2014
DOI: 10.1007/978-3-662-45611-8_12
|View full text |Cite
|
Sign up to set email alerts
|

Simulatable Leakage: Analysis, Pitfalls, and New Constructions

Abstract: Abstract. In 2013, Standaert et al. proposed the notion of simulatable leakage to connect theoretical leakage resilience with the practice of side channel attacks. Their use of simulators, based on physical devices, to support proofs of leakage resilience allows verification of underlying assumptions: the indistinguishability game, involving real vs. simulated leakage, can be 'played' by an evaluator. Using a concrete, block cipher based leakage resilient PRG and high-level simulator definition (based on conca… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
7
2

Relationship

2
7

Authors

Journals

citations
Cited by 14 publications
(5 citation statements)
references
References 16 publications
0
5
0
Order By: Relevance
“…A series of works [7,8,19,23] have proposed a number of leakage-resilient symmetric encryption schemes, message authentication codes, and authenticated encryption schemes. These constructions assume that a subset of their components (block cipher instances) are leakage-free and that the leakage in the other components is simulatable, an assumption that is somewhat contentious [21,26]. Based on these assumptions, they show that the security of their encryption schemes reduces to the security of a single-block variant of the same scheme.…”
Section: Related Workmentioning
confidence: 99%
“…A series of works [7,8,19,23] have proposed a number of leakage-resilient symmetric encryption schemes, message authentication codes, and authenticated encryption schemes. These constructions assume that a subset of their components (block cipher instances) are leakage-free and that the leakage in the other components is simulatable, an assumption that is somewhat contentious [21,26]. Based on these assumptions, they show that the security of their encryption schemes reduces to the security of a single-block variant of the same scheme.…”
Section: Related Workmentioning
confidence: 99%
“…However, the construction requires a leak free component and in practice relies on the existence of efficient simulators of the leakage from (e.g.) AES, simulators that Longo et al [33] demonstrate are unlikely to exist.…”
Section: Related Workmentioning
confidence: 99%
“…A different, but related, line of research recently proposed leakage models that better cope with the perspective of cryptographic engineering (see, e.g., [70,71,55]).…”
Section: Related Workmentioning
confidence: 99%