Universite Bordeaux 1
Leakage-resilient cryptography aims at formally proving the security of cryptographic implementations against large classes of side-channel adversaries. One important challenge for such an approach to be relevant is to adequately connect the formal models used in the proofs with the practice of side-channel attacks. It raises the fundamental problem of finding reasonable restrictions of the leakage functions that can be empirically verified by evaluation laboratories. In this paper, the authors first argue that the previous \"Bounded leakage\" requirements used in leakage-resilient cryptography are hard to fulfill by hardware engineers.