{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,23]],"date-time":"2025-12-23T00:29:37Z","timestamp":1766449777036,"version":"3.40.3"},"publisher-location":"Cham","reference-count":34,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030953119"},{"type":"electronic","value":"9783030953126"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-030-95312-6_15","type":"book-chapter","created":{"date-parts":[[2022,1,29]],"date-time":"2022-01-29T17:08:51Z","timestamp":1643476131000},"page":"345-369","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["On Fingerprinting Attacks and Length-Hiding Encryption"],"prefix":"10.1007","author":[{"given":"Kai","family":"Gellert","sequence":"first","affiliation":[]},{"given":"Tibor","family":"Jager","sequence":"additional","affiliation":[]},{"given":"Lin","family":"Lyu","sequence":"additional","affiliation":[]},{"given":"Tom","family":"Neuschulten","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,1,29]]},"reference":[{"key":"15_CR1","doi-asserted-by":"crossref","unstructured":"Bellare, M., Desai, A., Jokipii, E., Rogaway, P.: A concrete security treatment of symmetric encryption. In: 38th FOCS, pp. 394\u2013403. IEEE Computer Society Press (1997)","DOI":"10.1109\/SFCS.1997.646128"},{"issue":"4","key":"15_CR2","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1007\/s00145-008-9026-x","volume":"21","author":"M Bellare","year":"2008","unstructured":"Bellare, M., Namprempre, C.: Authenticated encryption: relations among notions and analysis of the generic composition paradigm. J. Cryptol. 21(4), 469\u2013491 (2008)","journal-title":"J. Cryptol."},{"key":"15_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"682","DOI":"10.1007\/978-3-642-29011-4_40","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2012","author":"A Boldyreva","year":"2012","unstructured":"Boldyreva, A., Degabriele, J.P., Paterson, K.G., Stam, M.: Security of symmetric encryption in the presence of ciphertext fragmentation. In: Pointcheval, D., Johansson, T. (eds.) EUROCRYPT 2012. LNCS, vol. 7237, pp. 682\u2013699. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-29011-4_40"},{"key":"15_CR4","doi-asserted-by":"crossref","unstructured":"Cai, X., Nithyanand, R., Wang, T., Johnson, R., Goldberg, I.: A systematic approach to developing and evaluating website fingerprinting defenses. In: ACM CCS 2014, pp. 227\u2013238. ACM Press (2014)","DOI":"10.1145\/2660267.2660362"},{"key":"15_CR5","doi-asserted-by":"crossref","unstructured":"Degabriele, J.P.: Hiding the lengths of encrypted messages via Gaussian padding. In: ACM CCS 2021 (2021, to appear). Preliminary copy directly obtained from the author","DOI":"10.1145\/3460120.3484590"},{"key":"15_CR6","unstructured":"Duong, T., Rizzo, J.: The CRIME attack (2012). http:\/\/www.ekoparty.org\/archive\/2012\/CRIME_ekoparty2012.pdf"},{"key":"15_CR7","doi-asserted-by":"crossref","unstructured":"Dyer, K.P., Coull, S.E., Ristenpart, T., Shrimpton, T.: Peek-a-boo, i still see you: why efficient traffic analysis countermeasures fail. In: 2012 IEEE Symposium on Security and Privacy, pp. 332\u2013346. IEEE Computer Society Press (2012)","DOI":"10.1109\/SP.2012.28"},{"key":"15_CR8","unstructured":"Gellert, K., Jager, T., Lyu, L., Neuschulten, T.: On fingerprinting attacks and length-hiding encryption. Cryptology ePrint Archive, Report 2021\/1027 (2021). https:\/\/eprint.iacr.org\/2021\/1027"},{"key":"15_CR9","unstructured":"Gillmor, D.K.: Empirical DNS padding policy (2017). https:\/\/dns.cmrg.net\/ndss2017-dprive-empirical-DNS-traffic-size.pdf"},{"key":"15_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1007\/978-3-642-31680-7_4","volume-title":"Privacy Enhancing Technologies","author":"X Gong","year":"2012","unstructured":"Gong, X., Borisov, N., Kiyavash, N., Schear, N.: Website detection using remote traffic analysis. In: Fischer-H\u00fcbner, S., Wright, M. (eds.) PETS 2012. LNCS, vol. 7384, pp. 58\u201378. