A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
Reducibility and Statistical-Computational Gaps from Secret Leakage
[article]
2020
arXiv
pre-print
Inference problems with conjectured statistical-computational gaps are ubiquitous throughout modern statistics, computer science and statistical physics. ...
While there has been success evidencing these gaps from the failure of restricted classes of algorithms, progress towards a more traditional reduction-based approach to computational complexity in statistical ...
Acknowledgements We are greatly indebted to Jerry Li for introducing the conjectured statistical-computational gap for robust sparse mean estimation and for discussions that helped lead to this work. ...
arXiv:2005.08099v2
fatcat:mcdgfuytczfincg3dimlxx35ra
Logspace Reducibility From Secret Leakage Planted Clique
[article]
2021
arXiv
pre-print
Secret leakage variants of the planted clique problem with appropriate secret leakage can be more useful than the standard planted clique problem when we want to use parts of the input as randomness. ...
Is this ability to transfer computational hardness from (some variant of) the planted clique problem to other statistical problems robust to changing our notion of computational efficiency to space efficiency ...
Acknowledgments We would like to thank Yanjun Han, Ray Li, and Greg Valiant for helpful discussions and feedback that improved the presentation of these results. ...
arXiv:2107.11886v1
fatcat:rrzlyjw2y5fxjiurkndwk7m5gu
HyLeak: Hybrid Analysis Tool for Information Leakage
[chapter]
2017
Lecture Notes in Computer Science
HyLeak is publicly available and is able to evaluate the information leakage of randomized programs, even when the secret domain is large. ...
The leakage estimation is mainly based on a hybrid method that combines precise program analysis with statistical analysis using stochastic program simulation. ...
This paper presents the HyLeak tool, the first publicly available leakage computation tool leveraging both precise and statistical analyses. ...
doi:10.1007/978-3-319-68167-2_11
fatcat:whuqbirtnrhmnojfn5cpydvsha
Guessing Bits: Improved Lattice Attacks on (EC)DSA with Nonce Leakage
2021
Transactions on Cryptographic Hardware and Embedded Systems
computation: carry out an exhaustive search on some bits of the secret key. ...
The lattice reduction attack on (EC)DSA (and other Schnorr-like signature schemes) with partially known nonces, originally due to Howgrave-Graham and Smart, has been at the core of many concrete cryptanalytic ...
We also would like to thank the anonymous reviewers for their useful suggestions and comments. ...
doi:10.46586/tches.v2022.i1.391-413
fatcat:hjkdrjb3zfcr7hpzpakt7gxl6m
Devising negative pressure within intercuff space reduces microaspiration
2018
BMC Anesthesiology
Leakage tests were also performed during positive pressure ventilation, and using higher-viscosity materials. ...
When connected to a mechanical ventilator, no leakage was found at − 54 cmH 2 suction pressure. ...
Availability of data and materials The datasets used and/or analysed during the current study are available from the corresponding author on reasonable request. ...
doi:10.1186/s12871-018-0643-0
fatcat:artwswypc5dl5oimfrhsykkwia
Bounded Indistinguishability and the Complexity of Recovering Secrets
[chapter]
2016
Lecture Notes in Computer Science
We present additional cryptographic applications of our results to low-complexity secret sharing, visual secret sharing, leakage-resilient cryptography, and eliminating "selective failure" attacks. ...
parties can reconstruct the secret, and where both the sharing and the reconstruction are done by constant-depth circuits of size poly(n). ...
The first and fourth authors were supported by RGC GRF grants CUHK410113 and CUHK14208215. The ...
doi:10.1007/978-3-662-53015-3_21
fatcat:3whk27geizdgnnjd2ny5dybaz4
Secure and Reliable Key Agreement with Physical Unclonable Functions
2018
Entropy
the hardware area and information leakage about the key and RO outputs, and to maximize the secret-key length. ...
Low-complexity error-correction codes are proposed to illustrate two complete key-binding systems with perfect secrecy, and better secret-key and privacy-leakage rates than existing methods. ...
., the WZ-coding construction in [11] , that 530 reduce the privacy-leakage rate for a fixed secret-key rate.
531
Conclusion
532 The reliability, uniqueness, security, computational-complexity, ...
doi:10.3390/e20050340
pmid:33265430
fatcat:2ekkl5m5zbdl5ahfet5tkdi7ui
Bounded Collusion Protocols, Cylinder-Intersection Extractors and Leakage-Resilient Secret Sharing
[article]
2020
Electronic colloquium on computational complexity
In this work we study bounded collusion protocols (BCPs) recently introduced in the context of secret sharing by Kumar, Meka, and Sahai (FOCS 2019). ...
Motivated by questions in communication complexity, secret sharing, and pseudorandomness we investigate BCPs more thoroughly, answering several questions about them. ...
