LRC

Leakage-Resilient Cryptography

 Coordinatore THE HEBREW UNIVERSITY OF JERUSALEM. 

 Organization address address: GIVAT RAM CAMPUS
city: JERUSALEM
postcode: 91904

contact info
Titolo: Ms.
Nome: Hani
Cognome: Ben Yehuda
Email: send email
Telefono: +972 2 6586618

 Nazionalità Coordinatore Israel [IL]
 Totale costo 100˙000 €
 EC contributo 100˙000 €
 Programma FP7-PEOPLE
Specific programme "People" implementing the Seventh Framework Programme of the European Community for research, technological development and demonstration activities (2007 to 2013)
 Code Call FP7-PEOPLE-2013-CIG
 Funding Scheme MC-CIG
 Anno di inizio 2013
 Periodo (anno-mese-giorno) 2013-09-01   -   2017-08-31

 Partecipanti

# participant  country  role  EC contrib. [€] 
1    THE HEBREW UNIVERSITY OF JERUSALEM.

 Organization address address: GIVAT RAM CAMPUS
city: JERUSALEM
postcode: 91904

contact info
Titolo: Ms.
Nome: Hani
Cognome: Ben Yehuda
Email: send email
Telefono: +972 2 6586618

IL (JERUSALEM) coordinator 100˙000.00

Mappa


 Word cloud

Esplora la "nuvola delle parole (Word Cloud) per avere un'idea di massima del progetto.

leakage    extensive    resilient    adversarial    years    cryptography    schemes    devoted    designing    quite    channels    models    attacks    behavior    realistic   

 Obiettivo del progetto (Objective)

'Cryptography aims at designing schemes that are resilient to adversarial behavior. Although notions of adversarial behavior have significantly evolved over the years, the vast majority of cryptographic schemes are still analyzed in rather traditional adversarial models which do not capture various forms of unintendedly leakage of information (usually referred to as ``side channels'). Typical examples include electromagnetic measurements, timing information, and many more. Over the years side-channel attacks exposed crucial vulnerabilities in a large number of schemes that are in fact considered secure in the traditional models. Extensive research has been devoted to protecting against side-channels attacks, where traditional countermeasures aim at making the physical world as similar as possible to the abstract models by preventing unintended leakage of information (e.g., building ``tamper-proof' devices). This approach, however, is typically inefficient, and even impossible to realize in many cases.

Quite recently, research in cryptography has put forward a complementing approach, arguing that side channels should be taken into consideration, as much as possible, already in the initial design of systems, and not only during their implementation. Specifically, extensive research has been devoted to designing systems that are robust to realistic modifications of the traditional models. Despite this recent progress, however, research in cryptography is still quite far from obtaining a sufficiently good understanding of side channels. The main objectives of this proposal are to study the drawbacks and limitations of the current models and systems that have been developed so far, and to propose new approaches and techniques for realizing better, more realistic, ones. Accomplishing these objectives would minimize the gap between theory and practice in combating side channels, and as a result, increase the deployment of newly-developed leakage-resilient systems.'

Altri progetti dello stesso programma (FP7-PEOPLE)

SITELITE (2012)

"Deterministic coupling between SITE-controlled, dilute nitride-based LighT Emitters and tailor-made photonic-crystal structures"

Read More  

FIBROGELNET (2013)

Network for Development of Soft Nanofibrous Construct for Cellular Therapy of Degenerative Skeletal Disorders

Read More  

FLUCYC (2009)

Asymmetric Fluorocyclisations

Read More