1. Breach-Resistant Structured Encryption
2. Searchable symmetric encryption: optimal locality in linear space via two-dimensional balanced allocations
3. Tight Tradeoffs in Searchable Symmetric Encryption
4. Laura Blackstore , Seny Kamara , and Tarik Moataz . 2020 . Revisiting Leakage Abuse Attacks. In Network and Distributed System Security Symposium, NDSS 2020 .% The Internet Society. Laura Blackstore, Seny Kamara, and Tarik Moataz. 2020. Revisiting Leakage Abuse Attacks. In Network and Distributed System Security Symposium, NDSS 2020 .% The Internet Society.
5. Raphael Bost . 2016 . Σovarphiovarsigma$: Forward Secure Searchable Encryption . In ACM SIGSAC Conference on Computer and Communications Security, CCS 2016 . ACM, 1143--1154 . Raphael Bost. 2016. Σovarphiovarsigma$: Forward Secure Searchable Encryption. In ACM SIGSAC Conference on Computer and Communications Security, CCS 2016 . ACM, 1143--1154.