default search action
Tarik Moataz
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j5]Seny Kamara, Abdelkarim Kati, Tarik Moataz, Jamie DeMaria, Andrew Park, Amos Treiber:
MAPLE: MArkov Process Leakage attacks on Encrypted Search. Proc. Priv. Enhancing Technol. 2024(1): 430-446 (2024) - [i21]Archita Agarwal, David Cash, Marilyn George, Seny Kamara, Tarik Moataz, Jaspal Singh:
Updatable Private Set Intersection from Structured Encryption. IACR Cryptol. ePrint Arch. 2024: 1183 (2024) - 2023
- [c24]Ghous Amjad, Seny Kamara, Tarik Moataz:
Injection-Secure Structured and Searchable Symmetric Encryption. ASIACRYPT (6) 2023: 232-262 - [i20]Ghous Amjad, Seny Kamara, Tarik Moataz:
Injection-Secure Structured and Searchable Symmetric Encryption. IACR Cryptol. ePrint Arch. 2023: 533 (2023) - [i19]Seny Kamara, Abdelkarim Kati, Tarik Moataz, Jamie DeMaria, Andrew Park, Amos Treiber:
MAPLE: MArkov Process Leakage attacks on Encrypted Search. IACR Cryptol. ePrint Arch. 2023: 810 (2023) - [i18]Seny Kamara, Tarik Moataz:
Bayesian Leakage Analysis: A Framework for Analyzing Leakage in Encrypted Search. IACR Cryptol. ePrint Arch. 2023: 813 (2023) - 2022
- [c23]Seny Kamara, Abdelkarim Kati, Tarik Moataz, Thomas Schneider, Amos Treiber, Michael Yonli:
SoK: Cryptanalysis of Encrypted Search with LEAKER - A framework for LEakage AttacK Evaluation on Real-world data. EuroS&P 2022: 90-108 - 2021
- [c22]Zheguang Zhao, Seny Kamara, Tarik Moataz, Stan Zdonik:
Encrypted Databases: From Theory to Systems. CIDR 2021 - [c21]Marilyn George, Seny Kamara, Tarik Moataz:
Structured Encryption and Dynamic Leakage Suppression. EUROCRYPT (3) 2021: 370-396 - [c20]Seny Kamara, Tarik Moataz, Andrew Park, Lucy Qin:
A Decentralized and Encrypted National Gun Registry. SP 2021: 1520-1537 - [i17]Seny Kamara, Tarik Moataz, Andrew Park, Lucy Qin:
A Decentralized and Encrypted National Gun Registry. IACR Cryptol. ePrint Arch. 2021: 107 (2021) - [i16]Seny Kamara, Abdelkarim Kati, Tarik Moataz, Thomas Schneider, Amos Treiber, Michael Yonli:
Cryptanalysis of Encrypted Search with LEAKER - A framework for LEakage AttacK Evaluation on Real-world data. IACR Cryptol. ePrint Arch. 2021: 1035 (2021) - 2020
- [c19]Daniel Adkins, Archita Agarwal, Seny Kamara, Tarik Moataz:
Encrypted Blockchain Databases. AFT 2020: 241-254 - [c18]Yaoqi Jia, Shruti Tople, Tarik Moataz, Deli Gong, Prateek Saxena, Zhenkai Liang:
Robust P2P Primitives Using SGX Enclaves. ICDCS 2020: 1185-1186 - [c17]Laura Blackstone, Seny Kamara, Tarik Moataz:
Revisiting Leakage Abuse Attacks. NDSS 2020 - [c16]Yaoqi Jia, Shruti Tople, Tarik Moataz, Deli Gong, Prateek Saxena, Zhenkai Liang:
Robust P2P Primitives Using SGX Enclaves. RAID 2020: 209-224 - [i15]Seny Kamara, Tarik Moataz, Stan Zdonik, Zheguang Zhao:
An Optimal Relational Database Encryption Scheme. IACR Cryptol. ePrint Arch. 2020: 274 (2020) - [i14]Daniel Adkins, Archita Agarwal, Seny Kamara, Tarik Moataz:
Encrypted Blockchain Databases. IACR Cryptol. ePrint Arch. 2020: 827 (2020)
2010 – 2019
- 2019
- [j4]Ghous Amjad, Seny Kamara, Tarik Moataz:
Breach-Resistant Structured Encryption. Proc. Priv. Enhancing Technol. 2019(1): 245-265 (2019) - [j3]Archita Agarwal, Maurice Herlihy, Seny Kamara, Tarik Moataz:
Encrypted Databases for Differential Privacy. Proc. Priv. Enhancing Technol. 2019(3): 170-190 (2019) - [c15]Seny Kamara, Tarik Moataz:
Computationally Volume-Hiding Structured Encryption. EUROCRYPT (2) 2019: 183-213 - [c14]Ghous Amjad, Seny Kamara, Tarik Moataz:
Forward and Backward Private Searchable Encryption with SGX. EuroSec@EuroSys 2019: 4:1-4:6 - [i13]Laura Blackstone, Seny Kamara, Tarik Moataz:
Revisiting Leakage Abuse Attacks. IACR Cryptol. ePrint Arch. 2019: 1175 (2019) - 2018
- [j2]Tarik Moataz, Indrajit Ray, Indrakshi Ray, Abdullatif Shikfa, Frédéric Cuppens, Nora Cuppens:
Substring search over encrypted data. J. Comput. Secur. 26(1): 1-30 (2018) - [c13]Seny Kamara, Tarik Moataz:
