Affiliation:
1. Gemplus, Issy-les-Moulineaux, France
2. Cryptography Research, Inc., San Francisco, CA
Abstract
In addition to its usual complexity assumptions, cryptography silently assumes that information can be physically protected in a single location. As one can easily imagine, real-life devices are not ideal and information may leak through different physical channels.This paper gives a rigorous definition of leakage immunity and presents several leakage detection tests. In these tests, failure
confirms
the probable existence of secret-correlated emanations and indicates how likely the leakage is. Success
does not refute
the existence of emanations but indicates that significant emanations were not detected
on the strength of the evidence presented
, which of course, leaves the door open to reconsider the situation if further evidence comes to hand at a later date.
Publisher
Association for Computing Machinery (ACM)
Subject
Hardware and Architecture,Software
Reference24 articles.
1. Anderson R. and Kuhn M. 1996. Tamper resistance---a cautionary note. In The Second usenix Workshop on Electronic Commerce. 1--11.]] Anderson R. and Kuhn M. 1996. Tamper resistance---a cautionary note. In The Second usenix Workshop on Electronic Commerce. 1--11.]]
2. Logical Reversibility of Computation
Cited by
30 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献