-
1
-
-
57049126579
-
Formally Bounding the Side-Channel Leakage in Unknown-Message Attacks
-
Jajodia, S., Lopez, J. (eds.) ESORICS 2008. Springer, Heidelberg
-
Backes, M., Köpf, B.: Formally Bounding the Side-Channel Leakage in Unknown-Message Attacks. In: Jajodia, S., Lopez, J. (eds.) ESORICS 2008. LNCS, vol. 5283, pp. 517-532. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5283
, pp. 517-532
-
-
Backes, M.1
Köpf, B.2
-
2
-
-
54249100086
-
The Complexity of Distinguishing Distributions (Invited Talk)
-
Safavi-Naini, R. (ed.) ICITS 2008. Springer, Heidelberg
-
Baignères, T., Vaudenay, S.: The Complexity of Distinguishing Distributions (Invited Talk). In: Safavi-Naini, R. (ed.) ICITS 2008. LNCS, vol. 5155, pp. 210-222. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5155
, pp. 210-222
-
-
Baignères, T.1
Vaudenay, S.2
-
3
-
-
78649453243
-
Quantifying Opacity
-
IEEE Society, Los Alamitos
-
Bérard, B., Mullins, J., Sassolas, M.: Quantifying Opacity. In: Proc. of QEST 2010, pp. 263-272. IEEE Society, Los Alamitos (2010)
-
(2010)
Proc. of QEST 2010
, pp. 263-272
-
-
Bérard, B.1
Mullins, J.2
Sassolas, M.3
-
4
-
-
67349145950
-
Quantifying information leakage in process calculi
-
Boreale, M.: Quantifying information leakage in process calculi. Information and Computation 207(6), 699-725 (2009)
-
(2009)
Information and Computation
, vol.207
, Issue.6
, pp. 699-725
-
-
Boreale, M.1
-
5
-
-
79953166100
-
Asymptotic information leakage under one-try attacks
-
Hofmann, M. (ed.) FOSSACS 2011. Springer, Heidelberg
-
Boreale, M., Pampaloni, F., Paolini, M.: Asymptotic information leakage under one-try attacks. In: Hofmann, M. (ed.) FOSSACS 2011. LNCS, vol. 6604, pp. 396-410. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.6604
, pp. 396-410
-
-
Boreale, M.1
Pampaloni, F.2
Paolini, M.3
-
6
-
-
47249145678
-
Compositional Methods for Information-Hiding
-
Amadio, R.M. (ed.) FOSSACS 2008. Springer, Heidelberg
-
Braun, C., Chatzikokolakis, K., Palamidessi, C.: Compositional Methods for Information-Hiding. In: Amadio, R.M. (ed.) FOSSACS 2008. LNCS, vol. 4962, pp. 443-457. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.4962
, pp. 443-457
-
-
Braun, C.1
Chatzikokolakis, K.2
Palamidessi, C.3
-
7
-
-
68549126859
-
Quantitative Notions of Leakage for Onetry Attacks
-
Proc. of MFPS 2009
-
Braun, C., Chatzikokolakis, K., Palamidessi, C.: Quantitative Notions of Leakage for Onetry Attacks. In: Proc. of MFPS 2009. Electr. Notes Theor. Comput. Sci, vol. 249, pp. 75-91 (2009)
-
(2009)
Electr. Notes Theor. Comput. Sci
, vol.249
, pp. 75-91
-
-
Braun, C.1
Chatzikokolakis, K.2
Palamidessi, C.3
-
8
-
-
40149107259
-
Anonymity protocols as noisy channels
-
Chatzikokolakis, K., Palamidessi, C., Panangaden, P.: Anonymity protocols as noisy channels. Information and Computation 206(2-4), 378-401 (2008)
-
(2008)
Information and Computation
, vol.206
, Issue.2-4
, pp. 378-401
-
-
Chatzikokolakis, K.1
Palamidessi, C.2
Panangaden, P.3
-
9
-
-
54349091549
-
On the Bayes risk in informationhiding protocols
-
Chatzikokolakis, K., Palamidessi, C., Panangaden, P.: On the Bayes risk in informationhiding protocols. Journal of Computer Security 16(5), 531-571 (2008)
-
(2008)
Journal of Computer Security
, vol.16
, Issue.5
, pp. 531-571
-
-
Chatzikokolakis, K.1
Palamidessi, C.2
Panangaden, P.3
-
10
-
-
0019532104
-
Untraceable electronic mail, return address, and digital pseudonyms
-
Chaum, D.: Untraceable electronic mail, return address, and digital pseudonyms. Communications of the ACM 24(2) (1981)
-
(1981)
Communications of the ACM
, vol.24
, Issue.2
-
-
Chaum, D.1
-
11
-
-
0345275464
-
Quantitative Analysis of the Leakage of Confidential Data
-
Clark, D., Hunt, S., Malacaria, P.: Quantitative Analysis of the Leakage of Confidential Data. Electr. Notes Theor. Comput. Sci. 59(3) (2001)
-
(2001)
Electr. Notes Theor. Comput. Sci.
, vol.59
, Issue.3
-
-
Clark, D.1
Hunt, S.2
Malacaria, P.3
-
14
-
-
84943632039
-
Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems
-
Koblitz, N. (ed.) CRYPTO 1996. Springer, Heidelberg
-
Kocher, P.C.: Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 104-113. Springer, Heidelberg (1996)
-
(1996)
LNCS
, vol.1109
, pp. 104-113
-
-
Kocher, P.C.1
-
16
-
-
70350561721
-
A Provably Secure and Efficient Countermeasure against Timing Attacks
-
Köpf, B., Dürmuth, M.: A Provably Secure and Efficient Countermeasure against Timing Attacks. In: CSF 2009, pp. 324-335 (2009)
-
(2009)
CSF 2009
, pp. 324-335
-
-
Köpf, B.1
Dürmuth, M.2
-
17
-
-
77957606219
-
Vulnerability Bounds and Leakage Resilience of Blinded Cryptography under Timing Attacks
-
Köpf, B., Smith, G.: Vulnerability Bounds and Leakage Resilience of Blinded Cryptography under Timing Attacks. In: CSF 2010, pp. 44-56 (2010)
-
(2010)
CSF 2010
, pp. 44-56
-
-
Köpf, B.1
Smith, G.2
-
19
-
-
50249142450
-
Robust De-anonymization of Large Sparse Datasets
-
IEEE Computer Society, Los Alamitos
-
Narayanan, A., Shmatikov, V.: Robust De-anonymization of Large Sparse Datasets. In: IEEE Symposium on Security and Privacy 2008, pp. 111-125. IEEE Computer Society, Los Alamitos (2008)
-
(2008)
IEEE Symposium on Security and Privacy 2008
, pp. 111-125
-
-
Narayanan, A.1
Shmatikov, V.2
-
20
-
-
85165841617
-
-
Personal communication
-
Shmatikov, V.: Personal communication (2011)
-
(2011)
-
-
Shmatikov, V.1
-
21
-
-
68549087948
-
On the Foundations of Quantitative Information Flow
-
de Alfaro, L. (ed.) FOSSACS 2009. Springer, Heidelberg
-
Smith, G.: On the Foundations of Quantitative Information Flow. In: de Alfaro, L. (ed.) FOSSACS 2009. LNCS, vol. 5504, pp. 288-302. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5504
, pp. 288-302
-
-
Smith, G.1
|