-
1
-
-
0028446389
-
Fortifying key negotiation schemes with poorly chosen passwords
-
AL94
-
[AL94] RJ Anderson and TMA Lomas. Fortifying key negotiation schemes with poorly chosen passwords. Electronics letters, 30(13):1040–1041, 1994.
-
(1994)
Electronics Letters
, vol.30
, Issue.13
, pp. 1040-1041
-
-
Anderson, R.J.1
Lomas, T.M.A.2
-
2
-
-
85077803375
-
Inside contactless
-
Con04 Technical report, November
-
[Con04] Inside Contactless. Datasheet PicoPass 2KS. Technical report, November 2004.
-
(2004)
Datasheet PicoPass 2KS
-
-
-
3
-
-
70350431832
-
Practical algebraic attacks on the hitag2 stream cipher
-
COQ09 Springer
-
[COQ09] Nicolas T. Courtois, Sean O’Neil, and Jean-Jacques Quisquater. Practical Algebraic Attacks on the Hitag2 Stream Cipher. In Information Security, volume 5735 of Lecture Notes in Computer Science, pages 167–176. Springer, 2009.
-
(2009)
Information Security, Volume 5735 of Lecture Notes in Computer Science
, pp. 167-176
-
-
Courtois, N.T.1
O’Neil, S.2
Quisquater, J.-J.3
-
6
-
-
0004039472
-
-
Fou98 Electronic Frontier Foundation. O’Reilly & Associates, Inc., Sebastopol, CA, USA
-
[Fou98] Electronic Frontier Foundation. Cracking DES: Secrets of Encryption Research, Wiretap Politics and Chip Design. O’Reilly & Associates, Inc., Sebastopol, CA, USA, 1998.
-
(1998)
Cracking DES: Secrets of Encryption Research, Wiretap Politics and Chip Design
-
-
-
7
-
-
57049128814
-
Dismantling MIFARE classic
-
GdKGM+08 Springer
-
+08] Flavio D. Garcia, Gerhard de Koning Gans, Ruben Muijrers, Peter van Rossum, Roel Verdult, Ronny Wichers Schreur, and Bart Jacobs. Dismantling Mifare Classic. In Computer Security - ESORICS 2008, volume 5283 of Lecture Notes in Computer Science, pages 97–114. Springer, 2008.
-
(2008)
Computer Security - ESORICS 2008, Volume 5283 of Lecture Notes in Computer Science
, pp. 97-114
-
-
Garcia, F.D.1
de Koning Gans, G.2
Muijrers, R.3
van Rossum, P.4
Verdult, R.5
Schreur, R.W.6
Jacobs, B.7
-
9
-
-
70350601194
-
Wirelessly pickpocketing a mifare classic card
-
GvRVS09 IEEE
-
[GvRVS09] Flavio D. Garcia, Peter van Rossum, Roel Verdult, and Ronny Wichers Schreur. Wirelessly pickpocketing a Mifare Classic card. In Proceedings of the 2009 IEEE Symposium on Security and Privacy, pages 3–15. IEEE, 2009.
-
(2009)
Proceedings of the 2009 IEEE Symposium on Security and Privacy
, pp. 3-15
-
-
Garcia, F.D.1
van Rossum, P.2
Verdult, R.3
Schreur, R.W.4
-
10
-
-
78650005375
-
Dismantling securememory, cryptomemory and cryptorf
-
GvRVS10 ACM
-
[GvRVS10] Flavio D. Garcia, Peter van Rossum, Roel Verdult, and Ronny Wichers Schreur. Dismantling SecureMemory, CryptoMemory and CryptoRF. In 17th ACM Conference on Computer and Communications Security (CCS 2010), pages 250–259. ACM, 2010.