SQL on Structurally-Encrypted Databases. ASIACRYPT (1) 2018: 149-180 - [c12]Seny Kamara, Tarik Moataz, Olga Ohrimenko:
Structured Encryption and Leakage Suppression. CRYPTO (1) 2018: 339-370 - [i12]Ghous Amjad, Seny Kamara, Tarik Moataz:
Breach-Resistant Structured Encryption. IACR Cryptol. ePrint Arch. 2018: 195 (2018) - [i11]Seny Kamara, Tarik Moataz, Olga Ohrimenko:
Structured Encryption and Leakage Suppression. IACR Cryptol. ePrint Arch. 2018: 551 (2018) - [i10]Archita Agarwal, Maurice Herlihy, Seny Kamara, Tarik Moataz:
Encrypted Databases for Differential Privacy. IACR Cryptol. ePrint Arch. 2018: 860 (2018) - [i9]Seny Kamara, Tarik Moataz:
Encrypted Multi-Maps with Computationally-Secure Leakage. IACR Cryptol. ePrint Arch. 2018: 978 (2018) - 2017
- [c11]Seny Kamara, Tarik Moataz:
Boolean Searchable Symmetric Encryption with Worst-Case Sub-linear Complexity. EUROCRYPT (3) 2017: 94-124 - [i8]Seny Kamara, Tarik Moataz:
Boolean Searchable Symmetric Encryption with Worst-Case Sub-Linear Complexity. IACR Cryptol. ePrint Arch. 2017: 126 (2017) - [i7]Yaoqi Jia, Shruti Tople, Tarik Moataz, Deli Gong, Prateek Saxena, Zhenkai Liang:
Robust Synchronous P2P Primitives Using SGX Enclaves. IACR Cryptol. ePrint Arch. 2017: 180 (2017) - 2016
- [b1]Tarik Moataz:
Searching over encrypted data. (Recherches sur des données chiffrées). Telecom Bretagne, Brest, France, 2016 - [c10]Yaoqi Jia, Tarik Moataz, Shruti Tople, Prateek Saxena:
OblivP2P: An Oblivious Peer-to-Peer Content Sharing System. USENIX Security Symposium 2016: 945-962 - [i6]Seny Kamara, Tarik Moataz:
SQL on Structurally-Encrypted Databases. IACR Cryptol. ePrint Arch. 2016: 453 (2016) - 2015
- [j1]Tarik Moataz, Erik-Oliver Blass, Guevara Noubir:
Recursive Trees for Practical ORAM. Proc. Priv. Enhancing Technol. 2015(2): 115-134 (2015) - [c9]Tarik Moataz, Travis Mayberry, Erik-Oliver Blass:
Constant Communication ORAM with Small Blocksize. CCS 2015: 862-873 - [c8]Ibrahim Lazrig, Tarik Moataz, Indrajit Ray, Indrakshi Ray, Toan Ong, Michael G. Kahn, Frédéric Cuppens, Nora Cuppens-Boulahia:
Privacy Preserving Record Matching Using Automated Semi-trusted Broker. DBSec 2015: 103-118 - [c7]Tarik Moataz, Travis Mayberry, Erik-Oliver Blass, Agnes Hui Chan:
Resizable Tree-Based Oblivious RAM. Financial Cryptography 2015: 147-167 - [i5]Tarik Moataz, Travis Mayberry, Erik-Oliver Blass:
Constant Communication Oblivious RAM. IACR Cryptol. ePrint Arch. 2015: 570 (2015) - [i4]Tarik Moataz, Erik-Oliver Blass:
Oblivious Substring Search with Updates. IACR Cryptol. ePrint Arch. 2015: 722 (2015) - [i3]Tarik Moataz, Erik-Oliver Blass, Travis Mayberry:
Constant Communication ORAM without Encryption. IACR Cryptol. ePrint Arch. 2015: 1116 (2015) - 2014
- [c6]Tarik Moataz, Benjamin Justus, Indrakshi Ray, Nora Cuppens-Boulahia, Frédéric Cuppens, Indrajit Ray:
Privacy-Preserving Multiple Keyword Search on Outsourced Data in the Clouds. DBSec 2014: 66-81 - [c5]Tarik Moataz, Nora Cuppens-Boulahia, Frédéric Cuppens, Indrajit Ray, Indrakshi Ray:
ELITE: zEro Links Identity managemenT systEm. DBSec 2014: 195-210 - [i2]Tarik Moataz, Erik-Oliver Blass, Guevara Noubir:
Recursive Trees for Practical ORAM. IACR Cryptol. ePrint Arch. 2014: 603 (2014) - [i1]Tarik Moataz, Travis Mayberry, Erik-Oliver Blass:
Resizable Tree-Based Oblivious RAM. IACR Cryptol. ePrint Arch. 2014: 732 (2014) - 2013
- [c4]Tarik Moataz, Abdullatif Shikfa:
Boolean symmetric searchable encryption. AsiaCCS 2013: 265-276 - [c3]Tarik Moataz, Abdullatif Shikfa:
Searchable Encryption Supporting General Boolean Expression Queries. Financial Cryptography 2013: 401 - [c2]Tarik Moataz, Abdullatif Shikfa, Nora Cuppens-Boulahia, Frédéric Cuppens:
Semantic search over encrypted data. ICT 2013: 1-5 - 2012
- [c1]Frédéric Cuppens, Nora Cuppens-Boulahia, Joaquín García-Alfaro, Tarik Moataz, Xavier Rimasson:
Handling Stateful Firewall Anomalies. SEC 2012: 174-186
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-03 21:15 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint