Raluca A. Popa
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – today
- 2019
- [j4]Rishabh Poddar, Tobias Boelter, Raluca Ada Popa:
Arx: An Encrypted Database using Semantically Secure Encryption. PVLDB 12(11): 1664-1678 (2019) - [c26]Raluca Ada Popa:
Securing Data in Compromised Clouds. SoCC 2019: 286 - [c25]Wenting Zheng, Raluca Ada Popa, Joseph E. Gonzalez, Ion Stoica:
Helen: Maliciously Secure Coopetitive Learning for Linear Models. IEEE Symposium on Security and Privacy 2019: 724-738 - [c24]Michael P. Andersen, Sam Kumar, Moustafa AbdelBaky, Gabe Fierro, John Kolb, Hyung-Sin Kim, David E. Culler, Raluca Ada Popa:
WAVE: A Decentralized Authorization Framework with Transitive Delegation. USENIX Security Symposium 2019: 1375-1392 - [c23]Sam Kumar, Yuncong Hu, Michael P. Andersen, Raluca Ada Popa, David E. Culler:
JEDI: Many-to-Many End-to-End Encryption and Key Delegation for IoT. USENIX Security Symposium 2019: 1519-1536 - [i17]Eric Jonas, Johann Schleier-Smith, Vikram Sreekanti, Chia-che Tsai, Anurag Khandelwal, Qifan Pu, Vaishaal Shankar, Joao Carreira, Karl Krauth, Neeraja Jayant Yadwadkar, Joseph E. Gonzalez, Raluca Ada Popa, Ion Stoica, David A. Patterson:
Cloud Programming Simplified: A Berkeley View on Serverless Computing. CoRR abs/1902.03383 (2019) - [i16]Sam Kumar, Yuncong Hu, Michael P. Andersen, Raluca Ada Popa, David E. Culler:
JEDI: Many-to-Many End-to-End Encryption and Key Delegation for IoT. CoRR abs/1905.13369 (2019) - [i15]Wenting Zheng, Raluca Ada Popa, Joseph E. Gonzalez, Ion Stoica:
Helen: Maliciously Secure Coopetitive Learning for Linear Models. CoRR abs/1907.07212 (2019) - [i14]Stephanie Wang, Rishabh Poddar, Jianan Lu, Raluca Ada Popa:
Practical Volume-Based Attacks on Encrypted Databases. IACR Cryptology ePrint Archive 2019: 1224 (2019) - 2018
- [c22]Rishabh Poddar, Chang Lan, Raluca Ada Popa, Sylvia Ratnasamy:
SafeBricks: Shielding Network Functions in the Cloud. NSDI 2018: 201-216 - [c21]Pratyush Mishra, Rishabh Poddar, Jerry Chen, Alessandro Chiesa, Raluca Ada Popa:
Oblix: An Efficient Oblivious Search Index. IEEE Symposium on Security and Privacy 2018: 279-296 - [c20]Howard Wu, Wenting Zheng, Alessandro Chiesa, Raluca Ada Popa, Ion Stoica:
DIZK: A Distributed Zero Knowledge Proof System. USENIX Security Symposium 2018: 675-692 - [i13]Howard Wu, Wenting Zheng, Alessandro Chiesa, Raluca Ada Popa, Ion Stoica:
DIZK: A Distributed Zero Knowledge Proof System. IACR Cryptology ePrint Archive 2018: 691 (2018) - 2017
- [c19]Wenting Zheng, Frank H. Li, Raluca Ada Popa, Ion Stoica, Rachit Agarwal:
MiniCrypt: Reconciling Encryption and Compression for Big Data Stores. EuroSys 2017: 191-204 - [c18]Wenting Zheng, Ankur Dave, Jethro G. Beekman, Raluca Ada Popa, Joseph E. Gonzalez, Ion Stoica:
Opaque: An Oblivious and Encrypted Distributed Analytics Platform. NSDI 2017: 283-298 - [i12]Ion Stoica, Dawn Song, Raluca Ada Popa, David A. Patterson, Michael W. Mahoney, Randy H. Katz, Anthony D. Joseph, Michael I. Jordan, Joseph M. Hellerstein, Joseph E. Gonzalez, Ken Goldberg, Ali Ghodsi, David Culler, Pieter Abbeel:
A Berkeley View of Systems Challenges for AI. CoRR abs/1712.05855 (2017) - 2016
- [c17]Chang Lan, Justine Sherry, Raluca Ada Popa, Sylvia Ratnasamy, Zhi Liu:
Embark: Securely Outsourcing Middleboxes to the Cloud. NSDI 2016: 255-273 - [c16]Nikolaos Karapanos, Alexandros Filios, Raluca Ada Popa, Srdjan Capkun:
Verena: End-to-End Integrity Protection for Web Applications. IEEE Symposium on Security and Privacy 2016: 895-913 - [i11]Tobias Boelter, Rishabh Poddar, Raluca Ada Popa:
A Secure One-Roundtrip Index for Range Queries. IACR Cryptology ePrint Archive 2016: 568 (2016) - [i10]Rishabh Poddar, Tobias Boelter, Raluca Ada Popa:
Arx: A Strongly Encrypted Database System. IACR Cryptology ePrint Archive 2016: 591 (2016) - [i9]Raluca Ada Popa, Emily Stark, Jonas Helfer, Steven Valdez, Nickolai Zeldovich, M. Frans Kaashoek, Hari Balakrishnan:
Building web applications on top of encrypted data using Mylar. IACR Cryptology ePrint Archive 2016: 893 (2016) - 2015
- [j3]Justine Sherry, Chang Lan, Raluca Ada Popa, Sylvia Ratnasamy:
BlindBox: Deep Packet Inspection over Encrypted Traffic. Computer Communication Review 45(5): 213-226 (2015) - [c15]Raphael Bost, Raluca Ada Popa, Stephen Tu, Shafi Goldwasser:
Machine Learning Classification over Encrypted Data. NDSS 2015 - [c14]Justine Sherry, Chang Lan, Raluca Ada Popa, Sylvia Ratnasamy:
BlindBox: Deep Packet Inspection over Encrypted Traffic. SIGCOMM 2015: 213-226 - [i8]Justine Sherry, Chang Lan, Raluca Ada Popa, Sylvia Ratnasamy:
BlindBox: Deep Packet Inspection over Encrypted Traffic. IACR Cryptology ePrint Archive 2015: 264 (2015) - [i7]Raluca Ada Popa, Nickolai Zeldovich, Hari Balakrishnan:
Guidelines for Using the CryptDB System Securely. IACR Cryptology ePrint Archive 2015: 979 (2015) - 2014
- [b1]Raluca Ada Popa:
Building practical systems that compute on encrypted data. Massachusetts Institute of Technology, Cambridge, MA, USA, 2014 - [j2]Raluca Ada Popa, Emily Stark, Jonas Helfer, Steven Valdez, Nickolai Zeldovich, M. Frans Kaashoek, Hari Balakrishnan:
Building Web Applications on Top of Encrypted Data Using Mylar. ;login: 39(4) (2014) - [c13]Raluca Ada Popa, Emily Stark, Steven Valdez, Jonas Helfer, Nickolai Zeldovich, Hari Balakrishnan:
Building Web Applications on Top of Encrypted Data Using Mylar. NSDI 2014: 157-172 - [i6]Raphael Bost, Raluca Ada Popa, Stephen Tu, Shafi Goldwasser:
Machine Learning Classification over Encrypted Data. IACR Cryptology ePrint Archive 2014: 331 (2014) - 2013
- [c12]Shafi Goldwasser, Yael Tauman Kalai, Raluca A. Popa, Vinod Vaikuntanathan, Nickolai Zeldovich:
How to Run Turing Machines on Encrypted Data. CRYPTO (2) 2013: 536-553 - [c11]Raluca A. Popa, Frank H. Li, Nickolai Zeldovich:
An Ideal-Security Protocol for Order-Preserving Encoding. IEEE Symposium on Security and Privacy 2013: 463-477 - [c10]Shafi Goldwasser, Yael Tauman Kalai, Raluca A. Popa, Vinod Vaikuntanathan, Nickolai Zeldovich:
Reusable garbled circuits and succinct functional encryption. STOC 2013: 555-564 - [i5]Raluca A. Popa, Frank H. Li, Nickolai Zeldovich:
An Ideal-Security Protocol for Order-Preserving Encoding. IACR Cryptology ePrint Archive 2013: 129 (2013) - [i4]Shafi Goldwasser, Yael Tauman Kalai, Raluca A. Popa, Vinod Vaikuntanathan, Nickolai Zeldovich:
Overcoming the Worst-Case Curse for Cryptographic Constructions. IACR Cryptology ePrint Archive 2013: 229 (2013) - [i3]Raluca A. Popa, Nickolai Zeldovich:
