Quantitative notions of leakage for one-try attacks
From MaRDI portal
Publication:2805152
Recommendations
Cites work
- scientific article; zbMATH DE number 107482 (Why is no real title available?)
- Anonymity protocols as noisy channels
- Assessing security threats of looping constructs
- Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
- On the Foundations of Quantitative Information Flow
- Quantitative Information Flow, Relations and Polymorphic Types
Cited in
(20)- Hidden-Markov program algebra with iteration
- Asymptotic information leakage under one-try attacks
- A Unified Metric for Quantifying Information Leakage of Cryptographic Devices Under Power Analysis Attacks
- Generalized differential privacy: regions of priors that admit robust optimal mechanisms
- A primer on alpha-information theory with application to leakage in secrecy systems
- Information hiding in probabilistic concurrent systems
- Information theory and security: Quantitative information flow
- On the relation between differential privacy and quantitative information flow
- An algebraic approach for reasoning about information flow
- A better composition operator for quantitative information flow analyses
- Asymptotic information leakage under one-try attacks
- Searching secrets rationally
- On the Foundations of Quantitative Information Flow
- Analyzing anonymity attacks through noisy channels
- On the Additive Capacity Problem for Quantitative Information Flow
- Quantifying leakage in the presence of unreliable sources of information
- Quantitative information flow as safety and liveness hyperproperties
- Masking primal and dual models for data privacy in network revenue management
- Min-entropy as a resource
- Worst- and average-case privacy breaches in randomization mechanisms
This page was built for publication: Quantitative notions of leakage for one-try attacks
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2805152)