-
4
-
-
84857768581
-
Power analysis of Atmel CryptoMemory - Recovering keys from secure EEPROMs
-
Springer-Verlag
-
Josep Balasch, Benedikt Gierlichs, Roel Verdult, Lejla Batina, and Ingrid Verbauwhede. Power analysis of Atmel CryptoMemory - recovering keys from secure EEPROMs. In 12th Cryptographers’ Track at the RSA Conference (CT-RSA 2012), volume 7178 of Lecture Notes in Computer Science, pages 19–34. Springer-Verlag, 2012.
-
(2012)
12th Cryptographers’ Track at the RSA Conference (CT-RSA 2012), Volume 7178 of Lecture Notes in Computer Science
, pp. 19-34
-
-
Balasch, J.1
Gierlichs, B.2
Verdult, R.3
Batina, L.4
Verbauwhede, I.5
-
5
-
-
79959313688
-
Cryptanalysis of the Atmel cipher in Secure-Memory, CryptoMemory and CryptoRF
-
Springer-Verlag
-
Alex Biryukov, Ilya Kizhvatov, and Bin Zhang. Cryptanalysis of the Atmel cipher in Secure-Memory, CryptoMemory and CryptoRF. In 9th Applied Cryptography and Network Security (ACNS 2011), pages 91–109. Springer-Verlag, 2011.
-
(2011)
9th Applied Cryptography and Network Security (ACNS 2011)
, pp. 91-109
-
-
Biryukov, A.1
Kizhvatov, I.2
Zhang, B.3
-
6
-
-
33745626422
-
Improved time-memory trade-offs with multiple data
-
Springer-Verlag
-
Alex Biryukov, Sourav Mukhopadhyay, and Palash Sarkar. Improved time-memory trade-offs with multiple data. In 13th International Workshop on Selected Areas in Cryptography (SAC 2006), volume 3897 of Lecture Notes in Computer Science, pages 110–127. Springer-Verlag, 2006.
-
(2006)
13th International Workshop on Selected Areas in Cryptography (SAC 2006), Volume 3897 of Lecture Notes in Computer Science
, pp. 110-127
-
-
Biryukov, A.1
Mukhopadhyay, S.2
Sarkar, P.3
-
10
-
-
84877887414
-
Security analysis of a cryptographically-enabled RFID device
-
USENIX Association
-
Stephen C. Bono, Matthew Green, Adam Stubble-field, Ari Juels, Aviel D. Rubin, and Michael Szydlo. Security analysis of a cryptographically-enabled RFID device. In 14th USENIX Security Symposium (USENIX Security 2005), pages 1–16. USENIX Association, 2005.
-
(2005)
14th USENIX Security Symposium (USENIX Security 2005)
, pp. 1-16
-
-
Bono, S.C.1
Green, M.2
Stubble-Field, A.3
Juels, A.4
Rubin, A.D.5
Szydlo, M.6
-
11
-
-
0008997475
-
On the time-memory tradeoff between exhaustive key search and table precomputation
-
Johan Borst, Bart Preneel, Joos Vandewalle, and Joos V. On the time-memory tradeoff between exhaustive key search and table precomputation. In 19th Symposium in Information Theory in the Benelux, pages 111–118, 1998.
-
(1998)
19th Symposium in Information Theory in the Benelux
, pp. 111-118
-
-
Borst, J.1
Preneel, B.2
Vandewalle, J.3
Joos, V.4
-
12
-
-
74549163670
-
The dark side of security by obscurity - And cloning MIFARE Classic rail and building passes, anywhere, anytime
-
INSTICC Press
-
Nicolas T. Courtois. The dark side of security by obscurity - and cloning MIFARE Classic rail and building passes, anywhere, anytime. In 4th International Conference on Security and Cryptography (SECRYPT 2009), pages 331–338. INSTICC Press, 2009.
-
(2009)
4th International Conference on Security and Cryptography (SECRYPT 2009)
, pp. 331-338
-
-
Courtois, N.T.1
-
13
-
-
50249137714
-
Algebraic and slide attacks on KeeLoq
-
Springer-Verlag
-
Nicolas T. Courtois, Gregory V. Bard, and David Wagner. Algebraic and slide attacks on KeeLoq. In 15th International Workshop on Fast Software Encryption (FSE 2000), volume 5086 of Lecture Notes in Computer Science, pages 97–115. Springer-Verlag, 2008.