Acknowledgements Ashutosh Kumar thanks Eyal Kushilevitz, Rafail Ostrovsky, Aishwarya Sivaraman, Terence Tao, and Vinod Vaikuntanathan for useful discussions. ...
dblp:journals/eccc/KumarMZ20
fatcat:43baq4czkzfmvkgdklsvbgxhgu
A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks
[chapter]
2009
Lecture Notes in Computer Science
The model is based on weak and commonly accepted hypotheses about side-channels that computations give rise to. ...
It allows us to quantify the effect of practically relevant leakage functions with a combination of security and information theoretic metrics. ...
comments and discussions about preliminary versions of this work. ...
doi:10.1007/978-3-642-01001-9_26
fatcat:yb6h5btb4fhhpg7ffgw5gdrph4
Comparison of a Novel Lycra Endotracheal Tube Cuff to Standard Polyvinyl Chloride Cuff and Polyurethane Cuff for Fluid Leak Prevention
2011
Respiratory care
RESULTS: The Lycra cuffs had no folds upon inflation in the mock trachea and completely prevented fluid leakage for 24 hours (P < .001 vs the Hi-Lo and the Microcuff). ...
We poured 15 mL of methylene-blue colored water into the acrylic tube above the cuff and observed for leakage for 24 hours. ...
ACKNOWLEDGMENTS We thank Angelo Colombo MD for statistical advice. ...
doi:10.4187/respcare.01099
pmid:21496368
fatcat:3it2ff2kffghtjazrbgvxbvnme
Leakage Bounds for Gaussian Side Channels
[chapter]
2018
Lecture Notes in Computer Science
Based on this, we illustrate how the side-channel capacity gives a tool to compute the minimum attack complexity to learn a certain amount of information from side-channel leakage. ...
We further investigate the case when attackers are capable of measuring the same side-channel leakage multiple times and perform signal averaging. ...
The authors of Isap state concrete leakage bounds for their re-keying function and encryption scheme to still provide 128-bit security. We thus evaluated Eq. 15 on ...
doi:10.1007/978-3-319-75208-2_6
fatcat:xndkl7367ffgbprnqjoj62vgkq
Circuit Masking: From Theory to Standardization, A Comprehensive Survey for Hardware Security Researchers and Practitioners
[article]
2021
arXiv
pre-print
To bridge the gap, these advancements are reviewed and discussed in this survey, mainly from the perspective of hardware security. ...
Side-channel attacks extracting sensitive data from implementations have been considered a major threat to the security of cryptographic schemes. ...
MASKING SCHEMES From the perspective of cryptography, masking is an XOR-secret sharing developed as a countermeasure against leakage from computation [113] . ...
arXiv:2106.12714v2
fatcat:djqmxdobv5e3becegkmscz2zae
Secret Sharing with Binary Shares
2018
Innovations in Theoretical Computer Science
The more general notion of ramp schemes requires the reconstruction of secret from any t + g shares, for a positive integer gap parameter g. ...
In this work, we study secret sharing in the extremal case of bit-long shares and arbitrarily small gap ratio g/N , where standard ramp secret sharing becomes impossible. ...
For secret sharing, on the other hand, either perfect secrecy or semantic secrecy (negligible leakage with respect to statistical distance) is a requirement. ...
doi:10.4230/lipics.itcs.2019.53
dblp:conf/innovations/LinCGSW19
fatcat:o4a4uthdkzemjd7qcjn4ppisc4
Parallel Implementations of Masking Schemes and the Bounded Moment Leakage Model
[chapter]
2017
Lecture Notes in Computer Science
This result therefore enables an accurate understanding of the links between formal security analyses of masking schemes and experimental security evaluations based on the estimation of statistical moments ...
For this purpose, we first argue that (i) the probing model is not straightforward to interpret, since it more naturally captures the intuitions of serial implementations, and (ii) the noisy leakage model ...
Aiming for increased generality, Bayrak, Regazzoni, Novo and Ienne [17] propose a SMT-based method for analyzing statistical independence between secret inputs and intermediate computations, still in ...
doi:10.1007/978-3-319-56620-7_19
fatcat:bjrjvrpu6rer3mm2opyhf5vgaq
Leakage-Tolerant Computation with Input-Independent Preprocessing
[chapter]
2014
Lecture Notes in Computer Science
We construct leakage-tolerant multi-party computation protocols for general functions, relying on input-independent preprocessing that is performed once and for-all. ...
They put forth notions of leakage tolerance for zero-knowledge and general secure multi-party computation that aim at capturing the best-possible security when the private inputs of honest parties are ...
We thank Elette Boyle and Abhishek Jain for valuable discussions and the anonymous reviewers for helpful comments and suggestions. ...
doi:10.1007/978-3-662-44381-1_9
fatcat:5nfpaiypmfhufbrin3nsbtpbyu
« Previous
Showing results 1 — 15 out of 7,828 results