Sciweavers

179 search results - page 16 / 36
» Adversarial Leakage in Games
Sort
View
CISC
2009
Springer
174views Cryptology» more  CISC 2009»
13 years 7 months ago
Algebraic Side-Channel Attacks
Abstract. In 2002, algebraic attacks using overdefined systems of equations have been proposed as a potentially very powerful cryptanalysis technique against block ciphers. However...
Mathieu Renauld, François-Xavier Standaert
TON
2012
12 years 7 days ago
A Game-Theoretic Approach to Anonymous Networking
—Anonymous wireless networking is studied when an adversary monitors the transmission timing of an unknown subset of the network nodes. For a desired quality of service (QoS), as...
Parvathinathan Venkitasubramaniam, Lang Tong
EUROCRYPT
2010
Springer
14 years 2 months ago
Public-Key Encryption in the Bounded-Retrieval Model
We construct the first public-key encryption scheme in the Bounded-Retrieval Model (BRM), providing security against various forms of adversarial “key leakage” attacks. In th...
Joël Alwen, Yevgeniy Dodis, Moni Naor, Gil Se...
ICML
2003
IEEE
14 years 10 months ago
BL-WoLF: A Framework For Loss-Bounded Learnability In Zero-Sum Games
We present BL-WoLF, a framework for learnability in repeated zero-sum games where the cost of learning is measured by the losses the learning agent accrues (rather than the number...
Vincent Conitzer, Tuomas Sandholm
AUTOMATICA
2005
77views more  AUTOMATICA 2005»
13 years 9 months ago
A differential game of joint implementation of environmental projects
This paper proposes a two-player, finite-horizon differential game model to analyze joint implementation in environmental projects, one of the flexible mechanisms considered in th...
Michèle Breton, Georges Zaccour, Mehdi Zaha...