-
(2008)
15th International Workshop on Fast Software Encryption (FSE 2000), Volume 5086 of Lecture Notes in Computer Science
, pp. 97-115
-
-
Courtois, N.T.1
Bard, G.V.2
Wagner, D.3
-
14
-
-
70350431832
-
Practical algebraic attacks on the Hitag2 stream cipher
-
Springer-Verlag
-
Nicolas T. Courtois, Sean O’Neil, and Jean-Jacques Quisquater. Practical algebraic attacks on the Hitag2 stream cipher. In 12th Information Security Conference (ISC 2009), volume 5735 of Lecture Notes in Computer Science, pages 167–176. Springer-Verlag, 2009.
-
(2009)
12th Information Security Conference (ISC 2009), Volume 5735 of Lecture Notes in Computer Science
, pp. 167-176
-
-
Courtois, N.T.1
O’Neil, S.2
Quisquater, J.-J.3
-
16
-
-
52949116081
-
A practical attack on the MIFARE Classic
-
Springer-Verlag
-
Gerhard de Koning Gans, Jaap-Henk Hoepman, and Flavio D. Garcia. A practical attack on the MIFARE Classic. In 8th Smart Card Research and Advanced Applications Conference (CARDIS 2008), volume 5189 of Lecture Notes in Computer Science, pages 267–282. Springer-Verlag, 2008.
-
(2008)
8th Smart Card Research and Advanced Applications Conference (CARDIS 2008), Volume 5189 of Lecture Notes in Computer Science
, pp. 267-282
-
-
De Koning Gans, G.1
Hoepman, J.-H.2
Garcia, F.D.3
-
19
-
-
57049128814
-
Dismantling MIFARE Classic
-
Springer-Verlag
-
Flavio D. Garcia, Gerhard de Koning Gans, Ruben Muijrers, Peter van Rossum, Roel Verdult, Ronny Wichers Schreur, and Bart Jacobs. Dismantling MIFARE Classic. In 13th European Symposium on Research in Computer Security (ESORICS 2008), volume 5283 of Lecture Notes in Computer Science, pages 97–114. Springer-Verlag, 2008.
-
(2008)
13th European Symposium on Research in Computer Security (ESORICS 2008), Volume 5283 of Lecture Notes in Computer Science
, pp. 97-114
-
-
Garcia, F.D.1
De Koning Gans, G.2
Muijrers, R.3
Van Rossum, P.4
Verdult, R.5
Schreur, R.W.6
Jacobs, B.7
-
20
-
-
85084162982
-
Exposing iClass key diversification
-
San Francisco, CA, USA, USENIX Association
-
Flavio D. Garcia, Gerhard de Koning Gans, and Roel Verdult. Exposing iClass key diversification. In 5th USENIX Workshop on Offensive Technologies (USENIX WOOT 2011), pages 128–136, San Francisco, CA, USA, 2011. USENIX Association.
-
(2011)
5th USENIX Workshop on Offensive Technologies (USENIX WOOT 2011)
, pp. 128-136
-
-
Garcia, F.D.1
De Koning Gans, G.2
Verdult, R.3
-
21
-
-
84865580416
-
Dismantling iclass and iclass elite
-
Springer-Verlag
-
Flavio D. Garcia, Gerhard de Koning Gans, Roel Verdult, and Milosch Meriac. Dismantling iClass and iClass Elite. In 17th European Symposium on Research in Computer Security (ESORICS 2012), Lecture Notes in Computer Science. Springer-Verlag, 2012.
-
(2012)
17th European Symposium on Research in Computer Security (ESORICS 2012), Lecture Notes in Computer Science
-
-
Garcia, F.D.1
De Koning Gans, G.2
Verdult, R.3
Meriac, M.4
-
22
-
-
70350601194
-
Wirelessly pickpocketing a mifare classic card
-
IEEE Computer Society
-
Flavio D. Garcia, Peter van Rossum, Roel Verdult, and Ronny Wichers Schreur. Wirelessly pickpocketing a mifare classic card. In 30th IEEE Symposium on Security and Privacy (S&P 2009), pages 3–15. IEEE Computer Society, 2009.
