018 |
Quadratic span programs and succinct NIZKs without PCPs R Gennaro, C Gentry, B Parno, M Raykova Advances in Cryptology–EUROCRYPT 2013: 32nd Annual International Conference …, 2013 | 1050 | 2013 |
How to delegate and verify in public: Verifiable computation from attribute-based encryption B Parno, M Raykova, V Vaikuntanathan Theory of Cryptography: 9th Theory of Cryptography Conference, TCC 2012 …, 2012 | 454 | 2012 |
Secure single-server aggregation with (poly) logarithmic overhead JH Bell, KA Bonawitz, A Gascón, T Lepoint, M Raykova Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020 | 415 | 2020 |
Semantically secure order-revealing encryption: Multi-input functional encryption without obfuscation D Boneh, K Lewi, M Raykova, A Sahai, M Zhandry, J Zimmerman Annual International Conference on the Theory and Applications of …, 2015 | 299 | 2015 |
Efficient robust private set intersection D Dachman-Soled, T Malkin, M Raykova, M Yung International Journal of Applied Cryptography 2 (4), 289-303, 2012 | 269 | 2012 |
Privacy-preserving distributed linear regression on high-dimensional data A Gascón, P Schoppmann, B Balle, M Raykova, J Doerner, S Zahur, ... Cryptology ePrint Archive, 2016 | 265 | 2016 |
Optimizing ORAM and using it efficiently for secure computation C Gentry, KA Goldman, S Halevi, C Julta, M Raykova, D Wichs Privacy Enhancing Technologies: 13th International Symposium, PETS 2013 …, 2013 | 260 | 2013 |
Outsourcing multi-party computation S Kamara, P Mohassel, M Raykova Cryptology ePrint Archive, 2011 | 251 | 2011 |
Two-round secure MPC from indistinguishability obfuscation S Garg, C Gentry, S Halevi, M Raykova Theory of Cryptography Conference, 74-94, 2014 | 206 | 2014 |
Secure two-party computation in sublinear (amortized) time SD Gordon, J Katz, V Kolesnikov, F Krell, T Malkin, M Raykova, Y Vahlis Proceedings of the 2012 ACM conference on Computer and communications …, 2012 | 206 | 2012 |
Zeroizing without low-level zeroes: New MMAP attacks and their limitations JS Coron, C Gentry, S Halevi, T Lepoint, HK Maji, E Miles, M Raykova, ... Annual Cryptology Conference, 247-266, 2015 | 192 | 2015 |
Scaling private set intersection to billion-element sets S Kamara, P Mohassel, M Raykova, S Sadeghian Financial Cryptography and Data Security: 18th International Conference, FC …, 2014 | 191 | 2014 |
Multi-input inner-product functional encryption from pairings M Abdalla, R Gay, M Raykova, H Wee Annual International Conference on the Theory and Applications of …, 2017 | 167 | 2017 |
Garbled RAM revisited C Gentry, S Halevi, S Lu, R Ostrovsky, M Raykova, D Wichs Advances in Cryptology–EUROCRYPT 2014: 33rd Annual International Conference …, 2014 | 156 | 2014 |
On deploying secure computing: Private intersection-sum-with-cardinality M Ion, B Kreuter, AE Nergiz, S Patel, S Saxena, K Seth, M Raykova, ... 2020 IEEE European Symposium on Security and Privacy (EuroS&P), 370-389, 2020 | 155 | 2020 |
Secure anonymous database search M Raykova, B Vo, SM Bellovin, T Malkin Proceedings of the 2009 ACM workshop on Cloud computing security, 115-126, 2009 | 144 | 2009 |