[go: up one dir, main page]

Follow
Marc Damie
Marc Damie
Inria / University of Twente
Verified email at inria.fr - Homepage
Title
Cited by
Cited by
Year
A highly accurate Query-Recovery attack against searchable encryption using Non-Indexed documents
M Damie, F Hahn, A Peter
30th USENIX security symposium (USENIX Security 21), 143-160, 2021
572021
Passive query-recovery attack against secure conjunctive keyword search schemes
M Dijkslag, M Damie, F Hahn, A Peter
International Conference on Applied Cryptography and Network Security, 126-146, 2022
62022
Revisiting the Attacker’s Knowledge in Inference Attacks Against Searchable Symmetric Encryption
M Damie, JB Leger, F Hahn, A Peter
International Conference on Applied Cryptography and Network Security, 370-399, 2025
3*2025
How to Securely Shuffle? A survey about Secure Shufflers for privacy-preserving computations
M Damie, F Hahn, A Peter, J Ramon
arXiv preprint arXiv:2507.01487, 2025
12025
Privacy-Preserving Computations on Sparse Data
M Damie
Université de Lille, 2025
2025
Secure Sparse Matrix Multiplications and their Applications to Privacy-Preserving Machine Learning
M Damie, F Hahn, A Peter, J Ramon
arXiv preprint arXiv:2510.14894, 2025
2025
Eliminating Exponential Key Growth in PRG-Based Distributed Point Functions
M Damie, F Hahn, A Peter, J Ramon
arXiv preprint arXiv:2509.22022, 2025
2025
Energy Consumption of TLS, Searchable Encryption and Fully Homomorphic Encryption
M Damie, M Pop, M Posthuma
arXiv preprint arXiv:2508.04583, 2025
2025
Evaluating Membership Inference Attacks in heterogeneous-data setups
B van Dartel, M Damie, F Hahn
International Conference on Applied Cryptography and Network Security, 109-117, 2025
2025
Fedivertex: a Graph Dataset based on Decentralized Social Networks for Trustworthy Machine Learning
M Damie, E Cyffers
arXiv preprint arXiv:2505.20882, 2025
2025
Noisy Function Secret Sharing and its applications to Differentially Private computations
M Damie, F Mazzone, F Hahn, A Peter, J Ramon
Cryptology ePrint Archive, 2025
2025
DDH-based schemes for multi-party Function Secret Sharing
M Damie, F Hahn, A Peter, J Ramon
Cryptology ePrint Archive, 2025
2025
The system can't perform the operation now. Try again later.
Articles 1–12