{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T20:50:17Z","timestamp":1763499017285,"version":"3.45.0"},"publisher-location":"New York, NY, USA","reference-count":52,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,11,12]],"date-time":"2021-11-12T00:00:00Z","timestamp":1636675200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,11,12]]},"DOI":"10.1145\/3460120.3484590","type":"proceedings-article","created":{"date-parts":[[2021,11,13]],"date-time":"2021-11-13T12:05:27Z","timestamp":1636805127000},"page":"1549-1565","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Hiding the Lengths of Encrypted Messages via Gaussian Padding"],"prefix":"10.1145","author":[{"given":"Jean Paul","family":"Degabriele","sequence":"first","affiliation":[{"name":"Technische Universit\u00e4t Darmstadt, Darmstadt, Germany"}]}],"member":"320","published-online":{"date-parts":[[2021,11,13]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--3--662--49890--3_24"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2009.5"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.42"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-45611-8_6"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363223"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--3--319--27239--9_6"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0055716"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--3--662--43933--3_19"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1214\/aoms\/1177706645"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53140-2_16"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45146-4_34"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/0--387--34805-0_27"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-63697-9_17"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-03332-3_19"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.8"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/11681878_14"},{"key":"e_1_3_2_2_17_1","first-page":"3","article-title":"The algorithmic foundations of differential privacy","volume":"9","author":"Dwork Cynthia","year":"2014","unstructured":"Cynthia Dwork and Aaron Roth. 2014. The algorithmic foundations of differential privacy. Foundations and Trends in Theoretical Computer Science 9, 3--4 (2014), 211--407.","journal-title":"Foundations and Trends in Theoretical Computer Science"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.28"},{"key":"e_1_3_2_2_19_1","unstructured":"Kai Gellert Tibor Jager Lin Lyu and Tom Neuschulten. 2021. On Fingerprinting Attacks and Length-Hiding Encryption. Cryptology ePrint Archive Report 2020\/824. https:\/\/eprint.iacr.org\/2021\/1027."},{"key":"e_1_3_2_2_20_1","volume-title":"BREACH: Reviving the CRIME attack","author":"Gluck Yoel","year":"2013","unstructured":"Yoel Gluck, Neal Harris, and Angelo Prado. 2013. BREACH: Reviving the CRIME attack, Vol. 2013. Black Hat USA. http:\/\/breachattack.com"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243864"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--3--319--76581--5_25"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1214\/009117906000000232"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2018.2814587"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978386"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/3--540--45661--9_21"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"crossref","unstructured":"S. Kent. 2005. IP Encapsulating Security Payload (ESP). RFC 4303. IETF. http:\/\/tools.ietf.org\/rfc\/rfc4303.txt","DOI":"10.17487\/rfc4303"},{"volume-title":"Information Theory and Statistics","author":"Kullback Solomon","key":"e_1_3_2_2_28_1","unstructured":"Solomon Kullback. 1959. Information Theory and Statistics. Wiley, New York."},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180437"},{"key":"e_1_3_2_2_30_1","volume-title":"The Security and Performance of the Galois\/Counter Mode (GCM) of Operation. In INDOCRYPT 2004 (LNCS","volume":"355","author":"David","unstructured":"David A. McGrew and John Viega. 2004. The Security and Performance of the Galois\/Counter Mode (GCM) of Operation. In INDOCRYPT 2004 (LNCS, Vol. 3348), Anne Canteaut and Kapalee Viswanathan (Eds.). Springer, Heidelberg, 343--355."},{"key":"e_1_3_2_2_31_1","volume-title":"USENIX Security","author":"Meyer Christopher","year":"2014","unstructured":"Christopher Meyer, Juraj Somorovsky, Eugen Weiss, J\u00f6rg Schwenk, Sebastian Schinzel, and Erik Tews. 2014. Revisiting SSL\/TLS Implementations: New Bleichenbacher Side Channels and Attacks. In USENIX Security 2014, Kevin Fu and Jaeyeon Jung (Eds.). USENIX Association, 733--748."},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--3--319--63715-0_16"},{"key":"e_1_3_2_2_33_1","volume-title":"Containing Papers of a Mathematical or Physical Character 231, 694--706","author":"Neyman Jerzy","year":"1933","unstructured":"Jerzy Neyman and Egon Sharpe Pearson. 1933. IX. On the problem of the most efficient tests of statistical hypotheses. Philosophical Transactions of the Royal Society of London. Series A, Containing Papers of a Mathematical or Physical Character 231, 694--706 (1933), 289--337."