-
1
-
-
70350385117
-
Cube Testers and Key Recovery Attacks on Reduced-Round MD6 and Trivium
-
Dunkelman, O. (ed.) FSE 2009. Springer, Heidelberg
-
Aumasson, J.-P., Dinur, I., Meier, W., Shamir, A.: Cube Testers and Key Recovery Attacks on Reduced-Round MD6 and Trivium. In: Dunkelman, O. (ed.) FSE 2009. LNCS, vol. 5665, pp. 1-22. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5665
, pp. 1-22
-
-
Aumasson, J.-P.1
Dinur, I.2
Meier, W.3
Shamir, A.4
-
2
-
-
44449137280
-
Attacks on the KeeLoq Block Cipher and Authentication System
-
Bogdanov, A.: Attacks on the KeeLoq Block Cipher and Authentication System. In: RFIDSec 2007 (2007)
-
(2007)
RFIDSec 2007
-
-
Bogdanov, A.1
-
3
-
-
83755210767
-
Cube Attacks on Trivium
-
ePrint Archive
-
Bedi, S., Pillai, R.: Cube Attacks on Trivium. IACR Cryptology ePrint Archive, 15 (2009)
-
(2009)
IACR Cryptology
, pp. 15
-
-
Bedi, S.1
Pillai, R.2
-
4
-
-
44449126213
-
A practical attack on KeeLoq
-
DOI 10.1007/978-3-540-78967-3-1, Advances in Cryptology - EUROCRYPT 2008 - 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings
-
Biham, E., Dunkelman, O., Indesteege, S., Keller, N., Preneel, B.: How to Steal Cars - A Practical Attack on KeeLoq. In: Smart, N.P. (ed.) EUROCRYPT 2008. LNCS, vol. 4965, pp. 1-18. Springer, Heidelberg (2008) (Pubitemid 351762820)
-
(2008)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4965 LNCS
, pp. 1-18
-
-
Indesteege, S.1
Keller, N.2
Dunkelman, O.3
Biham, E.4
Preneel, B.5
-
5
-
-
74549123338
-
The Dark Side of Security by Obscurity and Cloning MiFare Classic Rail and Building Passes Anywhere, Anytime
-
Courtois, N.: The Dark Side of Security by Obscurity and Cloning MiFare Classic Rail and Building Passes Anywhere, Anytime. In: SECRYPT 2009: International Conference on Security and Cryptography, Milan, Italy, July 7-10 (2009)
-
SECRYPT 2009: International Conference on Security and Cryptography, Milan, Italy, July 7-10 (2009)
-
-
Courtois, N.1
-
6
-
-
50249137714
-
Algebraic and Slide Attacks on KeeLoq
-
Nyberg, K. (ed.) FSE 2008. Springer, Heidelberg
-
Courtois, N.T., Bard, G.V., Wagner, D.: Algebraic and Slide Attacks on KeeLoq. In: Nyberg, K. (ed.) FSE 2008. LNCS, vol. 5086, pp. 97-115. Springer, Heidelberg (2008), http://eprint.iacr.org/2007/062
-
(2008)
LNCS
, vol.5086
, pp. 97-115
-
-
Courtois, N.T.1
Bard, G.V.2
Wagner, D.3
-
7
-
-
35248820612
-
Algebraic Attacks on Stream Ciphers with Linear Feedback
-
Biham, E. (ed.) EUROCRYPT 2003. Springer, Heidelberg
-
Courtois, N., Meier, W.: Algebraic Attacks on Stream Ciphers with Linear Feedback. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol. 2656, pp. 345-359. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2656
, pp. 345-359
-
-
Courtois, N.1
Meier, W.2
-
10
-
-
70350431832
-
Practical Algebraic Attacks on the Hitag2 Stream Cipher
-
Samarati, P., Yung, M., Martinelli, F., Ardagna, C.A. (eds.) ISC 2009. Springer, Heidelberg
-
Courtois, N.T., O'Neil, S., Quisquater, J.-J.: Practical Algebraic Attacks on the Hitag2 Stream Cipher. In: Samarati, P., Yung, M., Martinelli, F., Ardagna, C.A. (eds.) ISC 2009. LNCS, vol. 5735, pp. 167-176. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5735
