R. Agrawal, J. Kiernan, R. Srikant, and Y. Xu, Order preserving encryption for numeric data, Proceedings of the 2004 ACM SIGMOD international conference on Management of data , SIGMOD '04, 2004.
DOI : 10.1145/1007568.1007632

URL : http://rakesh.agrawal-family.com/papers/sigmod04opes.pdf

I. Anati, S. Gueron, S. P. Johnson, and V. R. Scarlata, Innovative Technology for CPU Based Attestation and Sealing, Workshop on Hardware and Architectural Support for Security and Privacy, 2013.

S. Bajaj and R. Sion, TrustedDB, Proceedings of the 2011 international conference on Management of data, SIGMOD '11, 2014.
DOI : 10.1145/1989323.1989346

A. Baumann, M. Peinado, and G. Hunt, Shielding Applications from an Untrusted Cloud with Haven, 11th USENIX Symposium on Operating Systems Design and Implementation. OSDI, 2014.
DOI : 10.1145/1519065.1519076

M. Bellare, A. Boldyreva, and A. Neill, Deterministic and Efficiently Searchable Encryption, 27th International Conference on Advances in Cryptology. CRYPTO, 2007.
DOI : 10.1007/978-3-540-74143-5_30

URL : https://link.springer.com/content/pdf/10.1007%2F978-3-540-74143-5_30.pdf

D. J. Bernstein, T. Lange, and P. Schwabe, The Security Impact of a New Cryptographic Library, 2nd International Conference on Cryptology and Information Security in Latin America. LATINCRYPT, 2012.
DOI : 10.1007/978-3-642-33481-8_9

A. Boldyreva, N. Chenette, Y. Lee, and A. Neill, Order-Preserving Symmetric Encryption, 28th International Conference on Advances in Cryptology. EUROCRYPT, 2009.
DOI : 10.1109/TMC.2006.144

URL : http://www.cc.gatech.edu/~aboldyre/papers/bclo.pdf

A. Boldyreva, N. Chenette, and A. Neill, Order-Preserving Encryption Revisited: Improved Security Analysis and Alternative Solutions, 31st International Conference on Advances in Cryptology. CRYPTO, 2011.
DOI : 10.1007/978-3-642-22792-9_33

URL : http://www.cc.gatech.edu/%7Eaboldyre/papers/operev.pdf

D. Boneh, A. Sahai, and B. Waters, Functional Encryption: Definitions and Challenges, 8th Conference on Theory of Cryptography. TCC, 2011.
DOI : 10.1007/978-3-642-19571-6_16

D. Boneh and B. Waters, Conjunctive, Subset, and Range Queries on Encrypted Data, 4th Theory of Cryptography Conference, 2007.
DOI : 10.1007/978-3-540-70936-7_29

F. Brasser, B. Mahjoub, P. Koeberl, A. R. Sadeghi, and C. Wachsmann, TyTAN, Proceedings of the 52nd Annual Design Automation Conference on, DAC '15, 2015.
DOI : 10.1145/1456455.1456460

B. B. Brumley and N. Tuveri, Remote Timing Attacks Are Still Practical, ESORICS, vol.6, 2011.
DOI : 10.1007/BF02579403

URL : http://eprint.iacr.org/2011/232.pdf

D. Cash, S. Jarecki, C. Jutla, H. Krawczyk, M. C. Ro¸suro¸su et al., Highly-Scalable Searchable Symmetric Encryption with Support for Boolean Queries, 33rd International Conference on Advances in Cryptology. CRYPTO, 2013.
DOI : 10.1007/978-3-642-40041-4_20

R. Curtmola, J. Garay, S. Kamara, and R. Ostrovsky, Searchable symmetric encryption, Proceedings of the 13th ACM conference on Computer and communications security , CCS '06, 2006.
DOI : 10.1145/1180405.1180417

I. Demertzis, S. Papadopoulos, O. Papapetrou, A. Deligiannakis, and M. Garofalakis, Practical Private Range Search Revisited, Proceedings of the 2016 International Conference on Management of Data, SIGMOD '16, 2016.
DOI : 10.1007/978-3-642-15546-8_7

F. B. Durak, T. M. Dubuisson, and D. Cash, What Else is Revealed by Order-Revealing Encryption?, Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, CCS'16, 2016.
DOI : 10.1109/SP.2013.38

S. Faber, S. Jarecki, H. Krawczyk, Q. Nguyen, M. Rosu et al., Rich Queries on Encrypted Data: Beyond Exact Matches, 20th European Symposium on Research in Computer Security, 2015.
DOI : 10.1145/2723872.2723877

S. Garg, P. Mohassel, and C. Papamanthou, TWORAM: Efficient Oblivious RAM in Two Rounds with Applications to Searchable Encryption, 36th Cryptology Conference, 2016.
DOI : 10.1145/2382196.2382229

