Breaking KeeLoq in a Flash: On Extracting Keys at Lightning Speed (English)
- New search for: Kasper, Markus
- New search for: Kasper, Timo
- New search for: Moradi, Amir
- New search for: Paar, Christof
- New search for: Kasper, Markus
- New search for: Kasper, Timo
- New search for: Moradi, Amir
- New search for: Paar, Christof
In:
Progress in Cryptology – AFRICACRYPT 2009
9
;
403-420
;
2009
- Article/Chapter (Book) / Electronic Resource
-
Title:Breaking KeeLoq in a Flash: On Extracting Keys at Lightning Speed
-
Contributors:Kasper, Markus ( author ) / Kasper, Timo ( author ) / Moradi, Amir ( author ) / Paar, Christof ( author )
-
Published in:Progress in Cryptology – AFRICACRYPT 2009 , 9 ; 403-420Lecture Notes in Computer Science ; 5580, 9 ; 403-420
-
Publisher:
- New search for: Springer Berlin Heidelberg
-
Place of publication:Berlin, Heidelberg
-
Publication date:2009-01-01
-
Size:18 pages
-
ISBN:
-
ISSN:
-
DOI:
-
Type of media:Article/Chapter (Book)
-
Type of material:Electronic Resource
-
Language:English
-
Keywords:
-
Source:
Table of contents eBook
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
Second Preimage Attack on 5-Pass HAVAL and Partial Key-Recovery Attack on HMAC/NMAC-5-Pass HAVALWang, Gaoli / Wang, Shaohui et al. | 2009
- 14
-
Cryptanalysis of VortexAumasson, Jean-Philippe / Dunkelman, Orr / Mendel, Florian / Rechberger, Christian / Thomsen, Søren S. et al. | 2009
- 29
-
Two Passes of Tiger Are Not One-WayMendel, Florian et al. | 2009
- 41
-
Generic Attacks on Feistel Networks with Internal PermutationsTreger, Joana / Patarin, Jacques et al. | 2009
- 60
-
Distinguishers for Ciphers and Known Key Attack against Rijndael with Large BlocksMinier, Marine / Phan, Raphael C. -W. / Pousse, Benjamin et al. | 2009
- 77
-
Reducing Key Length of the McEliece CryptosystemBerger, Thierry P. / Cayrel, Pierre-Louis / Gaborit, Philippe / Otmani, Ayoub et al. | 2009
- 98
-
Cryptanalysis of RSA Using the Ratio of the PrimesNitaj, Abderrahmane et al. | 2009
- 116
-
New RSA-Based (Selectively) Convertible Undeniable Signature SchemesPhong, Le Trieu / Kurosawa, Kaoru / Ogata, Wakaha et al. | 2009
- 135
-
A Schnorr-Like Lightweight Identity-Based Signature SchemeGalindo, David / Garcia, Flavio D. et al. | 2009
- 149
-
On the Theoretical Gap between Group Signatures with and without UnlinkabilityOhtake, Go / Fujii, Arisa / Hanaoka, Goichiro / Ogawa, Kazuto et al. | 2009
- 167
-
Practical Threshold Signatures with Linear Secret Sharing SchemesBozkurt, İlker Nadi / Kaya, Kamer / Selçuk, Ali Aydın et al. | 2009
- 179
-
Certified Encryption RevisitedFarshim, Pooya / Warinschi, Bogdan et al. | 2009
- 198
-
Threshold Attribute-Based Signatures and Their Application to Anonymous Credential SystemsShahandashti, Siamak F. / Safavi-Naini, Reihaneh et al. | 2009
- 217
-
Anonymity from Public Key Encryption to Undeniable SignaturesAimani, Laila et al. | 2009
- 235
-
Security Analysis of Standard Authentication and Key Agreement Protocols Utilising TimestampsBarbosa, Manuel / Farshim, Pooya et al. | 2009
- 254
-
Password-Authenticated Group Key Agreement with Adaptive Security and ContributivenessAbdalla, Michel / Catalano, Dario / Chevalier, Céline / Pointcheval, David et al. | 2009
- 272
-
Unifying Zero-Knowledge Proofs of KnowledgeMaurer, Ueli et al. | 2009
- 287
-
Co-sound Zero-Knowledge with Public KeysVentre, Carmine / Visconti, Ivan et al. | 2009
- 305
-
Another Look at Extended Private Information Retrieval ProtocolsBringer, Julien / Chabanne, Hervé et al. | 2009
- 323
-
Constructing Universally Composable Oblivious Transfers from Double Trap-Door EncryptionsZhu, Huafei / Bao, Feng et al. | 2009
- 334
-
Exponent Recoding and Regular Exponentiation AlgorithmsJoye, Marc / Tunstall, Michael et al. | 2009
- 350
-
Efficient Acceleration of Asymmetric Cryptography on Graphics HardwareHarrison, Owen / Waldron, John et al. | 2009
- 368
-
Fast Elliptic-Curve Cryptography on the Cell Broadband EngineCostigan, Neil / Schwabe, Peter et al. | 2009
- 386
-
On Modular Decomposition of IntegersBrumley, Billy Bob / Nyberg, Kaisa et al. | 2009
- 403
-
Breaking KeeLoq in a Flash: On Extracting Keys at Lightning SpeedKasper, Markus / Kasper, Timo / Moradi, Amir / Paar, Christof et al. | 2009
- 421
-
An Improved Fault Based Attack of the Advanced Encryption StandardMukhopadhyay, Debdeep et al. | 2009