Boolean searchable symmetric encryption with worst-case sub-linear complexity S Kamara, T Moataz Advances in Cryptology–EUROCRYPT 2017: 36th Annual International Conference …, 2017 | 203 | 2017 |
SQL on structurally-encrypted databases S Kamara, T Moataz Advances in Cryptology–ASIACRYPT 2018: 24th International Conference on the …, 2018 | 106 | 2018 |
Boolean symmetric searchable encryption T Moataz, A Shikfa Proceedings of the 8th ACM SIGSAC symposium on Information, computer and …, 2013 | 97 | 2013 |
Structured encryption and leakage suppression S Kamara, T Moataz, O Ohrimenko Advances in Cryptology–CRYPTO 2018: 38th Annual International Cryptology …, 2018 | 95 | 2018 |
Constant communication ORAM with small blocksize T Moataz, T Mayberry, EO Blass Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015 | 81 | 2015 |
Revisiting leakage abuse attacks L Blackstone, S Kamara, T Moataz Cryptology ePrint Archive, 2019 | 79 | 2019 |
Computationally volume-hiding structured encryption S Kamara, T Moataz Advances in Cryptology–EUROCRYPT 2019: 38th Annual International Conference …, 2019 | 75 | 2019 |
Forward and backward private searchable encryption with SGX G Amjad, S Kamara, T Moataz Proceedings of the 12th European Workshop on Systems Security, 1-6, 2019 | 52 | 2019 |
Handling stateful firewall anomalies F Cuppens, N Cuppens-Boulahia, J Garcia-Alfaro, T Moataz, X Rimasson Information Security and Privacy Research: 27th IFIP TC 11 Information …, 2012 | 39 | 2012 |
Resizable tree-based oblivious RAM T Moataz, T Mayberry, EO Blass, AH Chan Financial Cryptography and Data Security: 19th International Conference, FC …, 2015 | 35 | 2015 |
Breach-resistant structured encryption G Amjad, S Kamara, T Moataz Cryptology ePrint Archive, 2018 | 33 | 2018 |
Controlling security in relational databases S Kamara, T Moataz US Patent 10,255,454, 2019 | 32 | 2019 |
Encrypted databases for differential privacy A Agarwal, M Herlihy, S Kamara, T Moataz Cryptology ePrint Archive, 2018 | 24 | 2018 |
Semantic search over encrypted data T Moataz, A Shikfa, N Cuppens-Boulahia, F Cuppens ICT 2013, 1-5, 2013 | 20 | 2013 |
Structured encryption and dynamic leakage suppression M George, S Kamara, T Moataz Advances in Cryptology–EUROCRYPT 2021: 40th Annual International Conference …, 2021 | 19 | 2021 |
Privacy preserving record matching using automated semi-trusted broker I Lazrig, T Moataz, I Ray, I Ray, T Ong, M Kahn, F Cuppens, N Cuppens Data and Applications Security and Privacy XXIX: 29th Annual IFIP WG 11.3 …, 2015 | 19 | 2015 |
OblivP2P: An Oblivious Peer-to-Peer Content Sharing System. Y Jia, T Moataz, S Tople, P Saxena USENIX Security Symposium, 945-962, 2016 | 16 | 2016 |
Oblivious substring search with updates T Moataz, EO Blass Cryptology ePrint Archive, 2015 | 13 | 2015 |
Privacy-preserving multiple keyword search on outsourced data in the clouds T Moataz, B Justus, I Ray, N Cuppens-Boulahia, F Cuppens, I Ray Data and Applications Security and Privacy XXVIII: 28th Annual IFIP WG 11.3 …, 2014 | 13 | 2014 |
Encrypted multi-maps with computationally-secure leakage S Kamara, T Moataz Cryptology ePrint Archive, 2018 | 12 | 2018 |