Filters








7,828 Hits in 5.5 sec

Reducibility and Statistical-Computational Gaps from Secret Leakage [article]

Matthew Brennan, Guy Bresler
2020 arXiv   pre-print
Inference problems with conjectured statistical-computational gaps are ubiquitous throughout modern statistics, computer science and statistical physics.  ...  While there has been success evidencing these gaps from the failure of restricted classes of algorithms, progress towards a more traditional reduction-based approach to computational complexity in statistical  ...  Acknowledgements We are greatly indebted to Jerry Li for introducing the conjectured statistical-computational gap for robust sparse mean estimation and for discussions that helped lead to this work.  ... 
arXiv:2005.08099v2 fatcat:mcdgfuytczfincg3dimlxx35ra

Logspace Reducibility From Secret Leakage Planted Clique [article]

Jay Mardia
2021 arXiv   pre-print
Secret leakage variants of the planted clique problem with appropriate secret leakage can be more useful than the standard planted clique problem when we want to use parts of the input as randomness.  ...  Is this ability to transfer computational hardness from (some variant of) the planted clique problem to other statistical problems robust to changing our notion of computational efficiency to space efficiency  ...  Acknowledgments We would like to thank Yanjun Han, Ray Li, and Greg Valiant for helpful discussions and feedback that improved the presentation of these results.  ... 
arXiv:2107.11886v1 fatcat:rrzlyjw2y5fxjiurkndwk7m5gu

HyLeak: Hybrid Analysis Tool for Information Leakage [chapter]

Fabrizio Biondi, Yusuke Kawamoto, Axel Legay, Louis-Marie Traonouez
2017 Lecture Notes in Computer Science  
HyLeak is publicly available and is able to evaluate the information leakage of randomized programs, even when the secret domain is large.  ...  The leakage estimation is mainly based on a hybrid method that combines precise program analysis with statistical analysis using stochastic program simulation.  ...  This paper presents the HyLeak tool, the first publicly available leakage computation tool leveraging both precise and statistical analyses.  ... 
doi:10.1007/978-3-319-68167-2_11 fatcat:whuqbirtnrhmnojfn5cpydvsha

Guessing Bits: Improved Lattice Attacks on (EC)DSA with Nonce Leakage

Chao Sun, Thomas Espitau, Mehdi Tibouchi, Masayuki Abe
2021 Transactions on Cryptographic Hardware and Embedded Systems  
computation: carry out an exhaustive search on some bits of the secret key.  ...  The lattice reduction attack on (EC)DSA (and other Schnorr-like signature schemes) with partially known nonces, originally due to Howgrave-Graham and Smart, has been at the core of many concrete cryptanalytic  ...  We also would like to thank the anonymous reviewers for their useful suggestions and comments.  ... 
doi:10.46586/tches.v2022.i1.391-413 fatcat:hjkdrjb3zfcr7hpzpakt7gxl6m

Devising negative pressure within intercuff space reduces microaspiration

H. M. Sohn, J. S. Baik, J. Y. Hwang, S. Y. Kim, S. H. Han, J. H. Kim
2018 BMC Anesthesiology  
Leakage tests were also performed during positive pressure ventilation, and using higher-viscosity materials.  ...  When connected to a mechanical ventilator, no leakage was found at − 54 cmH 2 suction pressure.  ...  Availability of data and materials The datasets used and/or analysed during the current study are available from the corresponding author on reasonable request.  ... 
doi:10.1186/s12871-018-0643-0 fatcat:artwswypc5dl5oimfrhsykkwia

Bounded Indistinguishability and the Complexity of Recovering Secrets [chapter]

Andrej Bogdanov, Yuval Ishai, Emanuele Viola, Christopher Williamson
2016 Lecture Notes in Computer Science  
We present additional cryptographic applications of our results to low-complexity secret sharing, visual secret sharing, leakage-resilient cryptography, and eliminating "selective failure" attacks.  ...  parties can reconstruct the secret, and where both the sharing and the reconstruction are done by constant-depth circuits of size poly(n).  ...  The first and fourth authors were supported by RGC GRF grants CUHK410113 and CUHK14208215. The  ... 
doi:10.1007/978-3-662-53015-3_21 fatcat:3whk27geizdgnnjd2ny5dybaz4

Secure and Reliable Key Agreement with Physical Unclonable Functions

Onur Günlü, Tasnad Kernetzky, Onurcan İşcan, Vladimir Sidorenko, Gerhard Kramer, Rafael Schaefer
2018 Entropy  
the hardware area and information leakage about the key and RO outputs, and to maximize the secret-key length.  ...  Low-complexity error-correction codes are proposed to illustrate two complete key-binding systems with perfect secrecy, and better secret-key and privacy-leakage rates than existing methods.  ...  ., the WZ-coding construction in [11] , that 530 reduce the privacy-leakage rate for a fixed secret-key rate. 531 Conclusion 532 The reliability, uniqueness, security, computational-complexity,  ... 
doi:10.3390/e20050340 pmid:33265430 fatcat:2ekkl5m5zbdl5ahfet5tkdi7ui

Bounded Collusion Protocols, Cylinder-Intersection Extractors and Leakage-Resilient Secret Sharing [article]

Ashutosh Kumar, Raghu Meka, David Zuckerman
2020 Electronic colloquium on computational complexity  
In this work we study bounded collusion protocols (BCPs) recently introduced in the context of secret sharing by Kumar, Meka, and Sahai (FOCS 2019).  ...  Motivated by questions in communication complexity, secret sharing, and pseudorandomness we investigate BCPs more thoroughly, answering several questions about them.  ...  Acknowledgements Ashutosh Kumar thanks Eyal Kushilevitz, Rafail Ostrovsky, Aishwarya Sivaraman, Terence Tao, and Vinod Vaikuntanathan for useful discussions.  ... 
dblp:journals/eccc/KumarMZ20 fatcat:43baq4czkzfmvkgdklsvbgxhgu

