A practical attack on KeeLoq
From MaRDI portal
Recommendations
Cites work
- scientific article; zbMATH DE number 1759655 (Why is no real title available?)
- scientific article; zbMATH DE number 1418257 (Why is no real title available?)
- A cryptanalytic time-memory trade-off
- A fast new DES implementation in software
- Adavanced slide attacks
- Algebraic and Slide Attacks on KeeLoq
- Linear Slide Attacks on the KeeLoq Block Cipher
- New types of cryptanalytic attacks using related keys
- On the Power of Power Analysis in the Real World: A Complete Break of the KeeLoq Code Hopping Scheme
- Periodic ciphers with small blocks and cryptanalysis of Keeloq
- Self-similarity attacks on block ciphers and application to KeeLoq
Cited in
(11)- On the resilience of Even-Mansour to invariant permutations
- New slide attacks on almost self-similar ciphers
- Efficient slide attacks
- Meet-in-the-middle cube attack on reduced version of KeeLoq
- Self-similarity attacks on block ciphers and application to KeeLoq
- Related-key slide attacks on block ciphers with secret components
- Bagua: a NFSR-based stream cipher constructed following confusion and diffusion principles
- Algebraic and Slide Attacks on KeeLoq
- Linear Slide Attacks on the KeeLoq Block Cipher
- On the Power of Power Analysis in the Real World: A Complete Break of the KeeLoq Code Hopping Scheme
- A Practical Attack on KeeLoq
This page was built for publication: A practical attack on KeeLoq
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q421044)