Leakage-Abuse Attacks against Order-Revealing Encryption
暂无分享,去创建一个
Thomas Ristenpart | Vincent Bindschaedler | Muhammad Naveed | Paul Grubbs | Kevin Sekniqi | T. Ristenpart | Kevin Sekniqi | Muhammad Naveed | Paul Grubbs | Vincent Bindschaedler | Thomas Ristenpart
[1] Alex J. Malozemoff,et al. 5Gen: A Framework for Prototyping Applications Using Multilinear Maps and Matrix Branching Programs , 2016, CCS.
[2] Craig Gentry,et al. Candidate Multilinear Maps from Ideal Lattices , 2013, EUROCRYPT.
[3] Yupu Hu,et al. Cryptanalysis of GGH Map , 2016, EUROCRYPT.
[4] Hari Balakrishnan,et al. Building Web Applications on Top of Encrypted Data Using Mylar , 2014, NSDI.
[5] Mihir Bellare,et al. DupLESS: Server-Aided Encryption for Deduplicated Storage , 2013, USENIX Security Symposium.
[6] Charles V. Wright,et al. Inference Attacks on Property-Preserving Encrypted Databases , 2015, CCS.
[7] Florian Kerschbaum,et al. Optimal Average-Complexity Ideal-Security Order-Preserving Encryption , 2014, CCS.
[8] Mauro Dell'Amico,et al. Assignment Problems , 1998, IFIP Congress: Fundamentals - Foundations of Computer Science.
[9] Nickolai Zeldovich,et al. An Ideal-Security Protocol for Order-Preserving Encoding , 2013, 2013 IEEE Symposium on Security and Privacy.
[10] Nathan Chenette,et al. Order-Preserving Encryption Revisited: Improved Security Analysis and Alternative Solutions , 2011, CRYPTO.
[11] Andreas Haeberlen,et al. Big Data Analytics over Encrypted Datasets with Seabed , 2016, OSDI.
[12] Mark Zhandry,et al. Semantically Secure Order-Revealing Encryption: Multi-input Functional Encryption Without Obfuscation , 2015, EUROCRYPT.
[13] Eric Miles,et al. Annihilation Attacks for Multilinear Maps: Cryptanalysis of Indistinguishability Obfuscation over GGH13 , 2016, CRYPTO.
[14] David Cash,et al. Leakage-Abuse Attacks Against Searchable Encryption , 2015, IACR Cryptol. ePrint Arch..
[15] David Cash,et al. What Else is Revealed by Order-Revealing Encryption? , 2016, IACR Cryptol. ePrint Arch..
[16] Joseph Bonneau,et al. The Science of Guessing: Analyzing an Anonymized Corpus of 70 Million Passwords , 2012, 2012 IEEE Symposium on Security and Privacy.
[17] Hugo Krawczyk,et al. Rich Queries on Encrypted Data: Beyond Exact Matches , 2015, ESORICS.
[18] Murat Kantarcioglu,et al. Access Pattern disclosure on Searchable Encryption: Ramification, Attack and Mitigation , 2012, NDSS.
[19] Ramakrishnan Srikant,et al. Order preserving encryption for numeric data , 2004, SIGMOD '04.
[20] Arkady Yerukhimovich,et al. POPE: Partial Order Preserving Encoding , 2016, CCS.
[21] Elaine Shi,et al. ShadowCrypt: Encrypted Web Applications for Everyone , 2014, CCS.
[22] Matemática,et al. Society for Industrial and Applied Mathematics , 2010 .
[23] Mihir Bellare,et al. Deterministic and Efficiently Searchable Encryption , 2007, CRYPTO.
[24] Vitaly Shmatikov,et al. Breaking Web Applications Built On Top of Encrypted Data , 2016, CCS.
[25] Hari Balakrishnan,et al. Guidelines for Using the CryptDB System Securely , 2015, IACR Cryptol. ePrint Arch..
[26] Vladimir Kolesnikov,et al. On the limits of privacy provided by order-preserving encryption , 2012, Bell Labs Technical Journal.
[27] Hugo Krawczyk,et al. Highly-Scalable Searchable Symmetric Encryption with Support for Boolean Queries , 2013, IACR Cryptol. ePrint Arch..
[28] Martin R. Albrecht,et al. A Subfield Lattice Attack on Overstretched NTRU Assumptions - Cryptanalysis of Some FHE and Graded Encoding Schemes , 2016, CRYPTO.
[29] David Avis,et al. A survey of heuristics for the weighted matching problem , 1983, Networks.
[30] David J. Wu,et al. Practical Order-Revealing Encryption with Limited Leakage , 2016, FSE.
[31] Hari Balakrishnan,et al. CryptDB: protecting confidentiality with encrypted query processing , 2011, SOSP.
[32] Federico Malucelli,et al. Efficient Labelling Algorithms for the Maximum Noncrossing Matching Problem , 1993, Discret. Appl. Math..
[33] Moti Yung,et al. Order-Preserving Encryption Secure Beyond One-Wayness , 2014, IACR Cryptol. ePrint Arch..
[34] Ramarathnam Venkatesan,et al. Orthogonal Security with Cipherbase , 2013, CIDR.
[35] Florian Kerschbaum,et al. Frequency-Hiding Order-Preserving Encryption , 2015, CCS.
[36] Nathan Chenette,et al. Order-Preserving Symmetric Encryption , 2009, IACR Cryptol. ePrint Arch..
[37] Dawn Xiaodong Song,et al. Practical techniques for searches on encrypted data , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[38] Jonathan Katz,et al. All Your Queries Are Belong to Us: The Power of File-Injection Attacks on Searchable Encryption , 2016, USENIX Security Symposium.
[39] David J. Wu,et al. Order-Revealing Encryption: New Constructions, Applications, and Lower Bounds , 2016, IACR Cryptol. ePrint Arch..
[40] Wenke Lee,et al. Mimesis Aegis: A Mimicry Privacy Shield-A System's Approach to Data Privacy on Public Cloud , 2014, USENIX Security Symposium.
[41] Rafail Ostrovsky,et al. Searchable symmetric encryption: Improved definitions and efficient constructions , 2011, J. Comput. Secur..