A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks [chapter]

François-Xavier Standaert, Tal G. Malkin, Moti Yung
2009 Lecture Notes in Computer Science  
The model is based on weak and commonly accepted hypotheses about side-channels that computations give rise to.  ...  It allows us to quantify the effect of practically relevant leakage functions with a combination of security and information theoretic metrics.  ...  comments and discussions about preliminary versions of this work.  ... 
doi:10.1007/978-3-642-01001-9_26 fatcat:yb6h5btb4fhhpg7ffgw5gdrph4

Comparison of a Novel Lycra Endotracheal Tube Cuff to Standard Polyvinyl Chloride Cuff and Polyurethane Cuff for Fluid Leak Prevention

T. Kolobow, M. Cressoni, M. Epp, I. Corti, P. Cadringher, A. Zanella
2011 Respiratory care  
RESULTS: The Lycra cuffs had no folds upon inflation in the mock trachea and completely prevented fluid leakage for 24 hours (P < .001 vs the Hi-Lo and the Microcuff).  ...  We poured 15 mL of methylene-blue colored water into the acrylic tube above the cuff and observed for leakage for 24 hours.  ...  ACKNOWLEDGMENTS We thank Angelo Colombo MD for statistical advice.  ... 
doi:10.4187/respcare.01099 pmid:21496368 fatcat:3it2ff2kffghtjazrbgvxbvnme

Leakage Bounds for Gaussian Side Channels [chapter]

Thomas Unterluggauer, Thomas Korak, Stefan Mangard, Robert Schilling, Luca Benini, Frank K. Gürkaynak, Michael Muehlberghuber
2018 Lecture Notes in Computer Science  
Based on this, we illustrate how the side-channel capacity gives a tool to compute the minimum attack complexity to learn a certain amount of information from side-channel leakage.  ...  We further investigate the case when attackers are capable of measuring the same side-channel leakage multiple times and perform signal averaging.  ...  The authors of Isap state concrete leakage bounds for their re-keying function and encryption scheme to still provide 128-bit security. We thus evaluated Eq. 15 on  ... 
doi:10.1007/978-3-319-75208-2_6 fatcat:xndkl7367ffgbprnqjoj62vgkq

Circuit Masking: From Theory to Standardization, A Comprehensive Survey for Hardware Security Researchers and Practitioners [article]

Ana Covic, Fatemeh Ganji, Domenic Forte
2021 arXiv   pre-print
To bridge the gap, these advancements are reviewed and discussed in this survey, mainly from the perspective of hardware security.  ...  Side-channel attacks extracting sensitive data from implementations have been considered a major threat to the security of cryptographic schemes.  ...  MASKING SCHEMES From the perspective of cryptography, masking is an XOR-secret sharing developed as a countermeasure against leakage from computation [113] .  ... 
arXiv:2106.12714v2 fatcat:djqmxdobv5e3becegkmscz2zae

Secret Sharing with Binary Shares

Fuchun Lin, Mahdi Cheraghchi, Venkatesan Guruswami, Reihaneh Safavi-Naini, Huaxiong Wang, Michael Wagner
2018 Innovations in Theoretical Computer Science  
The more general notion of ramp schemes requires the reconstruction of secret from any t + g shares, for a positive integer gap parameter g.  ...  In this work, we study secret sharing in the extremal case of bit-long shares and arbitrarily small gap ratio g/N , where standard ramp secret sharing becomes impossible.  ...  For secret sharing, on the other hand, either perfect secrecy or semantic secrecy (negligible leakage with respect to statistical distance) is a requirement.  ... 
doi:10.4230/lipics.itcs.2019.53 dblp:conf/innovations/LinCGSW19 fatcat:o4a4uthdkzemjd7qcjn4ppisc4

Parallel Implementations of Masking Schemes and the Bounded Moment Leakage Model [chapter]

Gilles Barthe, François Dupressoir, Sebastian Faust, Benjamin Grégoire, François-Xavier Standaert, Pierre-Yves Strub
2017 Lecture Notes in Computer Science  
This result therefore enables an accurate understanding of the links between formal security analyses of masking schemes and experimental security evaluations based on the estimation of statistical moments  ...  For this purpose, we first argue that (i) the probing model is not straightforward to interpret, since it more naturally captures the intuitions of serial implementations, and (ii) the noisy leakage model  ...  Aiming for increased generality, Bayrak, Regazzoni, Novo and Ienne [17] propose a SMT-based method for analyzing statistical independence between secret inputs and intermediate computations, still in  ... 
doi:10.1007/978-3-319-56620-7_19 fatcat:bjrjvrpu6rer3mm2opyhf5vgaq

Leakage-Tolerant Computation with Input-Independent Preprocessing [chapter]

Nir Bitansky, Dana Dachman-Soled, Huijia Lin
2014 Lecture Notes in Computer Science  
We construct leakage-tolerant multi-party computation protocols for general functions, relying on input-independent preprocessing that is performed once and for-all.  ...  They put forth notions of leakage tolerance for zero-knowledge and general secure multi-party computation that aim at capturing the best-possible security when the private inputs of honest parties are  ...  We thank Elette Boyle and Abhishek Jain for valuable discussions and the anonymous reviewers for helpful comments and suggestions.  ... 
doi:10.1007/978-3-662-44381-1_9 fatcat:5nfpaiypmfhufbrin3nsbtpbyu
« Previous Showing results 1 — 15 out of 7,828 results