Practical Algebraic Attacks on the Hitag2 Stream Cipher
From MaRDI portal
Publication:3399209
DOI10.1007/978-3-642-04474-8_14zbMath1307.94050MaRDI QIDQ3399209
Jean-Jacques Quisquater, Nicolas T. Courtois, Sean O'Neil
Publication date: 29 September 2009
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-04474-8_14
Gröbner bases; stream ciphers; Boolean functions; RFID tags; algebraic cryptanalysis; SAT solvers; Hitag 2 algorithm; MiFare Crypto-1 cipher
94A60: Cryptography
Related Items
Algebraic cryptanalysis of stream ciphers using decomposition of Boolean function, Cryptographic properties of nested functions and algebraic immunity of the Boolean function in Hitag2 stream cipher
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- A new efficient algorithm for computing Gröbner bases \((F_4)\)
- Logical cryptanalysis as a SAT problem: Encoding and analysis of the U. S. Data Encryption Standard
- Algebraic Cryptanalysis of Curry and Flurry Using Correlated Messages
- Algebraic and Slide Attacks on KeeLoq
- Communication Theory of Secrecy Systems*
- Cryptanalysis of Block Ciphers with Overdefined Systems of Equations
- Advances in Cryptology - EUROCRYPT 2004
- Advances in Cryptology - CRYPTO 2003
- Algebraic Cryptanalysis of the Data Encryption Standard
- A Practical Attack on KeeLoq
- Fast Software Encryption
- Applications of SAT Solvers to Cryptanalysis of Hash Functions
- Topics in Cryptology – CT-RSA 2006