Tarik Moataz

According to our database1, Tarik Moataz authored at least 38 papers between 2012 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
MAPLE: MArkov Process Leakage attacks on Encrypted Search.
Proc. Priv. Enhancing Technol., January, 2024

2023
Bayesian Leakage Analysis: A Framework for Analyzing Leakage in Encrypted Search.
IACR Cryptol. ePrint Arch., 2023

Injection-Secure Structured and Searchable Symmetric Encryption.
IACR Cryptol. ePrint Arch., 2023

2022
SoK: Cryptanalysis of Encrypted Search with LEAKER - A framework for LEakage AttacK Evaluation on Real-world data.
Proceedings of the 7th IEEE European Symposium on Security and Privacy, 2022

2021
A Decentralized and Encrypted National Gun Registry.
IACR Cryptol. ePrint Arch., 2021

Cryptanalysis of Encrypted Search with LEAKER - A framework for LEakage AttacK Evaluation on Real-world data.
IACR Cryptol. ePrint Arch., 2021

Structured Encryption and Dynamic Leakage Suppression.
Proceedings of the Advances in Cryptology - EUROCRYPT 2021, 2021

Encrypted Databases: From Theory to Systems.
Proceedings of the 11th Conference on Innovative Data Systems Research, 2021

2020
An Optimal Relational Database Encryption Scheme.
IACR Cryptol. ePrint Arch., 2020

Encrypted Blockchain Databases.
IACR Cryptol. ePrint Arch., 2020

Robust P2P Primitives Using SGX Enclaves.
Proceedings of the 23rd International Symposium on Research in Attacks, 2020

2019
Breach-Resistant Structured Encryption.
Proc. Priv. Enhancing Technol., 2019

Encrypted Databases for Differential Privacy.
Proc. Priv. Enhancing Technol., 2019

Revisiting Leakage Abuse Attacks.
IACR Cryptol. ePrint Arch., 2019

Forward and Backward Private Searchable Encryption with SGX.
Proceedings of the 12th European Workshop on Systems Security, 2019

Computationally Volume-Hiding Structured Encryption.
Proceedings of the Advances in Cryptology - EUROCRYPT 2019, 2019

2018
Substring search over encrypted data.
J. Comput. Secur., 2018

Structured Encryption and Leakage Suppression.
IACR Cryptol. ePrint Arch., 2018

Encrypted Multi-Maps with Computationally-Secure Leakage.
IACR Cryptol. ePrint Arch., 2018

2017
Boolean Searchable Symmetric Encryption with Worst-Case Sub-Linear Complexity.
IACR Cryptol. ePrint Arch., 2017

Robust Synchronous P2P Primitives Using SGX Enclaves.
IACR Cryptol. ePrint Arch., 2017

2016
Searching over encrypted data. (Recherches sur des données chiffrées).
PhD thesis, 2016

SQL on Structurally-Encrypted Databases.
IACR Cryptol. ePrint Arch., 2016

OblivP2P: An Oblivious Peer-to-Peer Content Sharing System.
Proceedings of the 25th USENIX Security Symposium, 2016

2015
Recursive Trees for Practical ORAM.
Proc. Priv. Enhancing Technol., 2015

Constant Communication Oblivious RAM.
IACR Cryptol. ePrint Arch., 2015

Constant Communication ORAM without Encryption.
IACR Cryptol. ePrint Arch., 2015

Oblivious Substring Search with Updates.
IACR Cryptol. ePrint Arch., 2015

Resizable Tree-Based Oblivious RAM.
Proceedings of the Financial Cryptography and Data Security, 2015

Privacy Preserving Record Matching Using Automated Semi-trusted Broker.
Proceedings of the Data and Applications Security and Privacy XXIX, 2015

Constant Communication ORAM with Small Blocksize.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
Resizable Tree-Based Oblivious RAM.
IACR Cryptol. ePrint Arch., 2014

Privacy-Preserving Multiple Keyword Search on Outsourced Data in the Clouds.
Proceedings of the Data and Applications Security and Privacy XXVIII, 2014

ELITE: zEro Links Identity managemenT systEm.
Proceedings of the Data and Applications Security and Privacy XXVIII, 2014

2013
Semantic search over encrypted data.
Proceedings of the 20st International Conference on Telecommunications, 2013

Searchable Encryption Supporting General Boolean Expression Queries.
Proceedings of the Financial Cryptography and Data Security, 2013

Boolean symmetric searchable encryption.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013

2012
Handling Stateful Firewall Anomalies.
Proceedings of the Information Security and Privacy Research, 2012


  Loading...