1,821 Hits in 2.0 sec

Fully leakage-resilient signatures revisited: Graceful degradation, noisy leakage, and construction in the bounded-retrieval model

Antonio Faonio, Jesper Buus Nielsen, Daniele Venturi
2017 Theoretical Computer Science  
Finally, we explain how to extend some of our schemes to the setting of noisy leakage, where the only restriction on the leakage functions is that the output does not decrease the min-entropy of the secret  ...  We construct new leakage-resilient signature schemes.  ...  for noisy and length-bounded leakage).  ... 
doi:10.1016/j.tcs.2016.11.016 fatcat:7bvwywzpuvcm3gmss766p274oe

Redundant Code-based Masking Revisited

Nicolas Costes, Martijn Stam
2020 Transactions on Cryptographic Hardware and Embedded Systems  
We revisit the recent work by Chabanne et al. (CHES'18) and show that, contrary to their conclusions, said leakage can—in theory—always be exploited.  ...  The latter lends itself to redundant masking, where leakage emanates from more shares than are strictly necessary to reconstruct, raising the obvious question how well such "redundant" leakage can be exploited  ...  of noisy Hamming weight leakage for noise deviation σ ∈ [0, 4.5].  ... 
doi:10.46586/tches.v2021.i1.426-450 fatcat:hhwgkutrs5bx7afbwgnkfiadz4

On the general constraints in single qubit quantum process tomography

Ramesh Bhandari, Nicholas A. Peters
2016 Scientific Reports  
We illustrate their utility with several examples, including a discussion of qubit leakage error models and the intuition which can be gained from their process matrices.  ...  In summary, we have revisited the theoretical aspects of single qubit quantum process tomography to determine the behavior of a quantum device.  ...  We illustrate this with respect to a leakage error model for quantum computing. Leakage Error Model.  ... 
doi:10.1038/srep26004 pmid:27188691 pmcid:PMC4870687 fatcat:yvmjz3bny5drfhktcmx4yj7my4

Low Randomness Masking and Shuffling: An Evaluation Using Mutual Information

Kostas Papagiannopoulos
2018 Transactions on Cryptographic Hardware and Embedded Systems  
The evaluation exhibits the tradeoff between the randomness cost and the noisy leakage security level offered by the countermeasures, enabling the designer to fine-tune a masking or shuffling scheme and  ...  Second, he averages the observed noisy leakages in order to denoise the side-channel emission.  ...  First, the adversary observes the noisy leakage of share repetitions (noted also by Battistello et al.  ... 
doi:10.13154/tches.v2018.i3.524-546 dblp:journals/tches/Papagiannopoulos18 fatcat:ro3ypd2nfvfd7gcflbvlz3jtdy

Leakage Perturbation is Not Enough: Breaking Structured Encryption Using Simulated Annealing [article]

Zichen Gui, Kenneth G. Paterson, Sikhar Patranabis
2021 IACR Cryptology ePrint Archive  
To obtain efficiency, SSE schemes incur a certain amount of leakage.  ...  To do so, we implement SSE systems using those stateof-the-art leakage suppression methods, and evaluate their performance.  ...  System-Wide Leakage in SSE. In this paper, we revisit the current dominant approach to leakage analysis for SSE by taking an alternative "system-wide" perspective.  ... 
dblp:journals/iacr/GuiPP21 fatcat:yiicpik7irdqbd7z5vey325fte

Empirical coordination, state masking and state amplification: Core of the decoder's knowledge

Mael Le Treust, Matthieu Bloch
2016 2016 IEEE International Symposium on Information Theory (ISIT)  
Our main result is a characterization of the set of achievable rates, information leakages and joint distributions.  ...  We revisit the problem of state masking and state amplification for state-dependent channel with causal state information at the encoder from the point of view of empirical coordination.  ...  Noisy channel feedback observed by the encoder We characterize the set of achievable triples (R, E, Q) when the encoder has noisy feedback Y 2 from the state-dependent broadcast channel T (y 1 , y 2 |x  ... 
doi:10.1109/isit.2016.7541428 dblp:conf/isit/TreustB16 fatcat:yk4ipt2zvbc4vjrn7iu2sowkea

Overview of Quantum Memory Protection and Adiabaticity Induction by Fast-Signal Control [article]

Jun Jing, Lian-Ao Wu
2014 arXiv   pre-print
of the control sequences which could be ideal pulses, regular rectangular pulses, random pulses and even noisy pulses.  ...  A quantum memory or information processing device is subject to disturbance from its surrounding environment or inevitable leakage due to its contact with other systems.  ...  The goal of the leakage control then can be achieved.  ... 
arXiv:1412.1783v1 fatcat:7kaf3w27nremdhsgqpstatge3i

Adversarial Removal of Demographic Attributes Revisited

Maria Barrett, Yova Kementchedjhieva, Yanai Elazar, Desmond Elliott, Anders Søgaard
2019 Proceedings of the 2019 Conference on Empirical Methods in Natural Language Processing and the 9th International Joint Conference on Natural Language Processing (EMNLP-IJCNLP)  
We revisit their experiments and conduct a series of follow-up experiments showing that, in fact, the diagnostic classifier generalizes poorly to both new in-domain samples and new domains, indicating  ...  ., 2018) , as well as representations invariant to domain differences (Ganin and Lempitsky, 2015) , clean or noisy speech (Sriram et al., 2018) , and invariant to differences between source languages  ...  , to qualitatively inspect the observed leakage patterns.  ... 
doi:10.18653/v1/d19-1662 dblp:conf/emnlp/BarrettKEES19 fatcat:iojb7upeh5dltl33pmap7iqtui

