Tarik Moataz

Orcid: 0009-0009-1175-4776

According to our database1, Tarik Moataz authored at least 42 papers between 2012 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
PolySys: an Algebraic Leakage Attack Engine.
IACR Cryptol. ePrint Arch., 2025

Bayesian Leakage Analysis: A Framework for Analyzing Leakage in Cryptography.
IACR Commun. Cryptol., 2025

2024
Subliminal Encrypted Multi-Maps and Black-Box Leakage Absorption.
IACR Cryptol. ePrint Arch., 2024

Updatable Private Set Intersection from Structured Encryption.
IACR Cryptol. ePrint Arch., 2024

Concurrent Encrypted Multimaps.
Proceedings of the Advances in Cryptology - ASIACRYPT 2024, 2024

2023
MAPLE: MArkov Process Leakage attacks on Encrypted Search.
IACR Cryptol. ePrint Arch., 2023

Injection-Secure Structured and Searchable Symmetric Encryption.
Proceedings of the Advances in Cryptology - ASIACRYPT 2023, 2023

2022
SoK: Cryptanalysis of Encrypted Search with LEAKER - A framework for LEakage AttacK Evaluation on Real-world data.
Proceedings of the 7th IEEE European Symposium on Security and Privacy, 2022

2021
Cryptanalysis of Encrypted Search with LEAKER - A framework for LEakage AttacK Evaluation on Real-world data.
IACR Cryptol. ePrint Arch., 2021

A Decentralized and Encrypted National Gun Registry.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021

Structured Encryption and Dynamic Leakage Suppression.
Proceedings of the Advances in Cryptology - EUROCRYPT 2021, 2021

Encrypted Databases: From Theory to Systems.
Proceedings of the 11th Conference on Innovative Data Systems Research, 2021

2020
An Optimal Relational Database Encryption Scheme.
IACR Cryptol. ePrint Arch., 2020

Revisiting Leakage Abuse Attacks.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020

Robust P2P Primitives Using SGX Enclaves.
Proceedings of the 40th IEEE International Conference on Distributed Computing Systems, 2020

Encrypted Blockchain Databases.
Proceedings of the 2nd ACM Conference on Advances in Financial Technologies, 2020

2019
Forward and Backward Private Searchable Encryption with SGX.
Proceedings of the 12th European Workshop on Systems Security, 2019

Computationally Volume-Hiding Structured Encryption.
Proceedings of the Advances in Cryptology - EUROCRYPT 2019, 2019

2018
Substring search over encrypted data.
J. Comput. Secur., 2018

Encrypted Multi-Maps with Computationally-Secure Leakage.
IACR Cryptol. ePrint Arch., 2018

Breach-Resistant Structured Encryption.
IACR Cryptol. ePrint Arch., 2018

Encrypted Databases for Differential Privacy.
IACR Cryptol. ePrint Arch., 2018

Structured Encryption and Leakage Suppression.
Proceedings of the Advances in Cryptology - CRYPTO 2018, 2018

SQL on Structurally-Encrypted Databases.
Proceedings of the Advances in Cryptology - ASIACRYPT 2018, 2018

2017
Robust Synchronous P2P Primitives Using SGX Enclaves.
IACR Cryptol. ePrint Arch., 2017

Boolean Searchable Symmetric Encryption with Worst-Case Sub-linear Complexity.
Proceedings of the Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30, 2017

2016
Searching over encrypted data. (Recherches sur des données chiffrées).
PhD thesis, 2016

OblivP2P: An Oblivious Peer-to-Peer Content Sharing System.
Proceedings of the 25th USENIX Security Symposium, 2016

2015
Constant Communication Oblivious RAM.
IACR Cryptol. ePrint Arch., 2015

Constant Communication ORAM without Encryption.
IACR Cryptol. ePrint Arch., 2015

Oblivious Substring Search with Updates.
IACR Cryptol. ePrint Arch., 2015

Resizable Tree-Based Oblivious RAM.
Proceedings of the Financial Cryptography and Data Security, 2015

Privacy Preserving Record Matching Using Automated Semi-trusted Broker.
Proceedings of the Data and Applications Security and Privacy XXIX, 2015

Constant Communication ORAM with Small Blocksize.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
Resizable Tree-Based Oblivious RAM.
IACR Cryptol. ePrint Arch., 2014

Recursive Trees for Practical ORAM.
IACR Cryptol. ePrint Arch., 2014

Privacy-Preserving Multiple Keyword Search on Outsourced Data in the Clouds.
Proceedings of the Data and Applications Security and Privacy XXVIII, 2014

ELITE: zEro Links Identity managemenT systEm.
Proceedings of the Data and Applications Security and Privacy XXVIII, 2014

2013
Semantic search over encrypted data.
Proceedings of the 20st International Conference on Telecommunications, 2013

Searchable Encryption Supporting General Boolean Expression Queries.
Proceedings of the Financial Cryptography and Data Security, 2013

Boolean symmetric searchable encryption.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013

2012
Handling Stateful Firewall Anomalies.
Proceedings of the Information Security and Privacy Research, 2012


  Loading...