Synthetic Data--what, why and how?

J Jordon, L Szpruch, F Houssiau, M Bottarelli… - arXiv preprint arXiv …, 2022 - arxiv.org
This explainer document aims to provide an overview of the current state of the rapidly
expanding work on synthetic data technologies, with a particular focus on privacy. The …

Extremal mechanisms for local differential privacy

P Kairouz, S Oh, P Viswanath - Advances in neural …, 2014 - proceedings.neurips.cc
Local differential privacy has recently surfaced as a strong measure of privacy in contexts
where personal information remains private even from data analysts. Working in a setting …

Leakage assessment methodology: A clear roadmap for side-channel evaluations

T Schneider, A Moradi - … Hardware and Embedded Systems--CHES 2015 …, 2015 - Springer
Evoked by the increasing need to integrate side-channel countermeasures into security-
enabled commercial devices, evaluation labs are seeking a standard approach that enables …

Extremal mechanisms for local differential privacy

P Kairouz, S Oh, P Viswanath - Journal of Machine Learning Research, 2016 - jmlr.org
Local differential privacy has recently surfaced as a strong measure of privacy in contexts
where personal information remains private even from data analysts. Working in a setting …

On the relation between identifiability, differential privacy, and mutual-information privacy

W Wang, L Ying, J Zhang - IEEE Transactions on Information …, 2016 - ieeexplore.ieee.org
This paper investigates the relation between three different notions of privacy: identifiability,
differential privacy, and mutual-information privacy. Under a unified privacydistortion …

Leakage assessment methodology: Extended version

T Schneider, A Moradi - Journal of Cryptographic Engineering, 2016 - Springer
Evoked by the increasing need to integrate side-channel countermeasures into security-
enabled commercial devices, evaluation labs are seeking a standard approach that enables …

Leakage certification revisited: Bounding model errors in side-channel security evaluations

O Bronchain, JM Hendrickx, C Massart… - Advances in Cryptology …, 2019 - Springer
Leakage certification aims at guaranteeing that the statistical models used in side-channel
security evaluations are close to the true statistical distribution of the leakages, hence can be …

Does My Device Leak Information? An a priori Statistical Power Analysis of Leakage Detection Tests

L Mather, E Oswald, J Bandenburg… - Advances in Cryptology …, 2013 - Springer
The development of a leakage detection testing methodology for the side-channel
resistance of cryptographic devices is an issue that has received recent focus from …

Statistical measurement of information leakage

K Chatzikokolakis, T Chothia, A Guha - … on Tools and Algorithms for the …, 2010 - Springer
Abstract Information theory provides a range of useful methods to analyse probability
distributions and these techniques have been successfully applied to measure information …

A critical analysis of ISO 17825 ('testing methods for the mitigation of non-invasive attack classes against cryptographic modules')

C Whitnall, E Oswald - Advances in Cryptology–ASIACRYPT 2019: 25th …, 2019 - Springer
The ISO standardisation of 'Testing methods for the mitigation of non-invasive attack classes
against cryptographic modules'(ISO/IEC 17825: 2016) specifies the use of the Test Vector …