Login / Signup
Leakage-Abuse Attacks against Order-Revealing Encryption.
Paul Grubbs
Kevin Sekniqi
Vincent Bindschaedler
Muhammad Naveed
Thomas Ristenpart
Published in:
IACR Cryptol. ePrint Arch. (2016)
Keyphrases
</>
data sets
copyright protection