Cryptanalytic attacks on MIFARE classic protocol
From MaRDI portal
Publication:4910243
DOI10.1007/978-3-642-36095-4_16zbMATH Open1312.94051OpenAlexW169764288MaRDI QIDQ4910243FDOQ4910243
Authors: J. Dj. Golić
Publication date: 18 March 2013
Published in: Topics in Cryptology – CT-RSA 2013 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-36095-4_16
Recommendations
RFIDstream ciphersdifferential attacksNFCinversion atackskey reconstruction attacksrepeated nonce attacksresynchronization attackssmart card attacks
Cited In (7)
- Can a differential attack work for an arbitrarily large number of rounds?
- The fall of a tiny star
- Cryptanalysis of GlobalPlatform secure channel protocols
- A practical attack on patched MIFARE Classic
- Decrypting without keys: the case of the GlobalPlatform SCP02 protocol
- Side-channel analysis of cryptographic RFIDs with analog demodulation
- Logical formalisation and analysis of the Mifare Classic card in PVS
This page was built for publication: Cryptanalytic attacks on MIFARE classic protocol
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4910243)