Alfonso De Gregorio

Learn More
Facts Faulty outputs may expose the secret key material; The nature of computation is physical; No dependability, no trust; Physical attacks are not ruled out by the remote (black-box) scenario. Motivation Questions Are fault attacks " viable " also at standard environmental conditions (i.e., without producing excursions outside the normal operating ranges(More)
With physical attacks threatening the security of current cryptographic schemes, no security policy can be developed without taking into account the physical nature of computation. In this article we first introduce the notion of Cryptographic Key Failure Tolerance, then we offer a framework for the determination of upper bounds to the key lifetimes for any(More)
  • 1