|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 18 occurrences of 12 keywords
|
|
|
Results
Found 18 publication records. Showing 18 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
210 | Nicolas T. Courtois, Gregory V. Bard, David A. Wagner 0001 |
Algebraic and Slide Attacks on KeeLoq. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption, 15th International Workshop, FSE 2008, Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers, pp. 97-115, 2008, Springer, 978-3-540-71038-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
unbalanced Feistel ciphers, Gröbner bases, KeeLoq, block ciphers, SAT solvers, algebraic cryptanalysis, slide attacks |
210 | Sebastiaan Indesteege, Nathan Keller, Orr Dunkelman, Eli Biham, Bart Preneel |
A Practical Attack on KeeLoq. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT 2008, 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Istanbul, Turkey, April 13-17, 2008. Proceedings, pp. 1-18, 2008, Springer, 978-3-540-78966-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
KeeLoq, cryptanalysis, block ciphers, slide attacks, meet-in-the-middle attacks |
161 | Andrey Bogdanov |
Linear Slide Attacks on the KeeLoq Block Cipher. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inscrypt ![In: Information Security and Cryptology, Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers, pp. 66-80, 2007, Springer, 978-3-540-79498-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
KeeLoq, hopping codes, rolling codes, identify friend-or-foe, cryptanalysis, authentication protocols, linear cryptanalysis, key generation, slide attacks |
130 | Markus Kasper, Timo Kasper, Amir Moradi 0001, Christof Paar |
Breaking KeeLoq in a Flash: On Extracting Keys at Lightning Speed. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AFRICACRYPT ![In: Progress in Cryptology - AFRICACRYPT 2009, Second International Conference on Cryptology in Africa, Gammarth, Tunisia, June 21-25, 2009. Proceedings, pp. 403-420, 2009, Springer, 978-3-642-02383-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
123 | Thomas Eisenbarth 0001, Timo Kasper, Amir Moradi 0001, Christof Paar, Mahmoud Salmasizadeh, Mohammad T. Manzuri Shalmani |
On the Power of Power Analysis in the Real World: A Complete Break of the KeeLoqCode Hopping Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO 2008, 28th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2008. Proceedings, pp. 203-220, 2008, Springer, 978-3-540-85173-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
31 | Weijian Wu, Shiguo Chen, Dan Li |
二重keeloq算法在智能门禁系统中的应用研究 (Application of Dual Keeloq Algorithm in Intelligent Access Control System). ![Search on Bibsonomy](Pics/bibsonomy.png) |
计算机科学 ![In: 计算机科学 45(6A), pp. 573-575, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP BibTeX RDF |
|
31 | Pedro Malagón, Juan-Mariano de Goyeneche, David Fraga 0001, José Manuel Moya |
Bitslice software implementation of KeeLoq as a side-channel countermeasure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WESS ![In: Proceedings of the 10th Workshop on Embedded Systems Security, WESS 2015, Amsterdam, The Netherlands, October 8, 2015, pp. 4, 2015, ACM, 978-1-4503-3667-3. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
31 | Wim Aerts, Eli Biham, Dieter De Moitie, Elke De Mulder, Orr Dunkelman, Sebastiaan Indesteege, Nathan Keller, Bart Preneel, Guy A. E. Vandenbosch, Ingrid Verbauwhede |
A Practical Attack on KeeLoq. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Cryptol. ![In: J. Cryptol. 25(1), pp. 136-157, 2012. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
31 | Giovanni Agosta, Alessandro Barenghi, Gerardo Pelosi |
Exploiting Bit-level Parallelism in GPGPUs: a Case Study on KeeLoq Exhaustive Search Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARCS Workshops ![In: ARCS 2012 Workshops, 28. Februar - 2. März 2012, München, Germany, pp. 385-396, 2012, GI, 978-3-88579-294-9. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP BibTeX RDF |
|
31 | Nicolas T. Courtois, Gregory V. Bard |
Random Permutation Statistics and an Improved Slide-Determine Attack on KeeLoq. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cryptography and Security ![In: Cryptography and Security: From Theory to Applications - Essays Dedicated to Jean-Jacques Quisquater on the Occasion of His 65th Birthday, pp. 35-54, 2012, Springer, 978-3-642-28367-3. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
31 | Nicolas T. Courtois |
Self-similarity Attacks on Block Ciphers and Application to KeeLoq. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cryptography and Security ![In: Cryptography and Security: From Theory to Applications - Essays Dedicated to Jean-Jacques Quisquater on the Occasion of His 65th Birthday, pp. 55-66, 2012, Springer, 978-3-642-28367-3. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
31 | Thomas Eisenbarth 0001, Timo Kasper, Christof Paar, Sebastiaan Indesteege |
Keeloq. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Encyclopedia of Cryptography and Security (2nd Ed.) ![In: Encyclopedia of Cryptography and Security, 2nd Ed., pp. 671-673, 2011, Springer, 978-1-4419-5905-8. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
31 | Idan Sheetrit, Avishai Wool |
Cryptanalysis of KeeLoq code-hopping using a Single FPGA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2011, pp. 242, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
31 | Christof Paar, Thomas Eisenbarth 0001, Markus Kasper, Timo Kasper, Amir Moradi 0001 |
KeeLoq and Side-Channel Analysis-Evolution of an Attack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FDTC ![In: Sixth International Workshop on Fault Diagnosis and Tolerance in Cryptography, FDTC 2009, Lausanne, Switzerland, 6 September 2009, pp. 65-69, 2009, IEEE Computer Society, 978-0-7695-3824-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
31 | Thomas Eisenbarth 0001, Timo Kasper, Amir Moradi 0001, Christof Paar, Mahmoud Salmasizadeh, Mohammad T. Manzuri Shalmani |
Physical Cryptanalysis of KeeLoq Code Hopping Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2008, pp. 58, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP BibTeX RDF |
|
31 | Nicolas T. Courtois, Gregory V. Bard, David A. Wagner 0001 |
Algebraic and Slide Attacks on KeeLoq. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2007, pp. 62, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP BibTeX RDF |
|
31 | Andrey Bogdanov |
Cryptanalysis of the KeeLoq block cipher. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2007, pp. 55, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP BibTeX RDF |
|
25 | Nicolas T. Courtois, Sean O'Neil, Jean-Jacques Quisquater |
Practical Algebraic Attacks on the Hitag2 Stream Cipher. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 12th International Conference, ISC 2009, Pisa, Italy, September 7-9, 2009. Proceedings, pp. 167-176, 2009, Springer, 978-3-642-04473-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Hitag 2 algorithm, MiFare Crypto-1 cipher, Gröbner bases, Boolean functions, stream ciphers, RFID tags, SAT solvers, algebraic cryptanalysis |
Displaying result #1 - #18 of 18 (100 per page; Change: )
|
|