To speak about the security of information flow in programs employing cryptographic operations, definitions based on computational indistinguishability of distributions over program states have to be used. These definitions, as well as the accompanying analysis tools, are complex and error-prone to argue about. Cryptographically masked flows, proposed by Askarov, Hedin and Sabelfeld, are an abstract execution model and security definition that attempt to model is useful because analysis of programs can be conducted using the usual techniques for enforcing non-interference. model is computationally sound, i.e. when does the security of a program in their model imply the computational security of this program. This paper spells out a reasonab...
Abstract—Software obfuscation of programs, with the goal of protecting against attackers having phys...
Polynomial time adversaries based on a computational view of cryptography have additional capabilit...
Formalization and modeling are important topics in cryptography. They are crucial for precisely def...
Cryptographic operations are essential for many security-critical systems. Reasoning about informati...
AbstractCryptographic operations are essential for many security-critical systems. Reasoning about i...
Information flow policies are widely used for specifying confidentiality and integrity requirements ...
Despite the variety of tools and techniques deployed in order to protect sensitive data, ranging fro...
Abstract: The main problem in designing effective code obfuscation is to guarantee security. State o...
We present a novel approach for proving secrecy properties of security protocols by mechanized flow ...
Type systems for secure information flow aim to prevent a program from leaking information from H (h...
International audienceSince the 1980s, two approaches have been developed for analyzing security pro...
We give a formal definition of the notion of information flow for a simple guarded command language....
Classical quantitative information flow analysis often considers a system as an information-theoreti...
We develop a theory of information flow that differs from Nondeducibility’s, which we see is really ...
International audienceCode-based game-playing is a popular methodology for proving security of crypt...
Abstract—Software obfuscation of programs, with the goal of protecting against attackers having phys...
Polynomial time adversaries based on a computational view of cryptography have additional capabilit...
Formalization and modeling are important topics in cryptography. They are crucial for precisely def...
Cryptographic operations are essential for many security-critical systems. Reasoning about informati...
AbstractCryptographic operations are essential for many security-critical systems. Reasoning about i...
Information flow policies are widely used for specifying confidentiality and integrity requirements ...
Despite the variety of tools and techniques deployed in order to protect sensitive data, ranging fro...
Abstract: The main problem in designing effective code obfuscation is to guarantee security. State o...
We present a novel approach for proving secrecy properties of security protocols by mechanized flow ...
Type systems for secure information flow aim to prevent a program from leaking information from H (h...
International audienceSince the 1980s, two approaches have been developed for analyzing security pro...
We give a formal definition of the notion of information flow for a simple guarded command language....
Classical quantitative information flow analysis often considers a system as an information-theoreti...
We develop a theory of information flow that differs from Nondeducibility’s, which we see is really ...
International audienceCode-based game-playing is a popular methodology for proving security of crypt...
Abstract—Software obfuscation of programs, with the goal of protecting against attackers having phys...
Polynomial time adversaries based on a computational view of cryptography have additional capabilit...
Formalization and modeling are important topics in cryptography. They are crucial for precisely def...