{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T09:54:23Z","timestamp":1740131663110,"version":"3.37.3"},"reference-count":69,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"12","license":[{"start":{"date-parts":[[2022,12,1]],"date-time":"2022-12-01T00:00:00Z","timestamp":1669852800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,12,1]],"date-time":"2022-12-01T00:00:00Z","timestamp":1669852800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,12,1]],"date-time":"2022-12-01T00:00:00Z","timestamp":1669852800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001459","name":"Singapore Ministry of Education","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001459","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001321","name":"National Research Foundation","doi-asserted-by":"publisher","award":["R-710-000-012-135"],"award-info":[{"award-number":["R-710-000-012-135"]}],"id":[{"id":"10.13039\/501100001321","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001866","name":"Fonds National de la Recherche","doi-asserted-by":"publisher","award":["C17\/IS\/11613923"],"award-info":[{"award-number":["C17\/IS\/11613923"]}],"id":[{"id":"10.13039\/501100001866","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Project SPECTRA by the Sapienza University of Rome"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Inform. Theory"],"published-print":{"date-parts":[[2022,12]]},"DOI":"10.1109\/tit.2022.3193848","type":"journal-article","created":{"date-parts":[[2022,7,26]],"date-time":"2022-07-26T19:37:54Z","timestamp":1658864274000},"page":"8197-8227","source":"Crossref","is-referenced-by-count":1,"title":["The Mother of All Leakages: How to Simulate Noisy Leakages via Bounded Leakage (Almost) for Free"],"prefix":"10.1109","volume":"68","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5352-9763","authenticated-orcid":false,"given":"Gianluca","family":"Brian","sequence":"first","affiliation":[{"name":"Department of Computer Science, Sapienza University of Rome, Rome, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7152-6478","authenticated-orcid":false,"given":"Antonio","family":"Faonio","sequence":"additional","affiliation":[{"name":"EURECOM, Sophia Antipolis, Biot, France"}]},{"given":"Maciej","family":"Obremski","sequence":"additional","affiliation":[{"name":"Centre for Quantum Technologies, National University of Singapore, Queenstown, Singapore"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9870-0501","authenticated-orcid":false,"given":"Joao","family":"Ribeiro","sequence":"additional","affiliation":[{"name":"Department of Computing, Imperial College London, London, U.K."}]},{"given":"Mark","family":"Simkin","sequence":"additional","affiliation":[{"name":"Computer Science Department, Aarhus University, Aarhus, Denmark"}]},{"given":"Maciej","family":"Skorski","sequence":"additional","affiliation":[{"name":"Faculty of Science, Technology and Communication, University of Luxembourg, Esch-sur-Alzette, Luxembourg"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2379-8564","authenticated-orcid":false,"given":"Daniele","family":"Venturi","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Sapienza University of Rome, Rome, Italy"}]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/800061.808737"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611973099.42"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2018.8437762"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-49175-2_7"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-04268-8_14"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-56877-1_5"},{"key":"ref37","first-page":"209","article-title":"Some complexity questions related to distributive computing","author":"yao","year":"1979","journal-title":"Proc 11th Annu ACM Symp Theory Comput (STOC)"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/11761679_21"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2010.55"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-63715-0_9"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-015-9218-0"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1145\/1536414.1536498"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-93387-0_7"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-28914-9_15"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-15317-4_9"},{"key":"ref64","article-title":"On reverse Pinsker inequalities","author":"sason","year":"2015","journal-title":"arXiv 1503 07118"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/s000370050019"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/ITA.2014.6804281"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1007\/11818175_15"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46494-6_17"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14496-7_2"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-21568-2_1"},{"journal-title":"Universally Composable Security A New Paradigm for Cryptographic Protocols","year":"2000","author":"canetti","key":"ref69"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-68697-5_9"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-77886-6_14"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2019.00045"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-96884-1_18"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-56784-2_14"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-26951-7_18"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-26951-7_17"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2016.10"},{"key":"ref25","first-page":"7:1","article-title":"Leakage-resilient secret sharing in non-compartmentalized models","volume":"163","author":"lin","year":"2020","journal-title":"Proc 1st Conf Inf -Theoretic Cryptogr (ITC)"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-018-9277-0"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46803-6_6"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-42045-0_8"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2011.35"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1145\/1993636.1993732"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03356-8_3"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0052244"},{"key":"ref54","first-page":"523","article-title":"Fuzzy extractors: How to generate strong keys from biometrics and other noisy data","volume":"3027","author":"dodis","year":"2004","journal-title":"Adv Cryptology"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-27836-8_63"},{"key":"ref52","doi-asserted-by":"crossref","first-page":"69","DOI":"10.1007\/978-3-319-17470-9_5","article-title":"Unifying leakage classes: Simulatable leakage and pseudoentropy","author":"fuller","year":"2015","journal-title":"Information Theoretic Security"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1137\/100813464"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1137\/060651380"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1002\/rsa.3240010401"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2010.56"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38348-9_9"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48405-1_26"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-55220-5_24"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-018-9284-1"},{"key":"ref17","first-page":"683","article-title":"Unifying leakage models on a R&#x00E9;nyi day","volume":"11692","author":"prest","year":"2019","journal-title":"Adv Cryptology"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/11681878_11"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-42045-0_21"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-36400-5_4"},{"key":"ref3","first-page":"388","article-title":"Differential power analysis","volume":"1666","author":"kocher","year":"1999","journal-title":"Advances in Cryptology"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24638-1_16"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45146-4_27"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3335741.3335768"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2008.56"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46800-5_16"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03356-8_2"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-20465-4_7"},{"journal-title":"Bounded Collusion Protocols Cylinder-Intersection Extractors and Leakage-Resilient Secret Sharing","year":"2020","author":"kumar","key":"ref45"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1137\/120880343"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13190-5_7"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1142\/S1793042105000108"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1016\/0022-0000(92)90047-M"},{"journal-title":"Leakage-Resilient Extractors and Secret-Sharing Against Bounded Collusion Protocols","year":"2020","author":"chattopadhyay","key":"ref44"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS46700.2020.00117"}],"container-title":["IEEE Transactions on Information Theory"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/18\/9961124\/09840398.pdf?arnumber=9840398","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,12]],"date-time":"2023-02-12T16:55:32Z","timestamp":1676220932000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9840398\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12]]},"references-count":69,"journal-issue":{"issue":"12"},"URL":"https:\/\/doi.org\/10.1109\/tit.2022.3193848","relation":{},"ISSN":["0018-9448","1557-9654"],"issn-type":[{"type":"print","value":"0018-9448"},{"type":"electronic","value":"1557-9654"}],"subject":[],"published":{"date-parts":[[2022,12]]}}}