-
(2009)
30th IEEE Symposium on Security and Privacy (S&P 2009)
, pp. 3-15
-
-
Garcia, F.D.1
Van Rossum, P.2
Verdult, R.3
Schreur, R.W.4
-
23
-
-
78650005375
-
Dismantling securememory, cryptomemory and cryptorf
-
Flavio D. Garcia, Peter van Rossum, Roel Verdult, and Ronny Wichers Schreur. Dismantling SecureMemory, CryptoMemory and CryptoRF. In 17th ACM Conference on Computer and Communications Security (CCS 2010), pages 250–259. ACM/SIGSAC, 2010.
-
(2010)
17th ACM Conference on Computer and Communications Security (CCS 2010)
, pp. 250-259
-
-
Garcia, F.D.1
Van Rossum, P.2
Verdult, R.3
Schreur, R.W.4
-
24
-
-
33751067978
-
Practical attacks on proximity identification systems (short paper)
-
IEEE Computer Society
-
Gerhard P. Hancke. Practical attacks on proximity identification systems (short paper). In 27th IEEE Symposium on Security and Privacy (S&P 2006), pages 328–333. IEEE Computer Society, 2006.
-
(2006)
27th IEEE Symposium on Security and Privacy (S&P 2006)
, pp. 328-333
-
-
Hancke, G.P.1
-
26
-
-
0024014397
-
Keyless entry system with radio card transponder
-
Motoki Hirano, Mikio Takeuchi, Takahisa Tomoda, and Kin-Ichiro Nakano. Keyless entry system with radio card transponder. IEEE Transactions on Industrial Electronics, 35:208–216, 1988.
-
(1988)
IEEE Transactions on Industrial Electronics
, vol.35
, pp. 208-216
-
-
Hirano, M.1
Takeuchi, M.2
Tomoda, T.3
Nakano, K.-I.4
-
27
-
-
44449126213
-
A practical attack on KeeLoq
-
Springer-Verlag
-
Sebastiaan Indesteege, Nathan Keller, Orr Dunkelmann, Eli Biham, and Bart Preneel. A practical attack on KeeLoq. In 27th International Conference on the Theory and Application of Cryptographic Techniques, Advances in Cryptology (EUROCRYPT 2008), volume 4965 of Lecture Notes in Computer Science, pages 1–8. Springer-Verlag, 2008.
-
(2008)
27th International Conference on the Theory and Application of Cryptographic Techniques, Advances in Cryptology (EUROCRYPT 2008), Volume 4965 of Lecture Notes in Computer Science
, pp. 1-8
-
-
Indesteege, S.1
Keller, N.2
Dunkelmann, O.3
Biham, E.4
Preneel, B.5
-
28
-
-
70350678744
-
Breaking KeeLoq in a flash: On extracting keys at lightning speed
-
Springer-Verlag
-
Markus Kasper, Timo Kasper, Amir Moradi, and Christof Paar. Breaking KeeLoq in a flash: on extracting keys at lightning speed. In 2nd International Conference on Cryptology in Africa, Progress in Cryptology (AFRICACRYPT 2009), volume 5580 of Lecture Notes in Computer Science, pages 403–420. Springer-Verlag, 2009.
-
(2009)
2nd International Conference on Cryptology in Africa, Progress in Cryptology (AFRICACRYPT 2009), Volume 5580 of Lecture Notes in Computer Science
, pp. 403-420
-
-
Kasper, M.1
Kasper, T.2
Moradi, A.3
Paar, C.4
-
29
-
-
85076231596
-
-
Keyline. Transponder guide. http://www.keyline.it/files/884/transponder guide 16729.pdf, 2012.
-
(2012)
Transponder Guide
-
-
-
32
-
-
24644519038
-
An open approach for designing secure electronic immobilizers
-
Springer-Verlag
-
Kerstin Lemke, Ahmad-Reza Sadeghi, and Christian Stble. An open approach for designing secure electronic immobilizers. In Information Security Practice and Experience (ISPEC 2005), volume 3439 of Lecture Notes in Computer Science, pages 230–242. Springer-Verlag, 2005.
-
(2005)
Information Security Practice and Experience (ISPEC 2005), Volume 3439 of Lecture Notes in Computer Science
, pp. 230-242
-
-
Lemke, K.1
Sadeghi, A.-R.2
Stble, C.3
-
36
-
-
85076202642
-
-
Transponder IC, Nov NXP Semiconductors
-
Transponder IC, Hitag2. Product Data Sheet, Nov 2010. NXP Semiconductors.
-
(2010)
Hitag2. Product Data Sheet
-
-
-
37
-
-
70349218325
-
-
Hitag pro. NXP Semiconductors
-
Hitag pro. Product Data Sheet, 2011. NXP Semiconductors.
