{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T03:06:30Z","timestamp":1743044790448,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":22,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642198045"},{"type":"electronic","value":"9783642198052"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-19805-2_27","type":"book-chapter","created":{"date-parts":[[2011,3,14]],"date-time":"2011-03-14T09:05:14Z","timestamp":1300093514000},"page":"396-410","source":"Crossref","is-referenced-by-count":18,"title":["Asymptotic Information Leakage under One-Try Attacks"],"prefix":"10.1007","author":[{"given":"Michele","family":"Boreale","sequence":"first","affiliation":[]},{"given":"Francesca","family":"Pampaloni","sequence":"additional","affiliation":[]},{"given":"Michela","family":"Paolini","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"27_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"517","DOI":"10.1007\/978-3-540-88313-5_33","volume-title":"Computer Security - ESORICS 2008","author":"M. Backes","year":"2008","unstructured":"Backes, M., K\u00f6pf, B.: Formally Bounding the Side-Channel Leakage in Unknown-Message Attacks. In: Jajodia, S., Lopez, J. (eds.) ESORICS 2008. LNCS, vol.\u00a05283, pp. 517\u2013532. Springer, Heidelberg (2008)"},{"key":"27_CR2","first-page":"263","volume-title":"Proc. of QEST 2010","author":"B. B\u00e9rard","year":"2010","unstructured":"B\u00e9rard, B., Mullins, J., Sassolas, M.: Quantifying Opacity. In: Proc. of QEST 2010, pp. 263\u2013272. IEEE Society, Los Alamitos (2010)"},{"issue":"6","key":"27_CR3","doi-asserted-by":"publisher","first-page":"699","DOI":"10.1016\/j.ic.2008.12.007","volume":"207","author":"M. Boreale","year":"2009","unstructured":"Boreale, M.: Quantifying information leakage in process calculi. Information and Computation\u00a0207(6), 699\u2013725 (2009)","journal-title":"Information and Computation"},{"key":"27_CR4","unstructured":"Boreale, M., Pampaloni, F., Paolini, M.: Asymptotic information leakage under one-try attacks, Full version of the present paper \n                    \n                      http:\/\/rap.dsi.unifi.it\/~boreale\/Asympt.pdf"},{"key":"27_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"443","DOI":"10.1007\/978-3-540-78499-9_31","volume-title":"Foundations of Software Science and Computational Structures","author":"C. Braun","year":"2008","unstructured":"Braun, C., Chatzikokolakis, K., Palamidessi, C.: Compositional Methods for Information-Hiding. In: Amadio, R.M. (ed.) FOSSACS 2008. LNCS, vol.\u00a04962, pp. 443\u2013457. Springer, Heidelberg (2008)"},{"key":"27_CR6","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1016\/j.entcs.2009.07.085","volume":"249","author":"Christelle Braun","year":"2009","unstructured":"Braun, C., Chatzikokolakis, K., Palamidessi, C.: Quantitative Notions of Leakage for One-try Attacks. In: Proc. of MFPS 2009. Electr. Notes Theor. Comput. Sci, vol.\u00a0249, pp. 75\u201391 (2009)","journal-title":"Electronic Notes in Theoretical Computer Science"},{"issue":"2-4","key":"27_CR7","doi-asserted-by":"publisher","first-page":"378","DOI":"10.1016\/j.ic.2007.07.003","volume":"206","author":"K. Chatzikokolakis","year":"2008","unstructured":"Chatzikokolakis, K., Palamidessi, C., Panangaden, P.: Anonymity protocols as noisy channels. Information and Computation\u00a0206(2-4), 378\u2013401 (2008)","journal-title":"Information and Computation"},{"issue":"5","key":"27_CR8","doi-asserted-by":"publisher","first-page":"531","DOI":"10.3233\/JCS-2008-0333","volume":"16","author":"K. Chatzikokolakis","year":"2008","unstructured":"Chatzikokolakis, K., Palamidessi, C., Panangaden, P.: On the Bayes risk in information-hiding protocols. Journal of Computer Security\u00a016(5), 531\u2013571 (2008)","journal-title":"Journal of Computer Security"},{"issue":"3","key":"27_CR9","doi-asserted-by":"publisher","first-page":"238","DOI":"10.1016\/S1571-0661(04)00290-7","volume":"59","author":"David Clark","year":"2002","unstructured":"Clark, D., Hunt, S., Malacaria, P.: Quantitative Analysis of the Leakage of Confidential Data. Electr. Notes Theor. Comput. Sci.