메뉴 건너뛰기




Volumn , Issue , 2009, Pages 3-15

Wirelessly pickpocketing a Mifare Classic card

Author keywords

[No Author keywords available]

Indexed keywords

COMMUNICATION SESSIONS; CONTACT LESS; KNOWN-PLAINTEXT ATTACKS; MAN IN THE MIDDLE ATTACKS; PARITY BITS; PLAINTEXT; PROTOCOL STACK; SECRET KEY; SIDE-CHANNEL; STREAM CIPHERS; SYSTEM INTEGRATORS; WIRELESS ACCESS;

EID: 70350601194     PISSN: 10816011     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SP.2009.6     Document Type: Conference Paper
Times cited : (85)

References (12)
  • 2
    • 58149096831 scopus 로고    scopus 로고
    • Algebraic attacks on the Crypto-1 stream cipher in Mifare Classic and Oyster cards
    • [CNO08]
    • [CNO08] Nicolas T. Courtois Karsten Nohl, Sean O'Neil. Algebraic attacks on the Crypto-1 stream cipher in Mifare Classic and Oyster Cards. Cryptology ePrint Archive Report 2008/166 2008.
    • (2008) Cryptology ePrint Archive, Report 2008/166
    • Courtois, N.T.1    Nohl, K.2    O'Neil, S.3
  • 7
    • 84880901653 scopus 로고    scopus 로고
    • The order of encryption and authentication for protecting communications (or: How secure is SSL?)
    • [Kra01], Springer
    • [Kra01] Hugo Krawczyk. The order of encryption and authentication for protecting communications (or: How secure is SSL?). In Advances in Cryptology (CRYPTO '01), pages 310-331. Springer, 2001.
    • (2001) Advances in Cryptology (CRYPTO '01) , pp. 310-331
    • Krawczyk, H.1
  • 8
    • 70449683074 scopus 로고    scopus 로고
    • [MAD07], May
    • [MAD07] Mifare application directory. http://www.nxp.com/acrobat- download/other/identification/M001830.pdf, May 2007.
    • (2007) Mifare Application Directory
  • 9
    • 70449647705 scopus 로고    scopus 로고
    • [MFS08], January
    • [MFS08] MF1ICS50 functional specification. http: //www.nxp.com/acrobat/ other/identification/M001053-MF1ICS50-rev5-3.pdf, January 2008.
    • (2008) MF1ICS50 Functional Specification
  • 10
    • 84893081352 scopus 로고    scopus 로고
    • Reverse-engineering a cryptographic RFID tag
    • [NESP08]
    • [NESP08] Karsten Nohl, David Evans, Starbug, and Henryk Plötz. Reverse-engineering a cryptographic RFID tag. In USENIX Security 2008, pages 185-193, 2008.
    • (2008) USENIX Security 2008 , pp. 185-193
    • Nohl, K.1    Starbug, D.E.2    Plötz, H.3
  • 11
    • 52949153857 scopus 로고    scopus 로고
    • [Noh08]
    • [Noh08] Karsten Nohl. Cryptanalysis of Crypto-1. http://www.cs.virginia. edu/~kn5f/Mifare.Cryptanalysis.htm, 2008.
    • (2008) Cryptanalysis of Crypto-1
    • Nohl, K.1
  • 12
    • 70349143716 scopus 로고    scopus 로고
    • Mifare, little security despite obscurity
    • [NP07], Presentation at
    • [NP07] Karsten Nohl and Henryk Plötz. Mifare, little security despite obscurity. Presentation at Chaos Computer Congress, 2007.
    • (2007) Chaos Computer Congress
    • Nohl, K.1    Plötz, H.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.