International audienceMutual information as an information-theoretic tool has been frequently used in many security analyses. Ch ́erisey et al. used Shannon information- theoretic tools to establish some universal inequalities between the probabil- ity of success of a side-channel attack and the minimum number of queries to reach a given success rate. α-information theory is a generalization of clas- sic information-theoretic tools which seems more persuasive in a side-channel context. Such metrics include R ́enyi’s α-entropy, α-divergence, Arimoto’s con- ditional α-entropy, Sibson’s α-information, etc.In this work, we aim at extending the work of Ch ́erisey et al. to α-information quantities depending on a parameter α. A conditional versio...
Abstract—While information-theoretic security is stronger than computational security, it has long b...
Cryptographic algorithms are nowadays prevalent in establishing secure connectivity in our digital s...
Leakage certification aims at guaranteeing that the statistical models used in side-channel security...
International audienceA conditional version of Sibson's α-information is defined using a simple clos...
Using information-theoretic tools, this paper establishes a mathematical link between the probabilit...
Using information-theoretic tools, this paper establishes a mathematical link between the probabilit...
International audienceUsing information-theoretic tools, this paper estab- lishes a mathematical lin...
International audienceMeasuring the information leakage is critical for evaluating the practical sec...
Measuring the information leakage is critical for evaluating the practical security of cryptographic...
Current side-channel evaluation methodologies exhibit a gap betweeninefficient tools offering strong...
Side-channels are unanticipated information flows that present a significant threatto security of sy...
The bounds presented at CHES 2017 based on Massey’s guessing entropy represent the most scalable sid...
We present a model of adaptive attacks which we combine with infor-mation-theoretic metrics to quant...
These lecture notes introduce some basic concepts from Shannon’s information theory, such as (condit...
In Backes&Kopf(2008), the authors introduced an important new information theoretic numerical measur...
Abstract—While information-theoretic security is stronger than computational security, it has long b...
Cryptographic algorithms are nowadays prevalent in establishing secure connectivity in our digital s...
Leakage certification aims at guaranteeing that the statistical models used in side-channel security...
International audienceA conditional version of Sibson's α-information is defined using a simple clos...
Using information-theoretic tools, this paper establishes a mathematical link between the probabilit...
Using information-theoretic tools, this paper establishes a mathematical link between the probabilit...
International audienceUsing information-theoretic tools, this paper estab- lishes a mathematical lin...
International audienceMeasuring the information leakage is critical for evaluating the practical sec...
Measuring the information leakage is critical for evaluating the practical security of cryptographic...
Current side-channel evaluation methodologies exhibit a gap betweeninefficient tools offering strong...
Side-channels are unanticipated information flows that present a significant threatto security of sy...
The bounds presented at CHES 2017 based on Massey’s guessing entropy represent the most scalable sid...
We present a model of adaptive attacks which we combine with infor-mation-theoretic metrics to quant...
These lecture notes introduce some basic concepts from Shannon’s information theory, such as (condit...
In Backes&Kopf(2008), the authors introduced an important new information theoretic numerical measur...
Abstract—While information-theoretic security is stronger than computational security, it has long b...
Cryptographic algorithms are nowadays prevalent in establishing secure connectivity in our digital s...
Leakage certification aims at guaranteeing that the statistical models used in side-channel security...