Find out how to access preview-only content
Information Theoretic Security
Volume 5155 of the series Lecture Notes in Computer Science pp 70-70
Does Physical Security of Cryptographic Devices Need a Formal Study? (Invited Talk)
- François-Xavier StandaertAffiliated withUCL Crypto Group, Université Catholique de Louvain
- , Tal G. MalkinAffiliated withDept. of Computer Science, Columbia University
- , Moti YungAffiliated withDept. of Computer Science, Columbia UniversityGoogle Inc.
Abstract
Traditionally, cryptographic algorithms provide security against an adversary who has only black box access to cryptographic devices. That is, the only thing the adversary can do is to query the cryptographic algorithm on inputs of its choice and analyze the responses, which are always computed according to the correct original secret information. However, such a model does not always correspond to the realities of physical implementations.
Chapter Metrics
Reference tools
Other actions
- Title
- Does Physical Security of Cryptographic Devices Need a Formal Study? (Invited Talk)
- Book Title
- Information Theoretic Security
- Book Subtitle
- Third International Conference, ICITS 2008, Calgary, Canada, August 10-13, 2008. Proceedings
- Pages
- p 70
- Copyright
- 2008
- DOI
- 10.1007/978-3-540-85093-9_7
- Print ISBN
- 978-3-540-85092-2
- Online ISBN
- 978-3-540-85093-9
- Series Title
- Lecture Notes in Computer Science
- Series Volume
- 5155
- Series ISSN
- 0302-9743
- Publisher
- Springer Berlin Heidelberg
- Copyright Holder
- Springer-Verlag Berlin Heidelberg
- Additional Links
- Topics
- Industry Sectors
- eBook Packages
- Editors
- Authors
-
- François-Xavier Standaert (1)
- Tal G. Malkin (2)
- Moti Yung (2) (3)
- Author Affiliations
-
- 1. UCL Crypto Group, Université Catholique de Louvain,
- 2. Dept. of Computer Science, Columbia University,
- 3. Google Inc.,
Continue reading...
To view the rest of this content please follow the download PDF link above.