Synthetic Data--what, why and how?
This explainer document aims to provide an overview of the current state of the rapidly
expanding work on synthetic data technologies, with a particular focus on privacy. The …
expanding work on synthetic data technologies, with a particular focus on privacy. The …
Extremal mechanisms for local differential privacy
Local differential privacy has recently surfaced as a strong measure of privacy in contexts
where personal information remains private even from data analysts. Working in a setting …
where personal information remains private even from data analysts. Working in a setting …
Leakage assessment methodology: A clear roadmap for side-channel evaluations
T Schneider, A Moradi - … Hardware and Embedded Systems--CHES 2015 …, 2015 - Springer
Evoked by the increasing need to integrate side-channel countermeasures into security-
enabled commercial devices, evaluation labs are seeking a standard approach that enables …
enabled commercial devices, evaluation labs are seeking a standard approach that enables …
Extremal mechanisms for local differential privacy
Local differential privacy has recently surfaced as a strong measure of privacy in contexts
where personal information remains private even from data analysts. Working in a setting …
where personal information remains private even from data analysts. Working in a setting …
On the relation between identifiability, differential privacy, and mutual-information privacy
This paper investigates the relation between three different notions of privacy: identifiability,
differential privacy, and mutual-information privacy. Under a unified privacydistortion …
differential privacy, and mutual-information privacy. Under a unified privacydistortion …
Leakage assessment methodology: Extended version
T Schneider, A Moradi - Journal of Cryptographic Engineering, 2016 - Springer
Evoked by the increasing need to integrate side-channel countermeasures into security-
enabled commercial devices, evaluation labs are seeking a standard approach that enables …
enabled commercial devices, evaluation labs are seeking a standard approach that enables …
Leakage certification revisited: Bounding model errors in side-channel security evaluations
O Bronchain, JM Hendrickx, C Massart… - Advances in Cryptology …, 2019 - Springer
Leakage certification aims at guaranteeing that the statistical models used in side-channel
security evaluations are close to the true statistical distribution of the leakages, hence can be …
security evaluations are close to the true statistical distribution of the leakages, hence can be …
Does My Device Leak Information? An a priori Statistical Power Analysis of Leakage Detection Tests
The development of a leakage detection testing methodology for the side-channel
resistance of cryptographic devices is an issue that has received recent focus from …
resistance of cryptographic devices is an issue that has received recent focus from …
Statistical measurement of information leakage
Abstract Information theory provides a range of useful methods to analyse probability
distributions and these techniques have been successfully applied to measure information …
distributions and these techniques have been successfully applied to measure information …
A critical analysis of ISO 17825 ('testing methods for the mitigation of non-invasive attack classes against cryptographic modules')
C Whitnall, E Oswald - Advances in Cryptology–ASIACRYPT 2019: 25th …, 2019 - Springer
The ISO standardisation of 'Testing methods for the mitigation of non-invasive attack classes
against cryptographic modules'(ISO/IEC 17825: 2016) specifies the use of the Test Vector …
against cryptographic modules'(ISO/IEC 17825: 2016) specifies the use of the Test Vector …