Chapter

Information Theoretic Security

Volume 5155 of the series Lecture Notes in Computer Science pp 70-70

Does Physical Security of Cryptographic Devices Need a Formal Study? (Invited Talk)

  • François-Xavier StandaertAffiliated withUCL Crypto Group, Université Catholique de Louvain
  • , Tal G. MalkinAffiliated withDept. of Computer Science, Columbia University
  • , Moti YungAffiliated withDept. of Computer Science, Columbia UniversityGoogle Inc.

* Final gross prices may vary according to local VAT.

Get Access

Abstract

Traditionally, cryptographic algorithms provide security against an adversary who has only black box access to cryptographic devices. That is, the only thing the adversary can do is to query the cryptographic algorithm on inputs of its choice and analyze the responses, which are always computed according to the correct original secret information. However, such a model does not always correspond to the realities of physical implementations.