This repository contains my implementation of the IKK attack as proposed by Islam et al. in their paper 'Access Pattern disclosure on Searchable Encryption: Ramification, Attack and Mitigation'. I used this code for my graduation thesis at the University of Twente for the Cyber Security Master program (part of the Computer Science Master).
-
Updated
Dec 8, 2022