publications

2025

  1. Bayesian Leakage Analysis: A Framework for Analyzing Leakage in Encrypted Search
    Zachary Espiritu, Seny Kamara, and Tarik Moataz
    IACR Communications in Cryptology (CiC), 2025

2024

  1. MAPLE: MArkov Process Leakage attacks on Encrypted Search
    Seny Kamara, Abdelkarim Kati, Tarik Moataz, Jamie DeMaria, Andrew Park, and Amos Treiber
    In PETS, 2024
  2. Concurrent Encrypted Multimaps
    Archita Agarwal, Seny Kamara, and Tarik Moataz
    In Asiacrypt, 2024
  3. Updatable Private Set Intersection from Structured Encryption
    Archita Agarwal, David Cash, Marilyn George, Seny Kamara, Tarik Moataz, and Jaspal Singh
    IACR Cryptol. ePrint Arch., 2024
  4. Subliminal Encrypted Multi-Maps and Black-Box Leakage Absorption
    Amine Bahi, Seny Kamara, Tarik Moataz, and Guevara Noubir
    IACR Cryptol. ePrint Arch., 2024

2023

  1. Injection-Secure Structured and Searchable Symmetric Encryption
    Ghous Amjad, Seny Kamara, and Tarik Moataz
    In Asiacrypt, 2023

2022

  1. SoK: Cryptanalysis of Encrypted Search with LEAKER - A framework for LEakage AttacK Evaluation on Real-world data
    Seny Kamara, Abdelkarim Kati, Tarik Moataz, Thomas Schneider, Amos Treiber, and Michael Yonli
    In IEEE EuroS&P, 2022

2021

  1. Encrypted Databases: From Theory to Systems
    Zheguang Zhao, Seny Kamara, Tarik Moataz, and Stan Zdonik
    In CIDR, 2021
  2. Structured Encryption and Dynamic Leakage Suppression
    Marilyn George, Seny Kamara, and Tarik Moataz
    In Eurocrypt, 2021
  3. A Decentralized and Encrypted National Gun Registry
    Seny Kamara, Tarik Moataz, Andrew Park, and Lucy Qin
    In IEEE S&P, 2021

2020

  1. Encrypted Blockchain Databases
    Daniel Adkins, Archita Agarwal, Seny Kamara, and Tarik Moataz
    In AFT, 2020
  2. Revisiting Leakage Abuse Attacks
    Laura Blackstone, Seny Kamara, and Tarik Moataz
    In NDSS, 2020
  3. Robust P2P Primitives Using SGX Enclaves
    Yaoqi Jia, Shruti Tople, Tarik Moataz, Deli Gong, Prateek Saxena, and Zhenkai Liang
    In RAID, 2020
  4. An Optimal Relational Database Encryption Scheme
    Seny Kamara, Tarik Moataz, Stan Zdonik, and Zheguang Zhao
    IACR Cryptol. ePrint Arch., 2020

2019

  1. Breach-Resistant Structured Encryption
    Ghous Amjad, Seny Kamara, and Tarik Moataz
    In PETS, 2019
  2. Encrypted Databases for Differential Privacy
    Archita Agarwal, Maurice Herlihy, Seny Kamara, and Tarik Moataz
    In PETS, 2019
  3. Computationally Volume-Hiding Structured Encryption
    Seny Kamara, and Tarik Moataz
    In Eurocrypt, 2019
  4. Forward and Backward Private Searchable Encryption with SGX
    Ghous Amjad, Seny Kamara, and Tarik Moataz
    In EuroSec, 2019

2018

  1. Substring search over encrypted data
    Tarik Moataz, Indrajit Ray, Indrakshi Ray, Abdullatif Shikfa, Frédéric Cuppens, and Nora Cuppens
    J. Comput. Secur., 2018
  2. SQL on Structurally-Encrypted Databases
    Seny Kamara, and Tarik Moataz
    In Asiacrypt, 2018
  3. Structured Encryption and Leakage Suppression
    Seny Kamara, Tarik Moataz, and Olga Ohrimenko
    In CRYPTO, 2018

2017

  1. Boolean Searchable Symmetric Encryption with Worst-Case Sub-linear Complexity
    Seny Kamara, and Tarik Moataz
    In Eurocrypt, 2017

2016

  1. OblivP2P: An Oblivious Peer-to-Peer Content Sharing System
    Yaoqi Jia, Tarik Moataz, Shruti Tople, and Prateek Saxena
    In Usenix, 2016

2015

  1. Recursive Trees for Practical ORAM
    Tarik Moataz, Erik-Oliver Blass, and Guevara Noubir
    In PETS, 2015
  2. Constant Communication ORAM with Small Blocksize
    Tarik Moataz, Travis Mayberry, and Erik-Oliver Blass
    In CCS, 2015
  3. Privacy Preserving Record Matching Using Automated Semi-trusted Broker
    Ibrahim Lazrig, Tarik Moataz, Indrajit Ray, Indrakshi Ray, Toan Ong, Michael G. Kahn, Frédéric Cuppens, and Nora Cuppens-Boulahia
    In DBSec, 2015
  4. Resizable Tree-Based Oblivious RAM
    Tarik Moataz, Travis Mayberry, Erik-Oliver Blass, and Agnes Hui Chan
    In Financial Cryptography, 2015
  5. Oblivious Substring Search with Updates
    Tarik Moataz, and Erik-Oliver Blass
    IACR Cryptol. ePrint Arch., 2015

2014

  1. Privacy-Preserving Multiple Keyword Search on Outsourced Data in the Clouds
    Tarik Moataz, Benjamin Justus, Indrakshi Ray, Nora Cuppens-Boulahia, Frédéric Cuppens, and Indrajit Ray
    In DBSec, 2014
  2. ELITE: zEro Links Identity managemenT systEm
    Tarik Moataz, Nora Cuppens-Boulahia, Frédéric Cuppens, Indrajit Ray, and Indrakshi Ray
    In DBSec, 2014

2013

  1. Boolean Symmetric Searchable Encryption
    Tarik Moataz, and Abdullatif Shikfa
    In AsiaCCS, 2013
  2. Semantic search over encrypted data
    Tarik Moataz, Abdullatif Shikfa, Nora Cuppens-Boulahia, and Frédéric Cuppens
    In ICT, 2013

2012

  1. Handling Stateful Firewall Anomalies
    Frédéric Cuppens, Nora Cuppens-Boulahia, Joaquı́n Garcı́a-Alfaro, Tarik Moataz, and Xavier Rimasson
    In SEC, 2012