Coordinatore | THE HEBREW UNIVERSITY OF JERUSALEM.
Organization address
address: GIVAT RAM CAMPUS contact info |
Nazionalità Coordinatore | Israel [IL] |
Totale costo | 100˙000 € |
EC contributo | 100˙000 € |
Programma | FP7-PEOPLE
Specific programme "People" implementing the Seventh Framework Programme of the European Community for research, technological development and demonstration activities (2007 to 2013) |
Code Call | FP7-PEOPLE-2013-CIG |
Funding Scheme | MC-CIG |
Anno di inizio | 2013 |
Periodo (anno-mese-giorno) | 2013-09-01 - 2017-08-31 |
# | ||||
---|---|---|---|---|
1 |
THE HEBREW UNIVERSITY OF JERUSALEM.
Organization address
address: GIVAT RAM CAMPUS contact info |
IL (JERUSALEM) | coordinator | 100˙000.00 |
Esplora la "nuvola delle parole (Word Cloud) per avere un'idea di massima del progetto.
'Cryptography aims at designing schemes that are resilient to adversarial behavior. Although notions of adversarial behavior have significantly evolved over the years, the vast majority of cryptographic schemes are still analyzed in rather traditional adversarial models which do not capture various forms of unintendedly leakage of information (usually referred to as ``side channels'). Typical examples include electromagnetic measurements, timing information, and many more. Over the years side-channel attacks exposed crucial vulnerabilities in a large number of schemes that are in fact considered secure in the traditional models. Extensive research has been devoted to protecting against side-channels attacks, where traditional countermeasures aim at making the physical world as similar as possible to the abstract models by preventing unintended leakage of information (e.g., building ``tamper-proof' devices). This approach, however, is typically inefficient, and even impossible to realize in many cases.
Quite recently, research in cryptography has put forward a complementing approach, arguing that side channels should be taken into consideration, as much as possible, already in the initial design of systems, and not only during their implementation. Specifically, extensive research has been devoted to designing systems that are robust to realistic modifications of the traditional models. Despite this recent progress, however, research in cryptography is still quite far from obtaining a sufficiently good understanding of side channels. The main objectives of this proposal are to study the drawbacks and limitations of the current models and systems that have been developed so far, and to propose new approaches and techniques for realizing better, more realistic, ones. Accomplishing these objectives would minimize the gap between theory and practice in combating side channels, and as a result, increase the deployment of newly-developed leakage-resilient systems.'