A Systematic Survey On Security in Anonymity Networks: Vulnerabilities, Attacks, Defenses, and Formalization
D Chao, D Xu, F Gao, C Zhang… - … Surveys & Tutorials, 2024 - ieeexplore.ieee.org
The importance of safeguarding individuals' privacy rights in online activities is unmistakable
in today's anonymity networks. Since the introduction of Mixnet by Chaum, numerous …
in today's anonymity networks. Since the introduction of Mixnet by Chaum, numerous …
Hiding the lengths of encrypted messages via Gaussian padding
JP Degabriele - Proceedings of the 2021 ACM SIGSAC Conference on …, 2021 - dl.acm.org
Secure network protocols like TLS, QUIC, SSH and IPsec allow for additional padding to be
used during encryption in order to hide message lengths. While it is impossible to conceal …
used during encryption in order to hide message lengths. While it is impossible to conceal …
SoK: public key encryption with openings
When modelling how public key encryption can enable secure communication, we should
acknowledge that secret information, such as private keys or the encryption's randomness …
acknowledge that secret information, such as private keys or the encryption's randomness …
Review your choices: when confirmation pages break ballot secrecy in online elections
Online voting systems typically display a confirmation screen allowing voters to confirm their
selections before casting. This paper considers whether a network-based observer can …
selections before casting. This paper considers whether a network-based observer can …
Information Leakage Through Packet Lengths in RTC Traffic
Modern real-time communication (RTC) depends on efficient audio and video compression
to minimize bandwidth requirements. While the codecs are certainly up to the task, the …
to minimize bandwidth requirements. While the codecs are certainly up to the task, the …
[PDF][PDF] Refined Techniques for Compression Side-Channel Attacks
Y Song - 2024 - ethz.ch
A cryptosystem that performs compression before encryption may leak information about the
plaintext from the ciphertext length, giving rise to a compression side channel. An attacker …
plaintext from the ciphertext length, giving rise to a compression side channel. An attacker …
Cyber Risks in Ontario Online Elections
JD Brunet - 2024 - search.proquest.com
Online voting is increasingly prevalent in Ontario's municipalities, despite a lack of regulated
technological and procedural safeguards. Individual municipalities, lacking deep knowledge …
technological and procedural safeguards. Individual municipalities, lacking deep knowledge …