D5.7 Final Report on Hardware-Operated Schemes

In this deliverable D5.7 "Final Report on Hardware-Operated Schemes" we describe the work that has been done in FENTEC related to the development of hardware-operated schemes. The deliverable summarizes activities in Task 5.4 until September 2020.

As defined in D5.1 "Security and Trust Models" the adversarial model involved in hardware-operated schemes is that of an adversary who is capable to mount physical attacks on FE implementations. Note that in contrast to hardware-assisted schemes (covered in D5.4), the complete platform is considered untrusted. Thus, any part of the implementation, whether running on SW and/or HW, needs to incorporate built-in protections against physical attacks.

Attachments: