-
3
-
-
57049128814
-
Dismantling MIFARE Classic
-
Springer, [GKM+08], Sushil Jajodia and Javier Lopez, editors
-
[GKM+08] Flavio D. Garcia, Gerhard de Koning Gans, Ruben Muijrers, Peter van Rossum, Roel Verdult, Ronny Wichers Schreur, and Bart Jacobs. Dismantling MIFARE Classic. In Sushil Jajodia and Javier Lopez, editors, European Symposium on Research in Computer Security (ESORICS '08), volume 5283 of Lecture Notes in Computer Science, pages 97-114. Springer, 2008.
-
(2008)
European Symposium on Research in Computer Security (ESORICS '08), Volume 5283 of Lecture Notes in Computer Science
, pp. 97-114
-
-
Garcia, F.D.1
De Koning Gans, G.2
Muijrers, R.3
Van Rossum, P.4
Verdult, R.5
Schreur, R.W.6
Jacobs, B.7
-
5
-
-
52949116081
-
A practical attack on the MIFARE Classic
-
[KHG08], Gilles Grimaud and Francois-Xavier Standaert, editors, Springer
-
[KHG08] Gerhard de Koning Gans, Jaap-Henk Hoepman, and Flavio D. Garcia. A practical attack on the MIFARE Classic. In Gilles Grimaud and Francois-Xavier Standaert, editors, Smart Card Research and Advanced Application (CARDIS '08), volume 5189 of Lecture Notes in Computer Science, pages 267-282. Springer, 2008.
-
(2008)
Smart Card Research and Advanced Application (CARDIS '08), Volume 5189 of Lecture Notes in Computer Science
, pp. 267-282
-
-
De Koning Gans, G.1
Hoepman, J.-H.2
Garcia, F.D.3
-
6
-
-
33750843983
-
Breaking ciphers with COPACOBANA - A cost-optimized parallel code breaker
-
[KPP+06], Springer
-
[KPP+06] Sandeep Kumar, Christof Paar, Jan Pelzl, Gerd Pfeiffer, and Manfred Schimmler. Breaking ciphers with COPACOBANA - a cost-optimized parallel code breaker. In Cryptographic Hardware and Embedded Systems (CHES '06), volume 4249 of Lecture Notes in Computer Science, pages 101-118. Springer, 2006.
-
(2006)
Cryptographic Hardware and Embedded Systems (CHES '06), Volume 4249 of Lecture Notes in Computer Science
, pp. 101-118
-
-
Kumar, S.1
Paar, C.2
Pelzl, J.3
Pfeiffer, G.4
Schimmler, M.5
-
7
-
-
84880901653
-
The order of encryption and authentication for protecting communications (or: How secure is SSL?)
-
[Kra01], Springer
-
[Kra01] Hugo Krawczyk. The order of encryption and authentication for protecting communications (or: How secure is SSL?). In Advances in Cryptology (CRYPTO '01), pages 310-331. Springer, 2001.
-
(2001)
Advances in Cryptology (CRYPTO '01)
, pp. 310-331
-
-
Krawczyk, H.1
-
8
-
-
70449683074
-
-
[MAD07], May
-
[MAD07] Mifare application directory. http://www.nxp.com/acrobat- download/other/identification/M001830.pdf, May 2007.
-
(2007)
Mifare Application Directory
-
-
-
9
-
-
70449647705
-
-
[MFS08], January
-
[MFS08] MF1ICS50 functional specification. http: //www.nxp.com/acrobat/ other/identification/M001053-MF1ICS50-rev5-3.pdf, January 2008.
-
(2008)
MF1ICS50 Functional Specification
-
-
-
10
-
-
84893081352
-
Reverse-engineering a cryptographic RFID tag
-
[NESP08]
-
[NESP08] Karsten Nohl, David Evans, Starbug, and Henryk Plötz. Reverse-engineering a cryptographic RFID tag. In USENIX Security 2008, pages 185-193, 2008.
-
(2008)
USENIX Security 2008
, pp. 185-193
-
-
Nohl, K.1
Starbug, D.E.2
Plötz, H.3
-
11
-
-
52949153857
-
-
[Noh08]
-
[Noh08] Karsten Nohl. Cryptanalysis of Crypto-1. http://www.cs.virginia. edu/~kn5f/Mifare.Cryptanalysis.htm, 2008.
-
(2008)
Cryptanalysis of Crypto-1
-
-
Nohl, K.1
-
12
-
-
70349143716
-
Mifare, little security despite obscurity
-
[NP07], Presentation at
-
[NP07] Karsten Nohl and Henryk Plötz. Mifare, little security despite obscurity. Presentation at Chaos Computer Congress, 2007.
-
(2007)
Chaos Computer Congress
-
-
Nohl, K.1
Plötz, H.2
|