- Data Leakage from Encrypted Databases https://blog.cryptographyengineering.com/2019/02/11/attack-of-the-week-searchable-encryption-and-the-ever-expanding-leakage-function/ 3 comments programming
- Attack of the week: searchable encryption and the ever-expanding leakage function https://blog.cryptographyengineering.com/2019/02/11/attack-of-the-week-searchable-encryption-and-the-ever-expanding-leakage-function/ 7 comments crypto
Linking pages
Linked pages
- A very casual introduction to Fully Homomorphic Encryption – A Few Thoughts on Cryptographic Engineering https://blog.cryptographyengineering.com/2012/01/02/very-casual-introduction-to-fully/ 34 comments
- Order-Revealing Encryption | Stanford Applied Crypto Group https://crypto.stanford.edu/ore/ 20 comments
- https://www.usenix.org/system/files/1401_08-12_mickens.pdf 15 comments
- List of data breaches - Wikipedia https://en.wikipedia.org/wiki/List_of_data_breaches 13 comments
- Range query (database) - Wikipedia https://en.wikipedia.org/wiki/Range_query_(database) 0 comments
- Vapnik–Chervonenkis dimension - Wikipedia https://en.wikipedia.org/wiki/Vapnik%E2%80%93Chervonenkis_dimension 0 comments
Would you like to stay up to date with Computer science? Checkout Computer science
Weekly.