메뉴 건너뛰기




Volumn 207, Issue 6, 2009, Pages 699-725

Quantifying information leakage in process calculi

Author keywords

Information leakage; Information theory; Process calculi; Secrecy

Indexed keywords

AMOUNT OF INFORMATIONS; COMPOSITIONALITY; COMPUTATIONAL POWER; EXTRACTION COSTS; IN PROCESS; INFORMATION LEAKAGE; LEAKAGE RATES; PI CALCULUS; PROCESS CALCULI; QUANTITATIVE MODELS; SECRECY; SIMPLE INFORMATIONS; TESTING EQUIVALENCES;

EID: 67349145950     PISSN: 08905401     EISSN: 10902651     Source Type: Journal    
DOI: 10.1016/j.ic.2008.12.007     Document Type: Article
Times cited : (29)

References (35)
  • 1
    • 0003092378 scopus 로고    scopus 로고
    • A calculus for cryptographic protocols: the Spi-calculus
    • Abadi M., and Gordon A. A calculus for cryptographic protocols: the Spi-calculus. Information and Computation 148 1 (1999) 1-70
    • (1999) Information and Computation , vol.148 , Issue.1 , pp. 1-70
    • Abadi, M.1    Gordon, A.2
  • 2
    • 3042529082 scopus 로고    scopus 로고
    • A process-algebraic approach for the analysis of probabilistic non-interference
    • IOS Press, March
    • Aldini A., Bravetti M., and Gorrieri R. A process-algebraic approach for the analysis of probabilistic non-interference. Journal of Computer Security 12 2 (2004) 191-245 IOS Press, March
    • (2004) Journal of Computer Security , vol.12 , Issue.2 , pp. 191-245
    • Aldini, A.1    Bravetti, M.2    Gorrieri, R.3
  • 3
    • 67349216495 scopus 로고    scopus 로고
    • E. Bach, et al., What's a key-guessing attack? What's entropy? in: Cryptography Frequently Asked Questions, Section 4.9. Avaliable from: .
    • E. Bach, et al., What's a key-guessing attack? What's entropy? in: Cryptography Frequently Asked Questions, Section 4.9. Avaliable from: .
  • 4
    • 33746371722 scopus 로고    scopus 로고
    • Quantifying information leakage in process calculi
    • ICALP, Springer
    • M. Boreale, Quantifying information leakage in process calculi, in: ICALP 2006, LNCS, vol. 4052, Springer, 2006.
    • (2006) LNCS , vol.4052
    • Boreale, M.1
  • 5
    • 0000036723 scopus 로고
    • Testing equivalence for mobile processes
    • Boreale M., and De Nicola R. Testing equivalence for mobile processes. Information and Computation 120 2 (1995) 279-303
    • (1995) Information and Computation , vol.120 , Issue.2 , pp. 279-303
    • Boreale, M.1    De Nicola, R.2
  • 6
    • 0002953320 scopus 로고    scopus 로고
    • A symbolic semantics for the pi-calculus
    • Boreale M., and De Nicola R. A symbolic semantics for the pi-calculus. Information and Computation 126 1 (1996) 34-52
    • (1996) Information and Computation , vol.126 , Issue.1 , pp. 34-52
    • Boreale, M.1    De Nicola, R.2
  • 7
    • 47249145678 scopus 로고    scopus 로고
    • Compositional methods for information-hiding
    • Proceedings of FOSSACS'08, Springer
    • C. Braun, K. Chatzikokolakis, C. Palamidessi, Compositional methods for information-hiding, in: Proceedings of FOSSACS'08, LNCS, vol. 4962, Springer, 2008.
    • (2008) LNCS , vol.4962
    • Braun, C.1    Chatzikokolakis, K.2    Palamidessi, C.3
  • 8
    • 35048848903 scopus 로고    scopus 로고
    • Anonymity protocols as noisy channels
    • Proceedings of the 2nd Symposium on Trustworthy Global Computing TGC 06, Springer, Full version in Information and Computation
    • K. Chatzikokolakis, C. Palamidessi, P. Panangaden, Anonymity protocols as noisy channels, in: Proceedings of the 2nd Symposium on Trustworthy Global Computing (TGC 06), Springer, LNCS, 2006, Full version in Information and Computation, 206 (2008), 378-401.
    • (2006) LNCS , vol.206 , pp. 378-401
    • Chatzikokolakis, K.1    Palamidessi, C.2    Panangaden, P.3
  • 11
    • 20844445346 scopus 로고    scopus 로고
    • Quantitative information flow, relations and polymorphic types
    • Clark D., Hunt S., and Malacaria P. Quantitative information flow, relations and polymorphic types. Journal of Logic and Computation 15 2 (2005) 181-199
    • (2005) Journal of Logic and Computation , vol.15 , Issue.2 , pp. 181-199
