ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2110.04180
  4. Cited By
IHOP: Improved Statistical Query Recovery against Searchable Symmetric
  Encryption through Quadratic Optimization
v1v2 (latest)

IHOP: Improved Statistical Query Recovery against Searchable Symmetric Encryption through Quadratic Optimization

8 October 2021
Simon Oya
Florian Kerschbaum
    AAML
ArXiv (abs)PDFHTML

Papers citing "IHOP: Improved Statistical Query Recovery against Searchable Symmetric Encryption through Quadratic Optimization"

7 / 7 papers shown
Title
Enhancing Leakage Attacks on Searchable Symmetric Encryption Using LLM-Based Synthetic Data Generation
Enhancing Leakage Attacks on Searchable Symmetric Encryption Using LLM-Based Synthetic Data Generation
Joshua Chiu
Partha Protim Paul
Zahin Wahab
AAML
61
0
0
29 Apr 2025
Revisiting the attacker's knowledge in inference attacks against Searchable Symmetric Encryption
Revisiting the attacker's knowledge in inference attacks against Searchable Symmetric Encryption
Marc Damie
Jean-Benoist Leger
Florian Hahn
Andreas Peter
AAML
93
1
0
14 Apr 2025
d-DSE: Distinct Dynamic Searchable Encryption Resisting Volume Leakage
  in Encrypted Databases
d-DSE: Distinct Dynamic Searchable Encryption Resisting Volume Leakage in Encrypted Databases
Dongli Liu
Wei Wang
Peng Xu
Laurence T. Yang
Bo Luo
Kaitai Liang
23
2
0
02 Mar 2024
Query Recovery from Easy to Hard: Jigsaw Attack against SSE
Query Recovery from Easy to Hard: Jigsaw Attack against SSE
Hao Nie
Wei Wang
Peng Xu
Xianglong Zhang
Laurence T. Yang
Kaitai Liang
AAML
32
5
0
02 Mar 2024
Leakage-Abuse Attacks Against Forward and Backward Private Searchable
  Symmetric Encryption
Leakage-Abuse Attacks Against Forward and Backward Private Searchable Symmetric Encryption
Lei Xu
Leqian Zheng
Chengzhi Xu
Lizhen Qu
Cong Wang
AAMLFedML
27
22
0
09 Sep 2023
SWAT: A System-Wide Approach to Tunable Leakage Mitigation in Encrypted
  Data Stores
SWAT: A System-Wide Approach to Tunable Leakage Mitigation in Encrypted Data Stores
Leqian Zheng
Lei Xu
Cong Wang
Sheng Wang
Yuke Hu
Zhan Qin
Feifei Li
Kui Ren
54
5
0
29 Jun 2023
Investigating Membership Inference Attacks under Data Dependencies
Investigating Membership Inference Attacks under Data Dependencies
Thomas Humphries
Simon Oya
Lindsey Tulloch
Matthew Rafuse
I. Goldberg
Urs Hengartner
Florian Kerschbaum
MIACVMIALM
102
36
0
23 Oct 2020
1