Kawamoto

Results: 54



#Item
1Mathematical analysis / Mathematics / Experiment / Information theory / Statistical theory / Measure theory / Random variable / Statistical randomness / Sigma-algebra / Probability distribution / Joint probability distribution / Probability space

Probabilistic Point-to-Point Information Leakage Tom Chothia∗ , Yusuke Kawamoto∗ , Chris Novakovic∗ and David Parker∗ ∗ School of Computer Science University of Birmingham, Birmingham, UK Abstract—The output

Add to Reading List

Source URL: www.cs.bham.ac.uk

Language: English - Date: 2017-06-07 20:45:26
2Information theory / Cryptography / Information / Electrical engineering / Information flow / Information leakage / Leak / Entropy / Weka / Memory leak / Mutual information / Biometric passport

A Tool for Estimating Information Leakage? Tom Chothia, Yusuke Kawamoto, and Chris Novakovic School of Computer Science, University of Birmingham, Birmingham, UK Abstract. We present leakiEst, a tool that estimates how m

Add to Reading List

Source URL: www.cs.bham.ac.uk

Language: English - Date: 2017-06-07 20:45:26
3

Computationally Sound Symbolic Anonymity of a Ring Signature Yusuke Kawamoto † Hideki Sakurada ‡

Add to Reading List

Source URL: www.cs.bham.ac.uk

- Date: 2013-08-01 12:14:39
    4

    Computational Soundness of Symbolic XOR in the Presence of Active Adversaries (Abstract) Hideki Sakurada1 , Yusuke Kawamoto∗,2 , and Masami Hagiya2 sakurada at theory.brl.ntt.co.jp, {y kwmt, hagiya} at is.s.u-tokyo.ac.

    Add to Reading List

    Source URL: www.cs.bham.ac.uk

    - Date: 2014-09-13 07:14:29
      5

      Formal Verification of Cryptography (I) -- Introduction to basic concepts in cryptography Yusuke Kawamoto INRIA Saclay & LIX, École Polytechnique, France In University of Tokyo

      Add to Reading List

      Source URL: www.cs.bham.ac.uk

      - Date: 2014-05-18 16:48:57
        6

        Probabilistic Point-to-Point Information Leakage Tom Chothia∗ , Yusuke Kawamoto∗ , Chris Novakovic∗ and David Parker∗ ∗ School of Computer Science University of Birmingham, Birmingham, UK Abstract—The output

        Add to Reading List

        Source URL: www.cs.bham.ac.uk

        - Date: 2013-08-01 12:14:39
          7

          Quantitative Information Flow for Scheduler-Dependent Systems ∗ Yusuke Kawamoto Thomas Given-Wilson

          Add to Reading List

          Source URL: www.cs.bham.ac.uk

          - Date: 2015-02-10 06:19:43
            8

            A Tool for Estimating Information Leakage? Tom Chothia, Yusuke Kawamoto, and Chris Novakovic School of Computer Science, University of Birmingham, Birmingham, UK Abstract. We present leakiEst, a tool that estimates how m

            Add to Reading List

            Source URL: www.cs.bham.ac.uk

            - Date: 2013-08-01 12:14:38
              9

              Efficient Padding Oracle Attacks On Cryptographic Hardware or The Million Message Attack inMessages Graham Steel joint work with R. Bardou, R. Focardi, Y. Kawamoto, L. Simionato, J. Kai-Tsay

              Add to Reading List

              Source URL: www.iacr.org

              - Date: 2012-08-21 15:40:12
                10

                May 2011 | VOL. 17, no. 2 LEGACIES Honoring our heritage. Embracing our diversity. Sharing our future. Photo Courtesy: Ryan Kawamoto/ Kinetic Productions

                Add to Reading List

                Source URL: www.jcch.com

                - Date: 2012-01-04 15:59:09
                  UPDATE