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-31680-7_4"},{"key":"15_CR11","doi-asserted-by":"crossref","unstructured":"Gueron, S., Lindell, Y.: GCM-SIV: full nonce misuse-resistant authenticated encryption at under one cycle per byte. In: ACM CCS 2015, pp. 109\u2013119. ACM Press (2015)","DOI":"10.1145\/2810103.2813613"},{"key":"15_CR12","unstructured":"Gueron, S., Lindell, Y.: Simpleenc and simpleencsmall - an authenticated encryption mode for the lightweight setting. Cryptology ePrint Archive, Report 2019\/712 (2019). https:\/\/eprint.iacr.org\/2019\/712"},{"key":"15_CR13","doi-asserted-by":"crossref","unstructured":"Harsha, B., Morton, R., Blocki, J., Springer, J., Dark, M.: Bicycle attacks considered harmful: Quantifying the damage of widespread password length leakage (2020)","DOI":"10.1016\/j.cose.2020.102068"},{"key":"15_CR14","unstructured":"Hayes, J., Danezis, G.: k-fingerprinting: a robust scalable website fingerprinting technique. In: USENIX Security 2016, pp. 1187\u20131203. USENIX Association (2016)"},{"key":"15_CR15","doi-asserted-by":"crossref","unstructured":"Herrmann, D., Wendolsky, R., Federrath, H.: Website fingerprinting: attacking popular privacy enhancing technologies with the multinomial Na\u00efve-Bayes classifier. In: CCSW, pp. 31\u201342. ACM (2009)","DOI":"10.1145\/1655008.1655013"},{"key":"15_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1007\/3-540-36467-6_13","volume-title":"Privacy Enhancing Technologies","author":"A Hintz","year":"2003","unstructured":"Hintz, A.: Fingerprinting websites using traffic analysis. In: Dingledine, R., Syverson, P. (eds.) PET 2002. LNCS, vol. 2482, pp. 171\u2013178. Springer, Heidelberg (2003). https:\/\/doi.org\/10.1007\/3-540-36467-6_13"},{"key":"15_CR17","doi-asserted-by":"publisher","unstructured":"Hollenbeck, S.: Transport Layer Security Protocol Compression Methods. RFC 3749 (2004). https:\/\/doi.org\/10.17487\/RFC3749, https:\/\/rfc-editor.org\/rfc\/rfc3749.txt","DOI":"10.17487\/RFC3749"},{"key":"15_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"409","DOI":"10.1007\/978-3-319-70500-2_14","volume-title":"Theory of Cryptography","author":"T Jager","year":"2017","unstructured":"Jager, T., Stam, M., Stanley-Oakes, R., Warinschi, B.: Multi-key authenticated encryption with corruptions: reductions are lossy. In: Kalai, Y., Reyzin, L. (eds.) TCC 2017. LNCS, vol. 10677, pp. 409\u2013441. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-70500-2_14"},{"issue":"1","key":"15_CR19","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1007\/s00145-005-0310-8","volume":"19","author":"J Katz","year":"2006","unstructured":"Katz, J., Yung, M.: Characterization of security notions for probabilistic private-key encryption. J. Cryptol. 19(1), 67\u201395 (2006)","journal-title":"J. Cryptol."},{"key":"15_CR20","doi-asserted-by":"crossref","unstructured":"Kohls, K., Rupprecht, D., Holz, T., P\u00f6pper, C.: Lost traffic encryption: fingerprinting LTE\/4G traffic on layer two. In: WiSec, pp. 249\u2013260. ACM (2019)","DOI":"10.1145\/3317549.3323416"},{"key":"15_CR21","doi-asserted-by":"crossref","unstructured":"Liberatore, M., Levine, B.N.: Inferring the source of encrypted HTTP connections. In: ACM CCS 2006, pp. 255\u2013263. ACM Press (2006)","DOI":"10.1145\/1180405.1180437"},{"key":"15_CR22","doi-asserted-by":"publisher","unstructured":"Mayrhofer, A.: Padding policies for extension mechanisms for DNS (EDNS(0)). RFC 8467 (2018). https:\/\/doi.org\/10.17487\/RFC8467, https:\/\/rfc-editor.org\/rfc\/rfc8467.txt","DOI":"10.17487\/RFC8467"},{"key":"15_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1007\/978-3-319-08506-7_8","volume-title":"Privacy Enhancing Technologies","author":"B Miller","year":"2014","unstructured":"Miller, B., Huang, L., Joseph, A.D., Tygar, J.D.: I know why you went to the clinic: risks and realization of HTTPS traffic analysis. In: De Cristofaro, E., Murdoch, S.J. (eds.) PETS 2014. LNCS, vol. 8555, pp. 143\u2013163. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-08506-7_8"},{"key":"15_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"372","DOI":"10.1007\/978-3-642-25385-0_20","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2011","author":"KG Paterson","year":"2011","unstructured":"Paterson, K.G., Ristenpart, T., Shrimpton, T.: Tag size does matter: attacks and proofs for the TLS record protocol. In: Lee, D.H., Wang, X. (eds.) ASIACRYPT 2011. LNCS, vol. 7073, pp. 372\u2013389. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-25385-0_20"},{"key":"15_CR25","doi-asserted-by":"publisher","unstructured":"Rescorla, E.: The Transport Layer Security (TLS) protocol Version 1.3. RFC 8446 (2018). https:\/\/doi.org\/10.17487\/RFC8446, https:\/\/rfc-editor.org\/rfc\/rfc8446.txt","DOI":"10.17487\/RFC8446"},{"key":"15_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"373","DOI":"10.1007\/11761679_23","volume-title":"Advances in Cryptology - EUROCRYPT 2006","author":"P Rogaway","year":"2006","unstructured":"Rogaway, P., Shrimpton, T.: A provable-security treatment of the key-wrap problem. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 373\u2013390. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11761679_23"},{"key":"15_CR27","unstructured":"Shusterman, A., et al.: Robust website fingerprinting through the cache occupancy channel. In: USENIX Security 2019, pp. 639\u2013656. USENIX Association (2019)"},{"key":"15_CR28","doi-asserted-by":"crossref","unstructured":"Sirinam, P., Imani, M., Ju\u00e1rez, M., Wright, M.: Deep fingerprinting: undermining website fingerprinting defenses with deep learning. In: ACM CCS 2018, pp. 1928\u20131943. ACM Press (2018)","DOI":"10.1145\/3243734.3243768"},{"key":"15_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"345","DOI":"10.1007\/978-3-642-21554-4_20","volume-title":"Applied Cryptography and Network Security","author":"C Tezcan","year":"2011","unstructured":"Tezcan, C., Vaudenay, S.: On hiding a plaintext length by Preencryption. In: Lopez, J., Tsudik, G. (eds.) ACNS 2011. LNCS, vol. 6715, pp. 345\u2013358. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-21554-4_20"},{"issue":"4","key":"15_CR30","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1515\/popets-2016-0027","volume":"2016","author":"T Wang","year":"2016","unstructured":"Wang, T., Goldberg, I.: On realistically attacking tor with website fingerprinting. PoPETs 2016(4), 21\u201336 (2016)","journal-title":"PoPETs"},{"key":"15_CR31","unstructured":"Wang, T., Goldberg, I.: Walkie-talkie: an efficient defense against passive website fingerprinting attacks. In: USENIX Security 2017, pp. 1375\u20131390. USENIX Association (2017)"},{"key":"15_CR32","doi-asserted-by":"crossref","unstructured":"Wright, C.V., Ballard, L., Coull, S.E., Monrose, F., Masson, G.M.: Spot me if you can: Uncovering spoken phrases in encrypted VoIP conversations. In: 2008 IEEE Symposium on Security and Privacy. pp. 35\u201349. IEEE Computer Society Press, 2008","DOI":"10.1109\/SP.2008.21"},{"key":"15_CR33","unstructured":"Wright, C.V., Ballard, L., Monrose, F., Masson, G.M.: Language identification of encrypted VoIP traffic: Alejandra y roberto or alice and bob? In: USENIX Security 2007. USENIX Association, 2007"},{"key":"15_CR34","unstructured":"Wright, C.V., Coull, S.E., Monrose, F.: Traffic morphing: An efficient defense against statistical traffic analysis. In: NDSS 2009. The Internet Society, 2009"}],"container-title":["Lecture Notes in Computer Science","Topics in Cryptology \u2013 CT-RSA 2022"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-95312-6_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,17]],"date-time":"2024-09-17T16:03:03Z","timestamp":1726588983000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-95312-6_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783030953119","9783030953126"],"references-count":34,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-95312-6_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"29 January 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CT-RSA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Cryptographers\u2019 Track at the RSA Conference","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"San Francisco, CA","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 February 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 February 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ctrsa2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/ct-rsa-2022.auckland.ac.nz\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"87","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"24","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"28% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"6","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}