D. Genkin, I. Pipman, and E. Tromer, Get your hands off my laptop: physical side-channel key-extraction attacks on PCs, Journal of Cryptographic Engineering, 2015.
DOI : 10.1007/s13389-015-0100-7

C. Gentry, Fully homomorphic encryption using ideal lattices, Proceedings of the 41st annual ACM symposium on Symposium on theory of computing, STOC '09, 2009.
DOI : 10.1145/1536414.1536440

C. Gentry, S. Halevi, and N. P. Smart, Homomorphic Evaluation of the AES Circuit, 32nd International Conference on Advances in Cryptology. CRYPTO, 2012.
DOI : 10.1007/978-3-642-32009-5_49

P. Grubbs, K. Sekniqi, V. Bindschaedler, M. Naveed, and T. Ristenpart, Leakage-Abuse Attacks against Order-Revealing Encryption, 2017 IEEE Symposium on Security and Privacy (SP), p.895
DOI : 10.1109/SP.2017.44

F. Kerschbaum and A. Schröpfer, Optimal Average-Complexity Ideal-Security Order-Preserving Encryption, Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, CCS '14, 2014.
DOI : 10.1145/765568.765571

Y. Lu, Privacy-preserving logarithmic-time search on encrypted data in cloud, 19th Network and Distributed System Security Symposium. NDSS, 2012.

U. Maheshwari, R. Vingralek, and W. Shapiro, How to Build a Trusted Database System on Untrusted Storage, 4th Conference on Symposium on Operating System Design & Implementation . OSDI, 2000.

F. Mckeen, I. Alexandrovich, A. Berenzon, C. V. Rozas, H. Shafi et al., Innovative instructions and software model for isolated execution, Proceedings of the 2nd International Workshop on Hardware and Architectural Support for Security and Privacy, HASP '13, 2013.
DOI : 10.1145/2487726.2488368

K. Mowery, S. Keelveedhi, and H. Shacham, Are AES x86 cache timing attacks still feasible?, Proceedings of the 2012 ACM Workshop on Cloud computing security workshop, CCSW '12, 2012.
DOI : 10.1145/2381913.2381917

URL : http://www.cs.ucsd.edu/%7Ekmowery/papers/aes-cache-timing.pdf

M. Naveed, The fallacy of composition of oblivious RAM and searchable encryption, p.668

M. Naveed, S. Kamara, and C. V. Wright, Inference Attacks on Property-Preserving Encrypted Databases, Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, CCS '15, 2015.
DOI : 10.1007/11863908_29

O. Ohrimenko, F. Schuster, C. Fournet, A. Meht, S. Nowozin et al., Oblivious Multi-Party Machine Learning on Trusted Processors, 25th USENIX Security Symposium. USENIX Security, 2016.

R. A. Popa, C. M. Redfield, N. Zeldovich, and H. Balakrishnan, CryptDB, Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles, SOSP '11, 2011.
DOI : 10.1145/2043556.2043566

URL : http://dspace.mit.edu/bitstream/1721.1/74107/1/cryptdb-sosp11.pdf

R. Ramakrishnan and J. Gehrke, Database Management Systems, 2002.

E. Shen, E. Shi, and B. Waters, Predicate Privacy in Encryption Systems, 6th Theory of Cryptography Conference, 2009.
DOI : 10.1007/978-3-540-70583-3_46

URL : http://www2.parc.com/csl/members/eshi/docs/sympredenc.pdf

E. Shi, J. Bethencourt, H. T. Chan, D. X. Song, and A. Perrig, Multi-Dimensional Range Query over Encrypted Data, 2007 IEEE Symposium on Security and Privacy (SP '07), 2007.
DOI : 10.1109/SP.2007.29

URL : http://repository.cmu.edu/cgi/viewcontent.cgi?article=1014&context=ece

D. X. Song, D. Wagner, and A. Perrig, Practical techniques for searches on encrypted data, IEEE Symposium on Security and Privacy, 2000.

R. Strackx, F. Piessens, and B. Preneel, Efficient Isolation of Trusted Subsystems in Embedded Systems, p.SecureComm, 2010.
DOI : 10.1145/234215.234473

B. Wang, Y. Hou, M. Li, H. Wang, and H. Li, Maple, Proceedings of the 9th ACM symposium on Information, computer and communications security, ASIA CCS '14, 2014.
DOI : 10.1145/2590296.2590305

URL : https://hal.archives-ouvertes.fr/inria-00099637

Y. Xu, W. Cui, and M. Peinado, Controlled-Channel Attacks: Deterministic Side Channels for Untrusted Operating Systems, 2015 IEEE Symposium on Security and Privacy, 2015.
DOI : 10.1109/SP.2015.45

Y. Yarom and K. Falkner, FLUSH+RELOAD: A High Resolution, Low Noise, L3 Cache Side- Channel Attack, 23rd USENIX Security Symposium. USENIX Security, 2014.