Boolean searchable symmetric encryption with worst-case sub-linear complexity S Kamara, T Moataz Advances in Cryptology–EUROCRYPT 2017: 36th Annual International Conference …, 2017 | 239 | 2017 |
SQL on structurally-encrypted databases S Kamara, T Moataz Advances in Cryptology–ASIACRYPT 2018: 24th International Conference on the …, 2018 | 136 | 2018 |
Revisiting leakage abuse attacks L Blackstone, S Kamara, T Moataz Cryptology ePrint Archive, 2019 | 128 | 2019 |
Structured encryption and leakage suppression S Kamara, T Moataz, O Ohrimenko Advances in Cryptology–CRYPTO 2018: 38th Annual International Cryptology …, 2018 | 125 | 2018 |
Computationally volume-hiding structured encryption S Kamara, T Moataz Advances in Cryptology–EUROCRYPT 2019: 38th Annual International Conference …, 2019 | 118 | 2019 |
Boolean symmetric searchable encryption T Moataz, A Shikfa Proceedings of the 8th ACM SIGSAC symposium on Information, computer and …, 2013 | 103 | 2013 |
Constant communication ORAM with small blocksize T Moataz, T Mayberry, EO Blass Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015 | 81 | 2015 |
Forward and backward private searchable encryption with SGX G Amjad, S Kamara, T Moataz Proceedings of the 12th European Workshop on Systems Security, 1-6, 2019 | 72 | 2019 |
Breach-resistant structured encryption G Amjad, S Kamara, T Moataz Cryptology ePrint Archive, 2018 | 45 | 2018 |
Structured encryption and dynamic leakage suppression M George, S Kamara, T Moataz Annual International Conference on the Theory and Applications of …, 2021 | 42 | 2021 |
Handling stateful firewall anomalies F Cuppens, N Cuppens-Boulahia, J Garcia-Alfaro, T Moataz, X Rimasson IFIP International Information Security Conference, 174-186, 2012 | 42 | 2012 |
Controlling security in relational databases S Kamara, T Moataz US Patent 10,255,454, 2019 | 38 | 2019 |
Resizable tree-based oblivious RAM T Moataz, T Mayberry, EO Blass, AH Chan Financial Cryptography and Data Security: 19th International Conference, FC …, 2015 | 35 | 2015 |
Sok: Cryptanalysis of encrypted search with leaker–a framework for leakage attack evaluation on real-world data S Kamara, A Kati, T Moataz, T Schneider, A Treiber, M Yonli 2022 IEEE 7th European Symposium on Security and Privacy (EuroS&P), 90-108, 2022 | 31 | 2022 |
Encrypted databases for differential privacy A Agarwal, M Herlihy, S Kamara, T Moataz Proceedings on Privacy Enhancing Technologies, 2019 | 30 | 2019 |
Semantic search over encrypted data T Moataz, A Shikfa, N Cuppens-Boulahia, F Cuppens ICT 2013, 1-5, 2013 | 24 | 2013 |
A decentralized and encrypted national gun registry S Kamara, T Moataz, A Park, L Qin 2021 IEEE Symposium on Security and Privacy (SP), 1520-1537, 2021 | 23 | 2021 |
{OblivP2P}: An Oblivious {Peer-to-Peer} Content Sharing System Y Jia, T Moataz, S Tople, P Saxena 25th USENIX Security Symposium (USENIX Security 16), 945-962, 2016 | 18 | 2016 |
Privacy preserving record matching using automated semi-trusted broker I Lazrig, T Moataz, I Ray, I Ray, T Ong, M Kahn, F Cuppens, N Cuppens Data and Applications Security and Privacy XXIX: 29th Annual IFIP WG 11.3 …, 2015 | 18 | 2015 |
Oblivious substring search with updates T Moataz, EO Blass Cryptology ePrint Archive, 2015 | 16 | 2015 |