},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"crossref","unstructured":"Y. Nir and A. Langley. 2018. ChaCha20 and Poly1305 for IETF Protocols. RFC 8439. IETF. http:\/\/tools.ietf.org\/rfc\/rfc8439.txt","DOI":"10.17487\/RFC8439"},{"key":"e_1_3_2_2_35_1","volume-title":"Plaintext-Recovery Attacks Against Datagram TLS. In NDSS","author":"Kenneth","year":"2012","unstructured":"Kenneth G. Paterson and Nadhem J. AlFardan. 2012. Plaintext-Recovery Attacks Against Datagram TLS. In NDSS 2012. The Internet Society."},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--3--642--25385-0_20"},{"key":"e_1_3_2_2_37_1","volume-title":"Phan and Serge Vaudenay","author":"Raphael C.","year":"2009","unstructured":"Raphael C. W. Phan and Serge Vaudenay. 2009. On the Impossibility of Strong Encryption Over ?0 . In Coding and Cryptology, Yeow Meng Chee, Chao Li, San Ling, Huaxiong Wang, and Chaoping Xing (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 202--218."},{"key":"e_1_3_2_2_38_1","unstructured":"Alfredo Pironti Pierre-Yves Strub and Karthikeyan Bhargavan. 2012. Identifying Website Users by TLS Traffic Analysis: New Attacks and Effective Countermeasures. Research Report RR-8067. INRIA. INRIA Technical Report RR-8067."},{"volume-title":"Communication Complexity: and Applications","author":"Rao Anup","key":"e_1_3_2_2_39_1","unstructured":"Anup Rao and Amir Yehudayoff. 2020. Communication Complexity: and Applications. Cambridge University Press."},{"key":"e_1_3_2_2_40_1","volume-title":"On the variational distance of independently repeated experiments. CoRR abs\/cs\/0509013","author":"Renner Renato","year":"2005","unstructured":"Renato Renner. 2005. On the variational distance of independently repeated experiments. CoRR abs\/cs\/0509013 (2005). arXiv:cs\/0509013 http:\/\/arxiv.org\/abs\/cs\/0509013"},{"key":"e_1_3_2_2_41_1","unstructured":"Leonid Reyzin. 2004. A note on the statistical difference of small direct products. Technical Report. Boston University Computer Science Department."},{"volume-title":"The CRIME attack. In ekoparty security conference","author":"Rizzo Juliano","key":"e_1_3_2_2_42_1","unstructured":"Juliano Rizzo and Thai Duong. 2012. The CRIME attack. In ekoparty security conference, Vol. 2012."},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/586110.586125"},{"key":"e_1_3_2_2_44_1","volume-title":"Proceedings of a DIMACS Workshop","author":"Sahai Amit","year":"1997","unstructured":"Amit Sahai and Salil P. Vadhan. 1997. Manipulating statistical difference. In Randomization Methods in Algorithm Design, Proceedings of a DIMACS Workshop, Princeton, New Jersey, USA, December 12--14, 1997 (DIMACS Series in Discrete Mathematics and Theoretical Computer Science, Vol. 43), Panos M. Pardalos, Sanguthevar Rajasekaran, and Jos\u00e9 Rolim (Eds.). DIMACS\/AMS, 251--270. http:\/\/dimacs.rutgers.edu\/Volumes\/Vol43.html"},{"key":"e_1_3_2_2_45_1","volume-title":"USENIX Security","author":"Schuster Roei","year":"2017","unstructured":"Roei Schuster, Vitaly Shmatikov, and Eran Tromer. 2017. Beauty and the Burst: Remote Identification of Encrypted Video Streams. In USENIX Security 2017, Engin Kirda and Thomas Ristenpart (Eds.). USENIX Association, 1357--1374."},{"key":"e_1_3_2_2_46_1","doi-asserted-by":"publisher","DOI":"10.1112\/plms\/s1-29.1.353"},{"key":"e_1_3_2_2_47_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--3--642--21554--4_20"},{"key":"e_1_3_2_2_48_1","doi-asserted-by":"crossref","unstructured":"M. Thomson. 2019. Example Handshake Traces for TLS 1.3. RFC 8448. IETF. http:\/\/tools.ietf.org\/rfc\/rfc8448.txt","DOI":"10.17487\/RFC8448"},{"key":"e_1_3_2_2_49_1","doi-asserted-by":"crossref","unstructured":"Martin Thomson and Sean Turner. 2021. Using TLS to Secure QUIC -- draft-ietf-quic-tls-34. https:\/\/tools.ietf.org\/html\/draft-ietf-quic-tls-34.","DOI":"10.17487\/RFC9001"},{"key":"e_1_3_2_2_50_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-46035-7_35"},{"key":"e_1_3_2_2_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2011.34"},{"key":"e_1_3_2_2_52_1","doi-asserted-by":"crossref","unstructured":"T. Ylonen and C. Lonvick. 2006. The Secure Shell (SSH) Transport Layer Protocol. RFC 4253. IETF. http:\/\/tools.ietf.org\/rfc\/rfc4253.txt","DOI":"10.17487\/rfc4253"}],"event":{"name":"CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Virtual Event Republic of Korea","acronym":"CCS '21"},"container-title":["Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3460120.3484590","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3460120.3484590","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T20:45:45Z","timestamp":1763498745000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3460120.3484590"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,12]]},"references-count":52,"alternative-id":["10.1145\/3460120.3484590","10.1145\/3460120"],"URL":"https:\/\/doi.org\/10.1145\/3460120.3484590","relation":{},"subject":[],"published":{"date-parts":[[2021,11,12]]},"assertion":[{"value":"2021-11-13","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}