Practical Algebraic Attacks on the Hitag2 Stream Cipher
From MaRDI portal
Publication:3399209
DOI10.1007/978-3-642-04474-8_14zbMath1307.94050OpenAlexW1654132081MaRDI QIDQ3399209
Sean O'Neil, Jean-Jacques Quisquater, Nicolas T. Courtois
Publication date: 29 September 2009
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-04474-8_14
Gröbner basesstream ciphersBoolean functionsRFID tagsalgebraic cryptanalysisSAT solversHitag 2 algorithmMiFare Crypto-1 cipher
Related Items (3)
Algebraic cryptanalysis of stream ciphers using decomposition of Boolean function ⋮ Cryptographic properties of nested functions and algebraic immunity of the Boolean function in Hitag2 stream cipher ⋮ A graph theoretic method for securing key fobs
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- A new efficient algorithm for computing Gröbner bases \((F_4)\)
- Logical cryptanalysis as a SAT problem: Encoding and analysis of the U. S. Data Encryption Standard
- Algebraic Cryptanalysis of Curry and Flurry Using Correlated Messages
- Algebraic and Slide Attacks on KeeLoq
- Communication Theory of Secrecy Systems*
- Cryptanalysis of Block Ciphers with Overdefined Systems of Equations
- Advances in Cryptology - EUROCRYPT 2004
- Advances in Cryptology - CRYPTO 2003
- Algebraic Cryptanalysis of the Data Encryption Standard
- A Practical Attack on KeeLoq
- Fast Software Encryption
- Applications of SAT Solvers to Cryptanalysis of Hash Functions
- Topics in Cryptology – CT-RSA 2006
This page was built for publication: Practical Algebraic Attacks on the Hitag2 Stream Cipher