Breaking a Hitag2 Protocol with Low Cost Technology
暂无分享,去创建一个
[1] Flavio D. Garcia,et al. Lock It and Still Lose It - on the (In)Security of Automotive Remote Keyless Entry Systems , 2016, USENIX Security Symposium.
[2] Roel Verdult,et al. The (in)security of proprietary cryptography , 2015 .
[3] Jean-Jacques Quisquater,et al. Practical Algebraic Attacks on the Hitag2 Stream Cipher , 2009, ISC.
[4] Flavio D. Garcia,et al. Gone in 360 Seconds: Hijacking with Hitag2 , 2012, USENIX Security Symposium.
[5] Lei Hu,et al. Cube Cryptanalysis of Hitag2 Stream Cipher , 2011, CANS.
[6] Tim Güneysu,et al. Cryptanalysis with COPACOBANA , 2008, IEEE Transactions on Computers.
[7] Martin Novotný,et al. Breaking Hitag2 with Reconfigurable Hardware , 2011, 2011 14th Euromicro Conference on Digital System Design.
[8] Jeffrey S. Vetter,et al. A Survey of Methods for Analyzing and Improving GPU Energy Efficiency , 2014, ACM Comput. Surv..