HiTag2
From MaRDI portal
Software:26042
swMATH14133MaRDI QIDQ26042FDOQ26042
Author name not available (Why is that?)
Cited In (10)
- Cryptographic properties of nested functions and algebraic immunity of the Boolean function in Hitag2 stream cipher
- Practical Algebraic Attacks on the Hitag2 Stream Cipher
- Cube Cryptanalysis of Hitag2 Stream Cipher
- A graph theoretic method for securing key fobs
- Algebraic, AIDA/Cube and Side Channel Analysis of KATAN Family of Block Ciphers
- Applying Remote Side-Channel Analysis Attacks on a Security-Enabled NFC Tag
- Fuming Acid and Cryptanalysis: Handy Tools for Overcoming a Digital Locking and Access Control System
- Breaking Hitag 2 Revisited
- Algebraic cryptanalysis of stream ciphers using decomposition of Boolean function
- Security, privacy, and applied cryptography engineering. Second international conference, SPACE 2012, Chennai, India, November 3--4, 2012. Proceedings
This page was built for software: HiTag2