    • Clark, D.1    Hunt, S.2    Malacaria, P.3
  • 12
    • 34249899908 scopus 로고    scopus 로고
    • A static analysis for quantifying information flow in a simple imperative language
    • Clark D., Hunt S., and Malacaria P. A static analysis for quantifying information flow in a simple imperative language. Journal of Computer Security 15 3 (2007) 321-371
    • (2007) Journal of Computer Security , vol.15 , Issue.3 , pp. 321-371
    • Clark, D.1    Hunt, S.2    Malacaria, P.3
  • 20
    • 84943632039 scopus 로고    scopus 로고
    • P. Kocher, Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems, in: CRYPTO 1996, 1996, pp. 104-113.
    • P. Kocher, Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems, in: CRYPTO 1996, 1996, pp. 104-113.
  • 21
    • 84939573910 scopus 로고    scopus 로고
    • P. Kocher, J. Jaffe, B. Jun, Differential power analysis, in: CRYPTO 1999, 1999, pp. 388-397.
    • P. Kocher, J. Jaffe, B. Jun, Differential power analysis, in: CRYPTO 1999, 1999, pp. 388-397.
  • 23
    • 3042651614 scopus 로고    scopus 로고
    • Defining information flow quantity
    • Lowe G. Defining information flow quantity. Journal of Computer Security 12 3-4 (2004) 619-653
    • (2004) Journal of Computer Security , vol.12 , Issue.3-4 , pp. 619-653
    • Lowe, G.1
  • 24
    • 34548282543 scopus 로고    scopus 로고
    • Assessing security threats of looping constructs
    • P. Malacaria, Assessing security threats of looping constructs, in: POPL 2007.
    • (2007) POPL
    • Malacaria, P.1
  • 27
    • 84947756322 scopus 로고    scopus 로고
    • On the incomparability of entropy and marginal guesswork in Brute-force attacks
    • Proceedings of Progress in Cryptology, INDOCRYPT 2000, First International Conference in Cryptology in India, Calcutta, India, December, Springer-Verlag
    • J.O. Pliam, On the incomparability of entropy and marginal guesswork in Brute-force attacks, in: Proceedings of Progress in Cryptology - INDOCRYPT 2000, First International Conference in Cryptology in India, Calcutta, India, December 2000, LNCS, vol. 1977, Springer-Verlag.
    • (2000) LNCS , vol.1977
    • Pliam, J.O.1
  • 30
    • 84940644968 scopus 로고
    • Communication theory of secrecy systems
    • 623-656
    • Shannon C.E. Communication theory of secrecy systems. Bell System Technical Journal 27 (1948) 379-423 623-656
    • (1948) Bell System Technical Journal , vol.27 , pp. 379-423
    • Shannon, C.E.1
  • 31
    • 33750693916 scopus 로고    scopus 로고
    • Towards security limits in side-channel attacks
    • Proceedings of CHES, Yokohama, Japan, October, Springer-Verlag, pp
    • F.-X. Standaert, E. Peeters, C. Archambeau, J.-J. Quisquater, Towards security limits in side-channel attacks, in: Proceedings of CHES 2006, Lecture Notes in Computer Science, vol. 4249, Yokohama, Japan, October 2006, Springer-Verlag, pp. 30-45.
    • (2006) Lecture Notes in Computer Science , vol.4249 , pp. 30-45
    • Standaert, F.-X.1    Peeters, E.2    Archambeau, C.3    Quisquater, J.-J.4
  • 32
    • 51049120837 scopus 로고    scopus 로고
    • A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks, Cryptology ePrint Archive
    • Report 2006/139, February
    • F.-X. Standaert, T.G. Malkin, M. Yung, A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks, Cryptology ePrint Archive, Report 2006/139, February 2008.
    • (2008)
    • Standaert, F.-X.1    Malkin, T.G.2    Yung, M.3
  • 33
    • 3242812760 scopus 로고    scopus 로고
    • Basic concepts, identities and inequalities - the Toolkit of information theory
    • Available from
    • F. Topsøe, Basic concepts, identities and inequalities - the Toolkit of information theory, Entropy 3 (2001) 162-190. Available from: .
    • (2001) Entropy , vol.3 , pp. 162-190
    • Topsøe, F.1
  • 34
    • 0033705210 scopus 로고    scopus 로고
    • D. Volpano, G. Smith, Verifying secrets and relative secrecy, in: POPL 2000, 2000, pp. 268-276.
    • D. Volpano, G. Smith, Verifying secrets and relative secrecy, in: POPL 2000, 2000, pp. 268-276.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.