-
(2010)
17th ACM Conference on Computer and Communications Security (CCS 2010)
, pp. 250-259
-
-
Garcia, F.D.1
van Rossum, P.2
Verdult, R.3
Schreur, R.W.4
-
11
-
-
0019038335
-
A cryptanalytic time-memory trade-off
-
Hel80
-
[Hel80] M. Hellman. A cryptanalytic time-memory trade-off. Information Theory, IEEE Transactions on, 26(4):401–406, 1980.
-
(1980)
Information Theory, IEEE Transactions on
, vol.26
, Issue.4
, pp. 401-406
-
-
Hellman, M.1
-
12
-
-
44449126213
-
A practical attack on keeloq
-
IKD+08 Springer
-
+08] Sebastiaan Indesteege, Nathan Keller, Orr Dunkelmann, Eli Biham, and Bart Preneel. A Practical Attack on KeeLoq. In Advances in Cryptology - EUROCRYPT 2008, volume 4965 of Lecture Notes in Computer Science, pages 1–8. Springer, 2008.
-
(2008)
Advances in Cryptology - EUROCRYPT 2008, Volume 4965 of Lecture Notes in Computer Science
, pp. 1-8
-
-
Indesteege, S.1
Keller, N.2
Dunkelmann, O.3
Biham, E.4
Preneel, B.5
-
15
-
-
67650099368
-
Attacks on the DECT authentication mechanisms
-
LST+09
-
+09] S. Lucks, A. Schuler, E. Tews, R.P. Weinmann, and M. Wenzel. Attacks on the DECT authentication mechanisms. Topics in Cryptology–CT-RSA 2009, pages 48–65, 2009.
-
(2009)
Topics in Cryptology–CT-RSA 2009
, pp. 48-65
-
-
Lucks, S.1
Schuler, A.2
Tews, E.3
Weinmann, R.P.4
Wenzel, M.5
-
17
-
-
85077787968
-
Analyzing a modern cryptographic RFID system HID iclass demystified
-
MP10 December
-
[MP10] Milosch Meriac and Henryk Plötz. Analyzing a modern cryptographic RFID system HID iClass demystified. Presentation at the 27th Chaos Computer Congress, December 2010.
-
(2010)
Presentation at the 27th Chaos Computer Congress
-
-
Meriac, M.1
Plötz, H.2
-
18
-
-
84893081352
-
Reverse engineering a cryptographic RFID tag
-
NESP08
-
[NESP08] Karsten Nohl, David Evans, Starbug, and Henryk Plötz. Reverse Engineering a Cryptographic RFID Tag. In USENIX Security ’08, pages 185–193, 2008.
-
(2008)
USENIX Security ’08
, pp. 185-193
-
-
Nohl, K.1
Evans, D.2
Starbug3
Plötz, H.4
-
19
-
-
70350650942
-
Extending SAT solvers to cryptographic problems
-
SNC09 Oliver Kullmann, editor, Springer Berlin / Heidelberg
-
[SNC09] Mate Soos, Karsten Nohl, and Claude Castelluccia. Extending SAT Solvers to Cryptographic Problems. In Oliver Kullmann, editor, Theory and Applications of Satisfiability Testing - SAT 2009, volume 5584 of Lecture Notes in Computer Science, pages 244–257. Springer Berlin / Heidelberg, 2009.
-
(2009)
Theory and Applications of Satisfiability Testing - SAT 2009, Volume 5584 of Lecture Notes in Computer Science
, pp. 244-257
-
-
Soos, M.1
Nohl, K.2
Castelluccia, C.3
-
20
-
-
85077798969
-
-
WDS+04 Technical report, November
-
+04] Werner Waitz, L Dixon, S Schwab, L Hanna, T Muth, Marc Jacquinot, and Abu Ismail. OMNIKEY Contactless Smart Card Readers Developers Guide. Technical report, November 2004.
-
(2004)
OMNIKEY Contactless Smart Card Readers Developers Guide
-
-
Waitz, W.1
Dixon, L.2
Schwab, S.3
Hanna, L.4
Muth, T.5
Jacquinot, M.6
Ismail, A.7
|