Impossibility of black-box simulation against leakage attacks