Chapter

Towards Hardware-Intrinsic Security

Part of the series Information Security and Cryptography pp 99-134

Date:

Leakage Resilient Cryptography in Practice

  • François-Xavier StandaertAffiliated withCrypto Group, Université catholique de Louvain Email author 
  • , Olivier PereiraAffiliated withCrypto Group, Université catholique de Louvain
  • , Yu YuAffiliated withCrypto Group, Université catholique de Louvain
  • , Jean-Jacques QuisquaterAffiliated withCrypto Group, Université catholique de Louvain
  • , Moti YungAffiliated withDepartment of Computer Science, Columbia UniversityGoogle Inc
  • , Elisabeth OswaldAffiliated withDepartment of Computer Science, University of Bristol

* Final gross prices may vary according to local VAT.

Get Access

Abstract

Theoretical treatments of physical attacks have recently attracted the attention of the cryptographic community, as witnessed by various publications, e.g., [1, 17, 22, 24, 29, 31, 33, 34, 42]. These works consider adversaries enhanced with abilities such as inserting faults during a computation or monitoring side-channel leakages.