Access Restriction

Author Coron, Jean-Sebastien ♦ Naccache, David ♦ Kocher, Paul
Source CiteSeerX
Content type Text
File Format PDF
Subject Domain (in DDC) Computer science, information & general works ♦ Data processing & computer science
Subject Keyword Secret Leakage ♦ Usual Complexity Assumption ♦ Real-life Device ♦ Di Erent Physical Channel ♦ Single Location
Abstract In addition to its usual complexity assumptions, cryptography silently assumes that information can be physically protected in a single location. As one can easily imagine, real-life devices are not ideal and information may leak through di#erent physical channels.
Educational Role Student ♦ Teacher
Age Range above 22 year
Educational Use Research
Education Level UG and PG ♦ Career/Technical Study
Publisher Date 2004-01-01