Login / Signup
Cryptanalysis of Encrypted Search with LEAKER - A framework for LEakage AttacK Evaluation on Real-world data.
Seny Kamara
Abdelkarim Kati
Tarik Moataz
Thomas Schneider
Amos Treiber
Michael Yonli
Published in:
IACR Cryptol. ePrint Arch. (2021)
Keyphrases
</>
search algorithm
search space
main contribution
interactive information retrieval
information retrieval
genetic algorithm
probabilistic model
theoretical framework
evaluation method
countermeasures
search efficiency