What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Tarik Moataz
Google Scholar
ORCID:
0009-0009-1175-4776
22
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/cic
Bayesian Leakage Analysis: A Framework for Analyzing Leakage in Cryptography.
Zachary Espiritu
Seny Kamara
Tarik Moataz
2025
conf/uss
PolySys: an Algebraic Leakage Attack Engine.
Zachary Espiritu
Seny Kamara
Tarik Moataz
Andrew Park
2024
journals/popets
MAPLE: MArkov Process Leakage attacks on Encrypted Search.
Seny Kamara
Abdelkarim Kati
Tarik Moataz
Jamie DeMaria
Andrew Park
Amos Treiber
2024
conf/asiacrypt
Concurrent Encrypted Multimaps.
Archita Agarwal
Seny Kamara
Tarik Moataz
2023
conf/asiacrypt
Injection-Secure Structured and Searchable Symmetric Encryption.
Ghous Amjad
Seny Kamara
Tarik Moataz
2022
conf/eurosp
SoK: Cryptanalysis of Encrypted Search with LEAKER - A framework for LEakage AttacK Evaluation on Real-world data.
Seny Kamara
Abdelkarim Kati
Tarik Moataz
Thomas Schneider
Amos Treiber
Michael Yonli
2021
conf/sp
A Decentralized and Encrypted National Gun Registry.
Seny Kamara
Tarik Moataz
Andrew Park
Lucy Qin
2021
conf/eurocrypt
Structured Encryption and Dynamic Leakage Suppression.
Marilyn George
Seny Kamara
Tarik Moataz
2020
conf/ndss
Revisiting Leakage Abuse Attacks.
Laura Blackstone
Seny Kamara
Tarik Moataz
2019
journals/popets
Breach-Resistant Structured Encryption.
Ghous Amjad
Seny Kamara
Tarik Moataz
2019
journals/popets
Encrypted Databases for Differential Privacy.
Archita Agarwal
Maurice Herlihy
Seny Kamara
Tarik Moataz
2019
conf/eurocrypt
Computationally Volume-Hiding Structured Encryption.
Seny Kamara
Tarik Moataz
2018
conf/crypto
Structured Encryption and Leakage Suppression.
Seny Kamara
Tarik Moataz
Olga Ohrimenko
2018
conf/asiacrypt
SQL on Structurally-Encrypted Databases.
Seny Kamara
Tarik Moataz
2017
conf/eurocrypt
Boolean Searchable Symmetric Encryption with Worst-Case Sub-linear Complexity.
Seny Kamara
Tarik Moataz
2016
conf/uss
OblivP2P: An Oblivious Peer-to-Peer Content Sharing System.
Yaoqi Jia
Tarik Moataz
Shruti Tople
Prateek Saxena
2015
journals/popets
Recursive Trees for Practical ORAM.
Tarik Moataz
Erik-Oliver Blass
Guevara Noubir
2015
conf/ccs
Constant Communication ORAM with Small Blocksize.
Tarik Moataz
Travis Mayberry
Erik-Oliver Blass
2015
conf/fc
Resizable Tree-Based Oblivious RAM.
Tarik Moataz
Travis Mayberry
Erik-Oliver Blass
Agnes Hui Chan
2013
conf/ccs
Boolean symmetric searchable encryption.
Tarik Moataz
Abdullatif Shikfa
2013
conf/fc
Searchable Encryption Supporting General Boolean Expression Queries.
Tarik Moataz
Abdullatif Shikfa
2012
conf/sec
Handling Stateful Firewall Anomalies.
Frédéric Cuppens
Nora Cuppens-Boulahia
Joaquín García-Alfaro
Tarik Moataz
Xavier Rimasson
Coauthors
Abdelkarim Kati
(2)
Abdullatif Shikfa
(2)
Agnes Hui Chan
(1)
Amos Treiber
(2)
Andrew Park
(3)
Archita Agarwal
(2)
Erik-Oliver Blass
(3)
Frédéric Cuppens
(1)
Ghous Amjad
(2)
Guevara Noubir
(1)
Jamie DeMaria
(1)
Joaquín García-Alfaro
(1)
Laura Blackstone
(1)
Lucy Qin
(1)
Marilyn George
(1)
Maurice Herlihy
(1)
Michael Yonli
(1)
Nora Cuppens-Boulahia
(1)
Olga Ohrimenko
(1)
Prateek Saxena
(1)
Seny Kamara
(15)
Shruti Tople
(1)
Tarik Moataz
(22)
Thomas Schneider
(1)
Travis Mayberry
(2)
Xavier Rimasson
(1)
Yaoqi Jia
(1)
Zachary Espiritu
(2)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to