\u00a059(3) (2001)","journal-title":"Electronic Notes in Theoretical Computer Science"},{"key":"27_CR10","volume-title":"Elements of Information Theory, 2\/e","author":"T.M. Cover","year":"2006","unstructured":"Cover, T.M., Thomas, J.A.: Elements of Information Theory, 2\/e. John Wiley & Sons, Chichester (2006)"},{"key":"27_CR11","unstructured":"Goldschlag, D.M., Reed, M.G., Syverson, P.F.: Anonymous Connections and Onion Routing. IEEE Journal on Selected Areas in Communication, Special Issue on Copyright and Privacy Protection (1998)"},{"key":"27_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"104","DOI":"10.1007\/3-540-68697-5_9","volume-title":"Advances in Cryptology - CRYPTO \u201996","author":"P.C. Kocher","year":"1996","unstructured":"Kocher, P.C.: Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol.\u00a01109, pp. 104\u2013113. Springer, Heidelberg (1996)"},{"key":"27_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"388","DOI":"10.1007\/3-540-48405-1_25","volume-title":"Advances in Cryptology - CRYPTO \u201999","author":"P.C. Kocher","year":"1999","unstructured":"Kocher, P.C., Jaffe, J., Jun, B.: Differential Power Analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol.\u00a01666, pp. 388\u2013397. Springer, Heidelberg (1999)"},{"key":"27_CR14","doi-asserted-by":"crossref","unstructured":"K\u00f6pf, B., Basin, D.A.: An information-theoretic model for adaptive side-channel attacks. In: ACM Conference on Computer and Communications Security 2007, pp. 286\u2013296 (2007)","DOI":"10.1145\/1315245.1315282"},{"key":"27_CR15","doi-asserted-by":"crossref","unstructured":"K\u00f6pf, B., D\u00fcrmuth, M.: A Provably Secure and Efficient Countermeasure against Timing Attacks. In: CSF 2009, pp. 324\u2013335 (2009)","DOI":"10.1109\/CSF.2009.21"},{"key":"27_CR16","doi-asserted-by":"crossref","unstructured":"K\u00f6pf, B., Smith, G.: Vulnerability Bounds and Leakage Resilience of Blinded Cryptography under Timing Attacks. In: CSF 2010, pp. 44\u201356 (2010)","DOI":"10.1109\/CSF.2010.11"},{"key":"27_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1007\/978-3-642-01465-9_5","volume-title":"Formal Aspects in Security and Trust","author":"H. Mantel","year":"2009","unstructured":"Mantel, H., Sudbrock, H.: Information-Theoretic Modeling and Analysis of Interrupt-Related Covert Channels. In: Degano, P., Guttman, J., Martinelli, F. (eds.) FAST 2008. LNCS, vol.\u00a05491, pp. 67\u201381. Springer, Heidelberg (2009)"},{"key":"27_CR18","unstructured":"Massey, J.L.: Guessing and Entropy. In: Proc. 1994 IEEE Symposium on Information Theory (ISIT 1994), vol. 204 (1994)"},{"issue":"2","key":"27_CR19","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1109\/5.18626","volume":"77","author":"L.R. Rabiner","year":"1989","unstructured":"Rabiner, L.R.: A tutorial on Hidden Markov Models and selected applications in speech recognition. Proc. of the IEEE\u00a077(2), 257\u2013286 (1989)","journal-title":"Proc. of the IEEE"},{"issue":"1","key":"27_CR20","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1145\/290163.290168","volume":"1","author":"M.K. Reiter","year":"1998","unstructured":"Reiter, M.K., Rubin, A.D.: Crowds: Anonymity for Web Transactions. ACM Trans. Inf. Syst. Secur.\u00a01(1), 66\u201392 (1998)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"27_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"288","DOI":"10.1007\/978-3-642-00596-1_21","volume-title":"Foundations of Software Science and Computational Structures","author":"G. Smith","year":"2009","unstructured":"Smith, G.: On the Foundations of Quantitative Information Flow. In: de Alfaro, L. (ed.) FOSSACS 2009. LNCS, vol.\u00a05504, pp. 288\u2013302. Springer, Heidelberg (2009)"},{"key":"27_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"443","DOI":"10.1007\/978-3-642-01001-9_26","volume-title":"Advances in Cryptology - EUROCRYPT 2009","author":"F.-X. Standaert","year":"2009","unstructured":"Standaert, F.-X., Malkin, T.G., Yung, M.: A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol.\u00a05479, pp. 443\u2013461. Springer, Heidelberg (2009)"}],"container-title":["Lecture Notes in Computer Science","Foundations of Software Science and Computational Structures"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-19805-2_27","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,21]],"date-time":"2019-05-21T06:51:22Z","timestamp":1558421482000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-19805-2_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642198045","9783642198052"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-19805-2_27","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}