The following pages link to A Practical Attack on KeeLoq (Q5458582):
Displaying 11 items.
- Stream/block ciphers, difference equations and algebraic attacks (Q820950) (← links)
- A single-key attack on the full GOST block cipher (Q1946603) (← links)
- A graph theoretic method for securing key fobs (Q2041164) (← links)
- A Single-Key Attack on the Full GOST Block Cipher (Q3013090) (← links)
- Meet-in-the-Middle Attacks on Reduced-Round XTEA (Q3073711) (← links)
- A 3-Subset Meet-in-the-Middle Attack: Cryptanalysis of the Lightweight Block Cipher KTANTAN (Q3084257) (← links)
- Practical Algebraic Attacks on the Hitag2 Stream Cipher (Q3399209) (← links)
- Algebraic and Slide Attacks on KeeLoq (Q3525663) (← links)
- On the Power of Power Analysis in the Real World: A Complete Break of the KeeLoq Code Hopping Scheme (Q3600221) (← links)
- Public Key Authentication with Memory Tokens (Q3605389) (← links)
- A Leakage-Resilient Mode of Operation (Q3627451) (← links)