1 |
R. Agrawal, Rakesh, J. Kiernan, R Srikant, and Y. Xu, "Order-Preserving Encryption for Numeric Data," proceedings of the 2004 ACM SIGMOD international conference on Management of data pp. 563-574, June 2004
|
2 |
A. Boldyreva, N. Chenette, Y. Lee, and A. O'Neill, "Order-preserving symmetric encryption," EUROCRYPT' 09, LNCS 5479, pp. 224-241, April 2009
|
3 |
R. Popa, F. Li, and N. Zeldovich, "An ideal-security protocol for order-preserving encoding," S&P'13, pp. 463-477, May 2013
|
4 |
F. Kerschbaum and A. Schroepfer, "Optimal average-complexity ideal-security order-preserving encryption," ACM CCS'14, pp. 275-286, Nov. 2014
|
5 |
N. Chenette, K. Lewi, Stephen A. Weis, and D. J. Wu, "Practical Order-Revealing Encryption with Limited Leakage," FSE'16, LNCS 9783, pp. 474-493, Mar. 2016
|
6 |
K. Lewi and D. J. Wu, "Order-Revealing Encryption: New Constructions, Applications, and Lower Bounds," ACM CCS'16, pp. 1167-1178, Oct. 2016
|
7 |
J. H. Cheon, K. Han, C. Lee, H. Ryu, and D. Stehle, "Cyptanalysis of the CLT13 MultiLinear Map", Journal of Cryptology, Vol. 32, Issue 2, pp. 547-565, April 2019
DOI
|
8 |
D. Boneh, K. Lewi, M. Raykova, A. Sahai, M. Zhandry, and J. Zimmerman, "Semantically Secure Order-Revealing Encryption: Multiinput Functional Encryption Without Obfuscation," EUROCRYPT'15, LNCS 9057, pp. 563-594, April 2015
|
9 |
E. Miles, A. Sahai, and M. Zhandry, "Annihilation Attacks for Multilinear Maps: Cryptanalysis of Indistinguishability Obfuscation over GGH13," CRYPTO'16, LNCS 9815, pp. 629-658, Aug. 2016
|