Paper 2011/314
Tamper-Proof Circuits: How to Trade Leakage for Tamper-Resilience
Sebastian Faust, Krzysztof Pietrzak, and Daniele Venturi
Abstract
Tampering attacks are cryptanalytic attacks on the implementation of cryptographic algorithms (e.g., smart cards), where an adversary introduces faults with the hope that the tampered device will reveal secret information. Inspired by the work of Ishai et al. [Eurocrypt'06], we propose a compiler that transforms any circuit into a new circuit with the same functionality, but which is resilient against a well-defined and powerful tampering adversary. More concretely, our transformed circuits remain secure even if the adversary can adaptively tamper with every wire in the circuit as long as the tampering fails with some probability
Metadata
- Available format(s)
-
PDF
- Category
- Foundations
- Publication info
- Published elsewhere. An extended abstract of this paper appears at ICALP 2011
- Keywords
- tamper resiliencecompiler
- Contact author(s)
- sfaust @ cs au dk
- History
- 2011-06-17: received
- Short URL
- https://ia.cr/2011/314
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2011/314, author = {Sebastian Faust and Krzysztof Pietrzak and Daniele Venturi}, title = {Tamper-Proof Circuits: How to Trade Leakage for Tamper-Resilience}, howpublished = {Cryptology {ePrint} Archive, Paper 2011/314}, year = {2011}, url = {https://eprint.iacr.org/2011/314} }