“…In addition to constructions of randomized PKE mentioned above, leakage-resilient schemes for several tasks in a variety of leakage models are now known, e.g., digital signatures [LW10,BSW11,LLW11], identity-based encryption [BKKV10,CDRW10,LRW11], interactive proofs [GJS11,Pan14,AGP14], secure computation [FRR + 10, BGJK12,GR12], and so on. We remark that the study of leakage-resilient cryptography was initiated in [DP08,MR04,ISW03] as an attempt to provide an algorithmic defense against side-channel attacks [Koc96,AK97,QS01,OST06]. Renauld, Standaert, Veyrat-Charvillon, Kamel, and Flandre [RSV + 11] highlight several difficulties in formalizing an appropriate model of leakage for real-world side-channel attacks, and argue that often an algorithmic defense is not possible since the key might have been completely compromised.…”