International audienceThe channel capacity of a deterministic system with confidential data is an upper bound on the amount of bits of data an attacker can learn from the system. We encode all possible attacks to a system using a probabilistic specification, an Interval Markov Chain. Then the channel capacity computation reduces to finding a model of a specification with highest entropy. Entropy maximization for probabilistic process specifications has not been studied before, even though it is well known in Bayesian inference for discrete distributions. We give a characterization of global entropy of a process as a reward function, a polynomial algorithm to verify the existence of an system maximizing entropy among those respecting a speci...
In many practical situations, we have only partial information about the probabilities. In some case...
International audienceThis paper introduces g-leakage, a rich general- ization of the min-entropy mo...
Inspired by the ideas from the field of stochastic approximation, we propose a randomized algorithm ...
International audienceThe channel capacity of a deterministic system with confidential data is an up...
Abstract. The channel capacity of a deterministic system with confidential data is an upper bound on...
We investigate the complexity of computing entropy of various Markovian models including Markov Chai...
We investigate the complexity of computing entropy of various Markovian models including Markov Chai...
We investigate the complexity of computing entropy of various Markovian models including Markov Cha...
International audienceKöpf and Basin have discussed the relation between brute-force guessing attack...
This paper presents sufficient conditions for the direct computation of the entropy for functional (...
International audienceThe quantification of information leakage provides a quantitative evaluation o...
Optimisation problems typically involve finding the ground state (i.e. the minimum energy configurat...
Quantification of information leakage is a successful approach for evaluating the security of a syst...
We study a hidden Markov process which is the result of a transmission of the binary symmetric Marko...
In many practical situations, we have only partial information about the probabilities. In some case...
International audienceThis paper introduces g-leakage, a rich general- ization of the min-entropy mo...
Inspired by the ideas from the field of stochastic approximation, we propose a randomized algorithm ...
International audienceThe channel capacity of a deterministic system with confidential data is an up...
Abstract. The channel capacity of a deterministic system with confidential data is an upper bound on...
We investigate the complexity of computing entropy of various Markovian models including Markov Chai...
We investigate the complexity of computing entropy of various Markovian models including Markov Chai...
We investigate the complexity of computing entropy of various Markovian models including Markov Cha...
International audienceKöpf and Basin have discussed the relation between brute-force guessing attack...
This paper presents sufficient conditions for the direct computation of the entropy for functional (...
International audienceThe quantification of information leakage provides a quantitative evaluation o...
Optimisation problems typically involve finding the ground state (i.e. the minimum energy configurat...
Quantification of information leakage is a successful approach for evaluating the security of a syst...
We study a hidden Markov process which is the result of a transmission of the binary symmetric Marko...
In many practical situations, we have only partial information about the probabilities. In some case...
International audienceThis paper introduces g-leakage, a rich general- ization of the min-entropy mo...
Inspired by the ideas from the field of stochastic approximation, we propose a randomized algorithm ...