Follow
Tarik Moataz
Tarik Moataz
Verified email at brown.edu - Homepage
Title
Cited by
Cited by
Year
Boolean searchable symmetric encryption with worst-case sub-linear complexity
S Kamara, T Moataz
Advances in Cryptology–EUROCRYPT 2017: 36th Annual International Conference …, 2017
2552017
Revisiting leakage abuse attacks
L Blackstone, S Kamara, T Moataz
Cryptology ePrint Archive, 2019
1452019
SQL on structurally-encrypted databases
S Kamara, T Moataz
Advances in Cryptology–ASIACRYPT 2018: 24th International Conference on the …, 2018
1452018
Structured encryption and leakage suppression
S Kamara, T Moataz, O Ohrimenko
Advances in Cryptology–CRYPTO 2018: 38th Annual International Cryptology …, 2018
1362018
Computationally volume-hiding structured encryption
S Kamara, T Moataz
Advances in Cryptology–EUROCRYPT 2019: 38th Annual International Conference …, 2019
1352019
Boolean symmetric searchable encryption
T Moataz, A Shikfa
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and …, 2013
1072013
Constant communication ORAM with small blocksize
T Moataz, T Mayberry, EO Blass
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
842015
Forward and backward private searchable encryption with SGX
G Amjad, S Kamara, T Moataz
Proceedings of the 12th European Workshop on Systems Security, 1-6, 2019
802019
Structured encryption and dynamic leakage suppression
M George, S Kamara, T Moataz
Annual International Conference on the Theory and Applications of …, 2021
482021
Breach-resistant structured encryption
G Amjad, S Kamara, T Moataz
Cryptology ePrint Archive, 2018
472018
Controlling security in relational databases
S Kamara, T Moataz
US Patent 10,255,454, 2019
442019
Handling stateful firewall anomalies
F Cuppens, N Cuppens-Boulahia, J Garcia-Alfaro, T Moataz, X Rimasson
IFIP International Information Security Conference, 174-186, 2012
432012
Sok: Cryptanalysis of encrypted search with leaker–a framework for leakage attack evaluation on real-world data
S Kamara, A Kati, T Moataz, T Schneider, A Treiber, M Yonli
2022 IEEE 7th European Symposium on Security and Privacy (EuroS&P), 90-108, 2022
392022
Encrypted databases for differential privacy
A Agarwal, M Herlihy, S Kamara, T Moataz
Proceedings on Privacy Enhancing Technologies, 2019
362019
Resizable tree-based oblivious RAM
T Moataz, T Mayberry, EO Blass, AH Chan
Financial Cryptography and Data Security: 19th International Conference, FC …, 2015
352015
A decentralized and encrypted national gun registry
S Kamara, T Moataz, A Park, L Qin
2021 IEEE Symposium on Security and Privacy (SP), 1520-1537, 2021
252021
Semantic search over encrypted data
T Moataz, A Shikfa, N Cuppens-Boulahia, F Cuppens
ICT 2013, 1-5, 2013
252013
{OblivP2P}: An Oblivious {Peer-to-Peer} Content Sharing System
Y Jia, T Moataz, S Tople, P Saxena
25th USENIX Security Symposium (USENIX Security 16), 945-962, 2016
192016
Privacy preserving record matching using automated semi-trusted broker
I Lazrig, T Moataz, I Ray, I Ray, T Ong, M Kahn, F Cuppens, N Cuppens
Data and Applications Security and Privacy XXIX: 29th Annual IFIP WG 11.3 …, 2015
192015
An optimal relational database encryption scheme
S Kamara, T Moataz, S Zdonik, Z Zhao
Cryptology ePrint Archive, 2020
182020
The system can't perform the operation now. Try again later.
Articles 1–20