A Practical Attack on KeeLoq
From MaRDI portal
Publication:5458582
DOI10.1007/978-3-540-78967-3_1zbMath1149.94322OpenAlexW2132161909MaRDI QIDQ5458582
Nathan Keller, Eli Biham, Sebastiaan Indesteege, Bart Preneel, Orr Dunkelman
Publication date: 15 April 2008
Published in: Advances in Cryptology – EUROCRYPT 2008 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-78967-3_1
Related Items (12)
Stream/block ciphers, difference equations and algebraic attacks ⋮ Meet-in-the-middle preimage attacks on sponge-based hashing ⋮ A single-key attack on the full GOST block cipher ⋮ Algebraic and Slide Attacks on KeeLoq ⋮ A Single-Key Attack on the Full GOST Block Cipher ⋮ On the Power of Power Analysis in the Real World: A Complete Break of the KeeLoq Code Hopping Scheme ⋮ Public Key Authentication with Memory Tokens ⋮ A graph theoretic method for securing key fobs ⋮ Meet-in-the-Middle Attacks on Reduced-Round XTEA ⋮ A Leakage-Resilient Mode of Operation ⋮ A 3-Subset Meet-in-the-Middle Attack: Cryptanalysis of the Lightweight Block Cipher KTANTAN ⋮ Practical Algebraic Attacks on the Hitag2 Stream Cipher
Cites Work
This page was built for publication: A Practical Attack on KeeLoq