, pp. 167-176
-
-
Courtois, N.T.1
O'Neil, S.2
Quisquater, J.-J.3
-
11
-
-
67650699727
-
Cube Attacks on Tweakable Black Box Polynomials
-
Joux, A. (ed.) EUROCRYPT 2009. Springer, Heidelberg
-
Dinur, I., Shamir, A.: Cube Attacks on Tweakable Black Box Polynomials. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol. 5479, pp. 278-299. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5479
, pp. 278-299
-
-
Dinur, I.1
Shamir, A.2
-
12
-
-
52949116081
-
A Practical Attack on the MIFARE Classic
-
Grimaud, G., Standaert, F.-X. (eds.) CARDIS 2008. Springer, Heidelberg
-
de Koning Gans, G., Hoepman, J.-H., Garcia, F.D.: A Practical Attack on the MIFARE Classic. In: Grimaud, G., Standaert, F.-X. (eds.) CARDIS 2008. LNCS, vol. 5189, pp. 267-282. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5189
, pp. 267-282
-
-
De Koning Gans, G.1
Hoepman, J.-H.2
Garcia, F.D.3
-
13
-
-
57049128814
-
Dismantling MIFARE Classic
-
Jajodia, S., Lopez, J. (eds.) ESORICS 2008. Springer, Heidelberg
-
Garcia, F.D., de Koning Gans, G., Muijrers, R., van Rossum, P., Verdult, R., Schreur, R.W., Jacobs, B.: Dismantling MIFARE Classic. In: Jajodia, S., Lopez, J. (eds.) ESORICS 2008. LNCS, vol. 5283, pp. 97-114. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5283
, pp. 97-114
-
-
Garcia, F.D.1
De Koning Gans, G.2
Muijrers, R.3
Van Rossum, P.4
Verdult, R.5
Schreur, R.W.6
Jacobs, B.7
-
16
-
-
84893081352
-
Reverse-engineering a cryptographic RFID tag
-
Nohl, K., Evans, D., Starbug, S., Plötz, H.: Reverse-engineering a cryptographic RFID tag. In: USENIX Security 2008 (2008)
-
(2008)
USENIX Security 2008
-
-
Nohl, K.1
Evans, D.2
Starbug, S.3
Plötz, H.4
-
17
-
-
84855340784
-
-
Philips Semiconductors Corporation: Version 2.1
-
Philips Semiconductors Corporation: Philips Semiconductors Data Sheet, HT2 Transponder Family, Communication Protocol, Reader, HITAG2(R) Transponder, Product Specification, Version 2.1, http://www.phreaker.ru/showthread.php?p=226
-
Philips Semiconductors Data Sheet, HT2 Transponder Family, Communication Protocol, Reader, HITAG2(R) Transponder, Product Specification
-
-
-
18
-
-
77954090834
-
Chosen-IV statistical attacks on eStream ciphers
-
INSTICC Press
-
Saarinen, M.: Chosen-IV statistical attacks on eStream ciphers. In: SECRYPT 2006, pp. 260-266. INSTICC Press (2006)
-
(2006)
SECRYPT 2006
, pp. 260-266
-
-
Saarinen, M.1
-
19
-
-
48249152755
-
Breaking ONE.TRIVIUM by AIDA and Algebraic IV Differential Attack
-
ePrint Archive
-
Vielhaber, M.: Breaking ONE.TRIVIUM by AIDA and Algebraic IV Differential Attack. IACR Cryptology ePrint Archive, 413 (2007)
-
(2007)
IACR Cryptology
, pp. 413
-
-
Vielhaber, M.1
-
20
-
-
83755210762
-
AIDA Breaks (BIVIUM A and B) in 1 Minute Dual Core CPU Time
-
ePrint Archive
-
Vielhaber, M.: AIDA Breaks (BIVIUM A and B) in 1 Minute Dual Core CPU Time. IACR Cryptology ePrint Archive, 402 (2009)
-
(2009)
IACR Cryptology
, pp. 402
-
-
Vielhaber, M.1
|