1. Bosch, C., et al.: Distributed searchable symmetric encryption. In: Proceedings of the Twelfth Annual Conference on Privacy, Security and Trust (PST 2014). IEEE (2014)
2. Bost, R.: $$ {o} \phi o \varsigma $$-forward secure searchable encryption. In: Proceedings of the 23rd ACM SIGSAC Conference on Computer and Communications Security (CCS 2016), pp. 1143–1154. ACM (2016)
3. Bost, R., Fouque, P.A.: Thwarting leakage abuse attacks against searchable encryption a formal approach and applications to database padding. Cryptology ePrint Archive, Report 2017/1060 (2017). http://eprint.iacr.org/2017/1060/
4. Cash, D., Grubbs, P., Perry, J., Ristenpart, T.: Leakage-abuse attacks against searchable encryption. In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, pp. 668–679. ACM (2015)
5. Cash, D., et al.: Dynamic Searchable Encryption in Very Large Databases: Data Structures and Implementation. Cryptology ePrint Archive, Report 2014/853 (2014). http://eprint.iacr.org/2014/853