International audienceKöpf and Basin have discussed the relation between brute-force guessing attacks and entropy, in the context of information flow induced by a deterministic program. In this talk, we extend the analysis of Köpf and Basin to the probabilistic scenario, and we consider also other notions of entropy, including the family of entropies proposed by Rényi
International audienceSecure information flow is the problem of ensuring that the information made p...
Secrecy is fundamental to computer security, but real systems often cannot avoid leaking some secret...
International audienceThis paper introduces g-leakage, a rich general- ization of the min-entropy mo...
International audienceKöpf and Basin have discussed the relation between brute-force guessing attack...
International audienceRecent research in quantitative theories for information-hiding topics, such a...
International audienceBelief and min-entropy leakage are two well-known approaches to quantify infor...
International audienceIn recent years, there has been a growing interest in considering the probabil...
International audienceThe channel capacity of a deterministic system with confidential data is an up...
Recent research in quantitative theories for information-hiding topics, such as Anonymity and Secure...
AbstractRecent research in quantitative theories for information-hiding topics, such as Anonymity an...
Belief and vulnerability have been proposed re- cently to quantify information flow in security syst...
International audienceSecure information flow is the problem of ensuring that the information made p...
Secrecy is fundamental to computer security, but real systems often cannot avoid leaking some secret...
International audienceThis paper introduces g-leakage, a rich general- ization of the min-entropy mo...
International audienceKöpf and Basin have discussed the relation between brute-force guessing attack...
International audienceRecent research in quantitative theories for information-hiding topics, such a...
International audienceBelief and min-entropy leakage are two well-known approaches to quantify infor...
International audienceIn recent years, there has been a growing interest in considering the probabil...
International audienceThe channel capacity of a deterministic system with confidential data is an up...
Recent research in quantitative theories for information-hiding topics, such as Anonymity and Secure...
AbstractRecent research in quantitative theories for information-hiding topics, such as Anonymity an...
Belief and vulnerability have been proposed re- cently to quantify information flow in security syst...
International audienceSecure information flow is the problem of ensuring that the information made p...
Secrecy is fundamental to computer security, but real systems often cannot avoid leaking some secret...
International audienceThis paper introduces g-leakage, a rich general- ization of the min-entropy mo...