Multi-Key Searchable Encryption. IACR Cryptology ePrint Archive 2013: 508 (2013) - 2012
- [j1]Raluca A. Popa, Catherine M. S. Redfield, Nickolai Zeldovich, Hari Balakrishnan:
CryptDB: processing queries on an encrypted database. Commun. ACM 55(9): 103-111 (2012) - [i2]Shafi Goldwasser, Yael Tauman Kalai, Raluca A. Popa, Vinod Vaikuntanathan, Nickolai Zeldovich:
Succinct Functional Encryption and Applications: Reusable Garbled Circuits and Beyond. IACR Cryptology ePrint Archive 2012: 733 (2012) - 2011
- [c9]Raluca A. Popa, Andrew J. Blumberg, Hari Balakrishnan, Frank H. Li:
Privacy and accountability for location-based aggregate statistics. ACM Conference on Computer and Communications Security 2011: 653-666 - [c8]Carlo Curino, Evan P. C. Jones, Raluca A. Popa, Nirmesh Malviya, Eugene Wu, Samuel Madden, Hari Balakrishnan, Nickolai Zeldovich:
Relational Cloud: a Database Service for the cloud. CIDR 2011: 235-240 - [c7]Raluca A. Popa, Catherine M. S. Redfield, Nickolai Zeldovich, Hari Balakrishnan:
CryptDB: protecting confidentiality with encrypted query processing. SOSP 2011: 85-100 - [c6]Raluca Ada Popa, Jacob R. Lorch, David Molnar, Helen J. Wang, Li Zhuang:
Enabling Security in Cloud Storage SLAs with CloudProof. USENIX Annual Technical Conference 2011 - [i1]Raluca A. Popa, Alessandro Chiesa, Tural Badirkhanli, Muriel Médard:
Going Beyond Pollution Attacks: Forcing Byzantine Clients to Code Correctly. CoRR abs/1108.2080 (2011)
2000 – 2009
- 2009
- [c5]James A. Cowling, Dan R. K. Ports, Barbara Liskov, Raluca Ada Popa, Abhijeet Gaikwad:
Census: Location-Aware Membership Management for Large-Scale Distributed Systems. USENIX Annual Technical Conference 2009 - [c4]Raluca A. Popa, Hari Balakrishnan, Andrew J. Blumberg:
VPriv: Protecting Privacy in Location-Based Vehicular Services. USENIX Security Symposium 2009: 335-350 - 2008
- [c3]Javed A. Aslam, Raluca A. Popa, Ronald L. Rivest:
On Auditing Elections When Precincts Have Different Sizes. EVT 2008 - 2007
- [c2]Shan Lu
, Soyeon Park, Chongfeng Hu, Xiao Ma, Weihang Jiang, Zhenmin Li, Raluca A. Popa, Yuanyuan Zhou:
MUVI: automatically inferring multi-variable access correlations and detecting related semantic and concurrency bugs. SOSP 2007: 103-116 - [c1]Javed A. Aslam, Raluca A. Popa, Ronald L. Rivest:
On Estimating the Size and Confidence of a Statistical Audit. EVT 2007
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org and opencitations.net to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy.
Citation data
Add a list of citing articles from to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy.
Tweets on dblp homepage
Show tweets from on the dblp homepage.
Privacy notice: By enabling the option above, your browser will contact twitter.com and twimg.com to load tweets curated by our Twitter accout. At the same time, Twitter will persitently store several cookies with your web browser. While we did signal Twitter to not track our users by setting the "dnt" flag, we do not have any control over how Twitter uses your data. So please proceed with care and consider checking the Twitter privacy policy.
last updated on 2019-11-22 01:01 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint