Abstract. With physical attacks threatening the security of current cryptographic schemes, no security policy can be developed without tak-ing into account the physical nature of computation. In this paper we adapt classical reliability modeling techniques to cryp-tographic systems. We do so by first introducing the notions of Crypto-graphic Key Failure Tolerance and Cryptographic Key Reliable Lifetimes. Then we offer a framework for the determination of reliable lifetimes of keys for any cryptographic scheme used in the presence of faults, given an accepted (negligible) error-bound to the risk of key exposure. Finally we emphasize the importance of selecting keys and designing schemes with good values of failure tolerance, and recommend mi...
We develop the notion of Exposure-Resilient Cryptography. While standard crypto-graphic definitions ...
The confidentiality of encrypted data depends on how well the key under which it was encrypted is ma...
AbstractNew definitions are proposed for the security of Transient-Key Cryptography (a variant on Pu...
Abstract. With physical attacks threatening the security of current cryptographic schemes, no securi...
This book constitutes the refereed proceedings of the Third International Workshop on Fault Diagnosi...
Abstract. In this report, we are concerned with models to analyze the security of cryptographic algo...
Mistakes in cryptographic software implementations of-ten undermine the strong security guarantees o...
Presentation of the "Workshop on fault diagnosis and tolerance in cryptography" - FDTC 2004. Cryptog...
We study several basic problems in cryptography: Leakage resilient cryptography: cryptographic schem...
Abstract. This survey paper studies recent advances in the field of Leakage-Resilient Cryptography. ...
Abstract—Fault injections constitute a major threat to the security of embedded systems. Errors occu...
We introduce the concept of reliability in watermarking as the ability of assessing that a probabili...
This dissertation examines security vulnerabilities that arise due to communication failures and inc...
It is important to create a cryptographic system such that the encryption system does not depend on ...
In traditional cryptography, the standard way of examining the security of a scheme is to analyze it...
We develop the notion of Exposure-Resilient Cryptography. While standard crypto-graphic definitions ...
The confidentiality of encrypted data depends on how well the key under which it was encrypted is ma...
AbstractNew definitions are proposed for the security of Transient-Key Cryptography (a variant on Pu...
Abstract. With physical attacks threatening the security of current cryptographic schemes, no securi...
This book constitutes the refereed proceedings of the Third International Workshop on Fault Diagnosi...
Abstract. In this report, we are concerned with models to analyze the security of cryptographic algo...
Mistakes in cryptographic software implementations of-ten undermine the strong security guarantees o...
Presentation of the "Workshop on fault diagnosis and tolerance in cryptography" - FDTC 2004. Cryptog...
We study several basic problems in cryptography: Leakage resilient cryptography: cryptographic schem...
Abstract. This survey paper studies recent advances in the field of Leakage-Resilient Cryptography. ...
Abstract—Fault injections constitute a major threat to the security of embedded systems. Errors occu...
We introduce the concept of reliability in watermarking as the ability of assessing that a probabili...
This dissertation examines security vulnerabilities that arise due to communication failures and inc...
It is important to create a cryptographic system such that the encryption system does not depend on ...
In traditional cryptography, the standard way of examining the security of a scheme is to analyze it...
We develop the notion of Exposure-Resilient Cryptography. While standard crypto-graphic definitions ...
The confidentiality of encrypted data depends on how well the key under which it was encrypted is ma...
AbstractNew definitions are proposed for the security of Transient-Key Cryptography (a variant on Pu...