Response-Hiding Encrypted Ranges: Revisiting Security via Parametrized Leakage-Abuse Attacks | IEEE Conference Publication | IEEE Xplore