Probing Security through Input-Output Separation and Revisited Quasilinear Masking

Dahmun Goudarzi, Thomas Prest, Matthieu Rivain, Damien Vergnaud
2021 Transactions on Cryptographic Hardware and Embedded Systems  
Whenever a masked implementation can be proven secure in this model with a reasonable leakage rate, it is also provably secure in a realistic leakage model known as the noisy leakage model.  ...  Such a circuit is secure against an adversary placing up to t probes in each gadget composing the circuit, which ensures a tight reduction to the more realistic noisy leakage model.  ...  Noisy Leakage Model. The noisy leakage model was first formalized by Prouff and Rivain [PR13] .  ... 
doi:10.46586/tches.v2021.i3.599-640 fatcat:ylo425c6bjgcvopugo7vurhx2u

Enhanced Diffusion by Projected Curvelet for Segmentation without Guiding Information

Lihong Ma, Yu Zhang, Hanqing Lu
2007 2007 IEEE International Conference on Signal Processing and Communications  
Index Terms-diffusion model, Curvelet projection, error norm function, revisiting feedback  ...  (a) non-stable (b)noisy diffusion (c)pseudo region (d) leakage Fig.3 Tukey biweight and Lorentzian based Diffusion. f is decomposed into J subbands: P 0 f is the coarse version of f, ∆ jf expresses subband  ...  .% for Lena and 5.2% for noisy Forman in final results, and is at least 1.3% for Peppers and 13.9% for Baboon.  ... 
doi:10.1109/icspc.2007.4728483 fatcat:go7rd7vurnhxjkzm4wnd74po7a

Online Template Attacks: Revisited

Alejandro Cabrera Aldaya, Billy Bob Brumley
2021 Transactions on Cryptographic Hardware and Embedded Systems  
However, microarchitecture signals have no such feature, invalidating some assumptions from previous OTA works.In this paper, we revisit previous OTA descriptions, proposing a generic framework and evaluation  ...  scalar in all cases using a single trace.This work demonstrates that microarchitecture online template attacks are also very powerful in this scenario, recovering secret information without knowing a leakage  ...  In general, this branch fits better for noisy side channels.  ... 
doi:10.46586/tches.v2021.i3.28-59 fatcat:p3v3uan37beprersu6oyuvggpi

What Is the Spatial Resolution of grace Satellite Products for Hydrology?

Bramha Vishwakarma, Balaji Devaraju, Nico Sneeuw
2018 Remote Sensing  
These global fields are noisy; therefore, we first filter them and then perform spatial integration over a region of interest to obtain meaningful information [5] [6] [7] .  ...  The mass change information from the Gravity Recovery And Climate Experiment (GRACE) satellite mission is available in terms of noisy spherical harmonic coefficients truncated at a maximum degree (band-limited  ...  Here, one may argue that the GRACE fields are noisy, thus the leakage and the deviation integral computed from noisy fields will not be accurate.  ... 
doi:10.3390/rs10060852 fatcat:kptkl7lex5hz5pajsftbsfdmye

A Consistent and Efficient Evaluation Strategy for Attribution Methods [article]

Yao Rong, Tobias Leemann, Vadim Borisov, Gjergji Kasneci, Enkelejda Kasneci
2022 arXiv   pre-print
Our findings reveal that the results are strongly affected by information leakage through the shape of the removed pixels as opposed to their actual values.  ...  Information Theory We now briefly revisit the central concepts of information theory that will be handy for our analysis and introduce the notation.  ...  Debiasing with Noisy Linear Imputation To reduce the Class Information Leakage, we propose a better-suited imputation operator I l that adheres to the Minimally Revealing Imputation condition we derived  ... 
arXiv:2202.00449v2 fatcat:3enko2e7hrfjvijekhwg4vuase

Blind Source Separation from Single Measurements Using Singular Spectrum Analysis [chapter]

Santos Merino Del Pozo, François-Xavier Standaert
2015 Lecture Notes in Computer Science  
from easier-to-exploit intuitions, applicability in contexts where low sampling rates make standard frequency analyses challenging, and the (theoretical) possibility to separate a signal source from a noisy  ...  also put forward the stronger impact of SSA in more challenging scenarios, e.g. masked implementations (because the impact of noise increases exponentially with the number of shares in this case), or noisy  ...  As previously mentioned, this choice was motivated by the more noisy leakage traces (so the more challenging profiling).  ... 
doi:10.1007/978-3-662-48324-4_3 fatcat:2bgcwkjt5jawxlcblt4bg2udqq

Microarchitecture Online Template Attacks [article]

Alejandro Cabrera Aldaya, Billy Bob Brumley
2020 arXiv   pre-print
In this work demonstrate that microarchitecture online template attacks are also very powerful in this scenario, recovering secret information without knowing a leakage model.  ...  Our analysis reveals OTA features not covered before, increasing its application scenarios that requires revisiting original countermeasures to prevent it.  ...  In general this branch fits better for noisy side-channels.  ... 
arXiv:2007.05337v1 fatcat:lry2o74mtbgpboescpa44zbncy
« Previous Showing results 1 — 15 out of 1,821 results