-
(2011)
Product Data Sheet
-
-
-
40
-
-
84871572206
-
TARDIS: Time and remanence decay in SRAM to implement secure protocols on embedded devices without clocks
-
USENIX Association
-
Amir Rahmati, Mastooreh Salajegheh, Dan Holcomb, Jacob Sorber, Wayne P. Burleson, and Kevin Fu. TARDIS: Time and remanence decay in SRAM to implement secure protocols on embedded devices without clocks. In 21st USENIX Security Symposium (USENIX Security 2012). USENIX Association, 2012.
-
(2012)
21st USENIX Security Symposium (USENIX Security 2012)
-
-
Rahmati, A.1
Salajegheh, M.2
Holcomb, D.3
Sorber, J.4
Burleson, W.P.5
Fu, K.6
-
41
-
-
3843081053
-
A statistical test suite for the validation of random number generators and pseudo random number generators for cryptographic applications
-
Andrew Rukhin, Juan Soto, James Nechvatal, Miles Smid, Elaine Barker, Stefan Leigh, Mark Levenson, Mark Vangel, David Banks, Alan Heckert, James Dray, and San Vo. A statistical test suite for the validation of random number generators and pseudo random number generators for cryptographic applications. NIST Special Publication, pages 800–822, 2001.
-
(2001)
NIST Special Publication
, pp. 800-822
-
-
Rukhin, A.1
Soto, J.2
Nechvatal, J.3
Smid, M.4
Barker, E.5
Leigh, S.6
Levenson, M.7
Vangel, M.8
Banks, D.9
Heckert, A.10
Dray, J.11
Vo, S.12
-
42
-
-
70350650942
-
Extending SAT solvers to cryptographic problems
-
Springer-Verlag
-
Mate Soos, Karsten Nohl, and Claude Castelluccia. Extending SAT solvers to cryptographic problems. In 12th International Conference on Theory and Applications of Satisfiability Testing (SAT 2009), volume 5584 of Lecture Notes in Computer Science, pages 244–257. Springer-Verlag, 2009.
-
(2009)
12th International Conference on Theory and Applications of Satisfiability Testing (SAT 2009), Volume 5584 of Lecture Notes in Computer Science
, pp. 244-257
-
-
Soos, M.1
Nohl, K.2
Castelluccia, C.3
-
44
-
-
83755180536
-
Cube cryptanalysis of Hitag2 stream cipher
-
Springer-Verlag
-
Siwei Sun, Lei Hu, Yonghong Xie, and Xiangyong Zeng. Cube cryptanalysis of Hitag2 stream cipher. In 10th International Conference on Cryptology and Network Security (CANS 2011), volume 7092 of Lecture Notes in Computer Science, pages 15–25. Springer-Verlag, 2011.
-
(2011)
10th International Conference on Cryptology and Network Security (CANS 2011), Volume 7092 of Lecture Notes in Computer Science
, pp. 15-25
-
-
Sun, S.1
Hu, L.2
Xie, Y.3
Zeng, X.4
-
46
-
-
67449129215
-
A security module for car appliances
-
Pang-Chieh Wang, Ting-Wei Hou, Jung-Hsuan Wu, and Bo-Chiuan Chen. A security module for car appliances. International Journal of World Academy Of Science, Engineering and Technology, 26:155–160, 2007.
-
(2007)
International Journal of World Academy of Science, Engineering and Technology
, vol.26
, pp. 155-160
-
-
Wang, P.-C.1
Hou, T.-W.2
Wu, J.-H.3
Chen, B.-C.4
-
49
-
-
67449159018
-
Design of an in-vehicle anti-theft component
-
IEEE Computer Society
-
Jung-Hsuan Wu, Chien-Chuan Kung, Jhan-Hao Rao, Pang-Chieh Wang, Cheng-Liang Lin, and Ting-Wei Hou. Design of an in-vehicle anti-theft component. In 8th International Conference on Intelligent Systems Design and Applications (ISDA 2008), volume 1, pages 566–569. IEEE Computer Society, 2008.
-
(2008)
8th International Conference on Intelligent Systems Design and Applications (ISDA 2008)
, vol.1
, pp. 566-569
-
-
Wu, J.-H.1
Kung, C.-C.2
Rao, J.-H.3
Wang, P.-C.4
Lin, C.-L.5
Hou, T.-W.6
|