Objective "Modern cryptographic security definitions do not capture real world adversaries who can attack the algorithm's physical implementation, as they do not take into account so called side-channel attacks where the adversary learns information about the internal state of the cryptosystem during execution, for example by measuring the running time or the power consumption of a smart-card.Current research on side-channels security resembles a cat and mouse game. New attacks are discovered, and then heuristic countermeasures are proposed to prevent this particular new attacks. This is fundamentally different from the ""provable security"" approach followed by modern cryptography, where one requires that a cryptosystem is proven secure against all adversaries in a broad and well-defined attack scenario. Clearly, this situation is unsatisfactory: what is provable security good for, if ultimately the security of a cryptosystem hinges on some ad-hoc side-channel countermeasure?Despite this, until recently the theory community did not give much attention to this problem as it was believed that side-channels are a practical problem, and theory can only be of limited use to prevent them. But recently results indicate that this view is much too pessimistic.On a high level, the goal of this project is to bring research on side-channels from the realm of engineering and security research to modern cryptography. One aspect of this proposal it to further investigate the framework of leakage-resilience which adapts the methodology of provable security to the physical world. If a cryptosystem is leakage-resilient, then this implies that its implementation is secure against every side-channel attack, making only some mild (basically minimal) assumptions on the underlying hardware." Fields of science natural sciencescomputer and information sciencescomputer securitycryptographynatural sciencescomputer and information sciencesartificial intelligenceheuristic programming Programme(s) FP7-IDEAS-ERC - Specific programme: "Ideas" implementing the Seventh Framework Programme of the European Community for research, technological development and demonstration activities (2007 to 2013) Topic(s) ERC-SG-PE6 - ERC Starting Grant - Computer science and informatics Call for proposal ERC-2010-StG_20091028 See other projects for this call Funding Scheme ERC-SG - ERC Starting Grant Coordinator INSTITUTE OF SCIENCE AND TECHNOLOGY AUSTRIA Address Am campus 1 3400 Klosterneuburg Austria See on map Region Ostösterreich Niederösterreich Wiener Umland/Nordteil Activity type Higher or Secondary Education Establishments Principal investigator Krzysztof Pietrzak (Prof.) Administrative Contact Barbara Abraham (Ms.) Links Contact the organisation Opens in new window Website Opens in new window EU contribution No data Beneficiaries (2) Sort alphabetically Sort by EU Contribution Expand all Collapse all INSTITUTE OF SCIENCE AND TECHNOLOGY AUSTRIA Austria EU contribution € 1 004 651,78 Address Am campus 1 3400 Klosterneuburg See on map Region Ostösterreich Niederösterreich Wiener Umland/Nordteil Activity type Higher or Secondary Education Establishments Principal investigator Krzysztof Pietrzak (Prof.) Administrative Contact Barbara Abraham (Ms.) Links Contact the organisation Opens in new window Website Opens in new window Other funding No data STICHTING CENTRUM VOOR WISKUNDE EN INFORMATICA Participation ended Netherlands EU contribution € 116 554,22 Address Science park 123 1098XG Amsterdam See on map Activity type Research Organisations Administrative Contact Margriet Brouwer (Ms.) Links Contact the organisation Opens in new window Website Opens in new window Other funding No data