Raluca

Results: 135



#Item
101Security / Cyberwarfare / Cipher / Applied mathematics / RSA / Verifiable computing / Probabilistic encryption / Cryptography / Public-key cryptography / Homomorphic encryption

Succinct Functional Encryption and Applications: Reusable Garbled Circuits and Beyond Shafi Goldwasser? Yael Kalai† Raluca Ada Popa? Vinod Vaikuntanathan./

Add to Reading List

Source URL: people.csail.mit.edu

Language: English
102Advantage / Search engine indexing / Access token / Cryptography / Information science / Public-key cryptography

Multi-Key Searchable Encryption Raluca Ada Popa and Nickolai Zeldovich MIT CSAIL Abstract We construct a searchable encryption scheme that enables keyword search over data encrypted with different keys. The scheme is pra

Add to Reading List

Source URL: people.csail.mit.edu

Language: English
103Relational database management systems / Software / SQL / Cross-platform software / PostgreSQL / Insert / Column / Database / Select / Data management / Database management systems / Computing

CryptDB: A Practical Encrypted Relational DBMS Raluca Ada Popa, Nickolai Zeldovich, and Hari Balakrishnan {raluca, nickolai, hari}@csail.mit.edu ABSTRACT

Add to Reading List

Source URL: people.csail.mit.edu

Language: English
104Homomorphic encryption / Applied mathematics / Deterministic encryption / Paillier cryptosystem / Public-key cryptography / Cipher / Encryption / Authenticated encryption / Proxy re-encryption / Cryptography / Cyberwarfare / Security

Language support for efficient computation over encrypted data Meelap Shah, Emily Stark, Raluca Ada Popa, and Nickolai Zeldovich MIT CSAIL 1

Add to Reading List

Source URL: people.csail.mit.edu

Language: English
105Database management systems / Relational database management systems / Cross-platform software / Database theory / SQL keywords / PostgreSQL / Database / SQL / ANts P2P / Data management / Software / Computing

doi:[removed][removed] CryptDB: Processing Queries on an Encrypted Database By Raluca Ada Popa, Catherine M.S. Redfield, Nickolai Zeldovich, and Hari Balakrishnan

Add to Reading List

Source URL: people.csail.mit.edu

Language: English
106Database management systems / Relational database management systems / Data modeling / SQL keywords / Cross-platform software / Database / SQL / Column / Proxy server / Data management / Computing / Data

CryptDB: Protecting Confidentiality with Encrypted Query Processing Raluca Ada Popa, Catherine M. S. Redfield, Nickolai Zeldovich, and Hari Balakrishnan MIT CSAIL A BSTRACT

Add to Reading List

Source URL: people.csail.mit.edu

Language: English
107Ciphertext indistinguishability / Elliptic curve / Adversary model / Mathematics / Applied mathematics / Computer science / Analysis of algorithms / Vehicle Identification Number / Advantage

Cryptographic treatment of CryptDB’s Adjustable Join Raluca Ada Popa and Nickolai Zeldovich MIT CSAIL March 25, [removed]

Add to Reading List

Source URL: people.csail.mit.edu

Language: English
108RSA / Chosen-plaintext attack / Ciphertext / Homomorphic encryption / Advantage / Cipher / Adaptive chosen-ciphertext attack / Plaintext-aware encryption / Cryptography / Ciphertext indistinguishability / Deterministic encryption

An Ideal-Security Protocol for Order-Preserving Encoding Raluca Ada Popa MIT CSAIL Frank H. Li MIT CSAIL

Add to Reading List

Source URL: people.csail.mit.edu

Language: English
109Secure communication / HTTP / Internet privacy / Public-key cryptography / HTTP Secure / Cryptocat / Encrypting File System / IBM Lotus Notes / Cryptography / Cryptographic software / Cryptographic protocols

Building web applications on top of encrypted data using Mylar Raluca Ada Popa, Emily Stark,† Jonas Helfer, Steven Valdez, Nickolai Zeldovich, M. Frans Kaashoek, and Hari Balakrishnan MIT CSAIL and † Meteor Developme

Add to Reading List

Source URL: people.csail.mit.edu

Language: English
110Computational complexity theory / Computability theory / Complexity classes / Universal Turing machine / Homomorphic encryption / Computability / Alan Turing / Advice / Algorithm / Theoretical computer science / Applied mathematics / Turing machine

How to Run Turing Machines on Encrypted Data Shafi Goldwasser⋆ Yael Kalai† Raluca Ada Popa⋆ ◃▹ Vinod Vaikuntanathan

Add to Reading List

Source URL: people.csail.mit.edu

Language: English
UPDATE