HiTag2
From MaRDI portal
Software:26042
No author found.
Related Items (10)
Cube Cryptanalysis of Hitag2 Stream Cipher ⋮ Algebraic cryptanalysis of stream ciphers using decomposition of Boolean function ⋮ Applying Remote Side-Channel Analysis Attacks on a Security-Enabled NFC Tag ⋮ Breaking Hitag 2 Revisited ⋮ Cryptographic properties of nested functions and algebraic immunity of the Boolean function in Hitag2 stream cipher ⋮ Security, privacy, and applied cryptography engineering. Second international conference, SPACE 2012, Chennai, India, November 3--4, 2012. Proceedings ⋮ Algebraic, AIDA/Cube and Side Channel Analysis of KATAN Family of Block Ciphers ⋮ A graph theoretic method for securing key fobs ⋮ Practical Algebraic Attacks on the Hitag2 Stream Cipher ⋮ Fuming Acid and Cryptanalysis: Handy Tools for Overcoming a Digital Locking and Access Control System
This page was built for software: HiTag2