HiTag2
From MaRDI portal
Software:26042
swMATH14133MaRDI QIDQ26042FDOQ26042
Author name not available (Why is that?)
Cited In (10)
- Cube cryptanalysis of Hitag2 stream cipher
- Algebraic, AIDA/Cube and side channel analysis of KATAN family of block ciphers
- Cryptographic properties of nested functions and algebraic immunity of the Boolean function in Hitag2 stream cipher
- Practical Algebraic Attacks on the Hitag2 Stream Cipher
- A graph theoretic method for securing key fobs
- Fuming Acid and Cryptanalysis: Handy Tools for Overcoming a Digital Locking and Access Control System
- Breaking Hitag 2 Revisited
- Algebraic cryptanalysis of stream ciphers using decomposition of Boolean function
- Security, privacy, and applied cryptography engineering. Second international conference, SPACE 2012, Chennai, India, November 3--4, 2012. Proceedings
- Applying remote side-channel analysis attacks on a security-enabled NFC tag
This page was built for software: HiTag2