A Practical Attack on KeeLoq
From MaRDI portal
Publication:5458582
DOI10.1007/978-3-540-78967-3_1zbMath1149.94322MaRDI QIDQ5458582
Nathan Keller, Eli Biham, Sebastiaan Indesteege, Bart Preneel, Orr Dunkelman
Publication date: 15 April 2008
Published in: Advances in Cryptology – EUROCRYPT 2008 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-78967-3_1
94A60: Cryptography
Related Items
Meet-in-the-middle preimage attacks on sponge-based hashing, Stream/block ciphers, difference equations and algebraic attacks, A single-key attack on the full GOST block cipher, A graph theoretic method for securing key fobs, A Single-Key Attack on the Full GOST Block Cipher, Meet-in-the-Middle Attacks on Reduced-Round XTEA, A 3-Subset Meet-in-the-Middle Attack: Cryptanalysis of the Lightweight Block Cipher KTANTAN, Practical Algebraic Attacks on the Hitag2 Stream Cipher, Algebraic and Slide Attacks on KeeLoq, On the Power of Power Analysis in the Real World: A Complete Break of the KeeLoq Code Hopping Scheme, Public Key Authentication with Memory Tokens, A Leakage-Resilient Mode of Operation
Cites Work