Open full page Download PDFDiscussion & RelatedCipher Maps: When Category Theory Meets Oblivious ComputingOctober 14, 2025 · 5 min readRethinking Encrypted Search: From Access Pattern Leakage to Information-Theoretic PrivacyOctober 14, 2025 · 4 min readDiscussion