Order preserving encryption for numeric data, Proceedings of the 2004 ACM SIGMOD international conference on Management of data , SIGMOD '04, 2004. ,
DOI : 10.1145/1007568.1007632
URL : http://rakesh.agrawal-family.com/papers/sigmod04opes.pdf
Innovative Technology for CPU Based Attestation and Sealing, Workshop on Hardware and Architectural Support for Security and Privacy, 2013. ,
TrustedDB, Proceedings of the 2011 international conference on Management of data, SIGMOD '11, 2014. ,
DOI : 10.1145/1989323.1989346
Shielding Applications from an Untrusted Cloud with Haven, 11th USENIX Symposium on Operating Systems Design and Implementation. OSDI, 2014. ,
DOI : 10.1145/1519065.1519076
Deterministic and Efficiently Searchable Encryption, 27th International Conference on Advances in Cryptology. CRYPTO, 2007. ,
DOI : 10.1007/978-3-540-74143-5_30
URL : https://link.springer.com/content/pdf/10.1007%2F978-3-540-74143-5_30.pdf
The Security Impact of a New Cryptographic Library, 2nd International Conference on Cryptology and Information Security in Latin America. LATINCRYPT, 2012. ,
DOI : 10.1007/978-3-642-33481-8_9
Order-Preserving Symmetric Encryption, 28th International Conference on Advances in Cryptology. EUROCRYPT, 2009. ,
DOI : 10.1109/TMC.2006.144
URL : http://www.cc.gatech.edu/~aboldyre/papers/bclo.pdf
Order-Preserving Encryption Revisited: Improved Security Analysis and Alternative Solutions, 31st International Conference on Advances in Cryptology. CRYPTO, 2011. ,
DOI : 10.1007/978-3-642-22792-9_33
URL : http://www.cc.gatech.edu/%7Eaboldyre/papers/operev.pdf
Functional Encryption: Definitions and Challenges, 8th Conference on Theory of Cryptography. TCC, 2011. ,
DOI : 10.1007/978-3-642-19571-6_16
Conjunctive, Subset, and Range Queries on Encrypted Data, 4th Theory of Cryptography Conference, 2007. ,
DOI : 10.1007/978-3-540-70936-7_29
TyTAN, Proceedings of the 52nd Annual Design Automation Conference on, DAC '15, 2015. ,
DOI : 10.1145/1456455.1456460
Remote Timing Attacks Are Still Practical, ESORICS, vol.6, 2011. ,
DOI : 10.1007/BF02579403
URL : http://eprint.iacr.org/2011/232.pdf
Highly-Scalable Searchable Symmetric Encryption with Support for Boolean Queries, 33rd International Conference on Advances in Cryptology. CRYPTO, 2013. ,
DOI : 10.1007/978-3-642-40041-4_20
Searchable symmetric encryption, Proceedings of the 13th ACM conference on Computer and communications security , CCS '06, 2006. ,
DOI : 10.1145/1180405.1180417
Practical Private Range Search Revisited, Proceedings of the 2016 International Conference on Management of Data, SIGMOD '16, 2016. ,
DOI : 10.1007/978-3-642-15546-8_7
What Else is Revealed by Order-Revealing Encryption?, Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, CCS'16, 2016. ,
DOI : 10.1109/SP.2013.38
Rich Queries on Encrypted Data: Beyond Exact Matches, 20th European Symposium on Research in Computer Security, 2015. ,
DOI : 10.1145/2723872.2723877
TWORAM: Efficient Oblivious RAM in Two Rounds with Applications to Searchable Encryption, 36th Cryptology Conference, 2016. ,
DOI : 10.1145/2382196.2382229
Get your hands off my laptop: physical side-channel key-extraction attacks on PCs, Journal of Cryptographic Engineering, 2015. ,
DOI : 10.1007/s13389-015-0100-7
Fully homomorphic encryption using ideal lattices, Proceedings of the 41st annual ACM symposium on Symposium on theory of computing, STOC '09, 2009. ,
DOI : 10.1145/1536414.1536440
Homomorphic Evaluation of the AES Circuit, 32nd International Conference on Advances in Cryptology. CRYPTO, 2012. ,
DOI : 10.1007/978-3-642-32009-5_49
Leakage-Abuse Attacks against Order-Revealing Encryption, 2017 IEEE Symposium on Security and Privacy (SP), p.895 ,
DOI : 10.1109/SP.2017.44
Optimal Average-Complexity Ideal-Security Order-Preserving Encryption, Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, CCS '14, 2014. ,
DOI : 10.1145/765568.765571
Privacy-preserving logarithmic-time search on encrypted data in cloud, 19th Network and Distributed System Security Symposium. NDSS, 2012. ,
How to Build a Trusted Database System on Untrusted Storage, 4th Conference on Symposium on Operating System Design & Implementation . OSDI, 2000. ,
Innovative instructions and software model for isolated execution, Proceedings of the 2nd International Workshop on Hardware and Architectural Support for Security and Privacy, HASP '13, 2013. ,
DOI : 10.1145/2487726.2488368
Are AES x86 cache timing attacks still feasible?, Proceedings of the 2012 ACM Workshop on Cloud computing security workshop, CCSW '12, 2012. ,
DOI : 10.1145/2381913.2381917
URL : http://www.cs.ucsd.edu/%7Ekmowery/papers/aes-cache-timing.pdf
The fallacy of composition of oblivious RAM and searchable encryption, p.668 ,
Inference Attacks on Property-Preserving Encrypted Databases, Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, CCS '15, 2015. ,
DOI : 10.1007/11863908_29
Oblivious Multi-Party Machine Learning on Trusted Processors, 25th USENIX Security Symposium. USENIX Security, 2016. ,
CryptDB, Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles, SOSP '11, 2011. ,
DOI : 10.1145/2043556.2043566
URL : http://dspace.mit.edu/bitstream/1721.1/74107/1/cryptdb-sosp11.pdf
Database Management Systems, 2002. ,
Predicate Privacy in Encryption Systems, 6th Theory of Cryptography Conference, 2009. ,
DOI : 10.1007/978-3-540-70583-3_46
URL : http://www2.parc.com/csl/members/eshi/docs/sympredenc.pdf
Multi-Dimensional Range Query over Encrypted Data, 2007 IEEE Symposium on Security and Privacy (SP '07), 2007. ,
DOI : 10.1109/SP.2007.29
URL : http://repository.cmu.edu/cgi/viewcontent.cgi?article=1014&context=ece
Practical techniques for searches on encrypted data, IEEE Symposium on Security and Privacy, 2000. ,
Efficient Isolation of Trusted Subsystems in Embedded Systems, p.SecureComm, 2010. ,
DOI : 10.1145/234215.234473
Maple, Proceedings of the 9th ACM symposium on Information, computer and communications security, ASIA CCS '14, 2014. ,
DOI : 10.1145/2590296.2590305
URL : https://hal.archives-ouvertes.fr/inria-00099637
Controlled-Channel Attacks: Deterministic Side Channels for Untrusted Operating Systems, 2015 IEEE Symposium on Security and Privacy, 2015. ,
DOI : 10.1109/SP.2015.45
FLUSH+RELOAD: A High Resolution, Low Noise, L3 Cache Side- Channel Attack, 23rd USENIX Security Symposium. USENIX Security, 2014. ,