Back to Results
First PageMeta Content
Crypto-1 / Stream cipher / KeeLoq / Block cipher / Radio-frequency identification / Cipher / Cryptanalysis / Strong cryptography / Key / Cryptography / Key management / MIFARE


USENIX Security Symposium. San Jose, CA. 31 JulyReverse-Engineering a Cryptographic RFID Tag Karsten Nohl and David Evans University of Virginia Department of Computer Science
Add to Reading List

Document Date: 2008-05-14 16:00:09


Open Document

File Size: 245,83 KB

Share Result on Facebook

City

London / San Jose / /

Company

RFID Systems / Philips Semiconductors / Authentication Systems / O’Reilly & Associates Inc. / Cryptographic Hardware / Embedded Systems / Cryptanalytic Time-Memory Trade / Needham / Texas Instruments / NXP Semiconductors / Xilinx / the AES / /

Country

Netherlands / Australia / /

Currency

EUR / /

/

EntertainmentAwardEvent

Force Attack / /

Event

FDA Phase / Product Issues / /

Facility

David Evans University of Virginia Department / /

IndustryTerm

abstract challenge-response protocol / security applications / large chips / metal connection / image processing library / silicon chip / silicon chips / extra hardware / little help against hardware / Wireless Pervasive Computing / cipher entirely in hardware / reverse-engineering hardware / blank chips / challengeresponse protocol / software implementation / access control systems / software disassembly / manufacturing time / computer software / Fraud protection systems / reader chips / chemical etching / car remote controls / reverse-engineering software / reader chip / encryption algorithm / metal connections / distance bounding protocols / fraud detection algorithms / initialization protocol / /

MarketIndex

set 20 / /

Organization

National Science Foundation / University of Virginia Department of Computer Science / Starbug and Henryk Pl¨otz Chaos Computer Club Berlin / Electronic Frontier Foundation / /

Person

Stephen C. Bono / Wayne P. Burleson / Johannes Wolkerstorfer / David J. Wheeler / Ross Anderson / Aviel D. Rubin / Markus G. Kuhn / Adam Stubblefield / Martin Feldhofer / Auguste Kerckhoffs / Andrey Bogdanov / S. Al Sofi / Roger M. Needham / Gerhard P. Hancke / Matthew Green / Ari Juels / Daniel E. Holcomb / Harvey G. Cragon / Sandra Dominikus / Martin E. Hellman / Kevin Fu / Michael Szydlo / Philippe Oechslin / Andrew Tanenbaum / /

Position

embedded micro-controller / ARM micro-controller / /

Product

Mifare Classic RFID / Dutch Public Transit Card / Crypto-1 / /

ProgrammingLanguage

MATLAB / /

PublishedMedium

IEEE Transactions on Information Theory / /

Technology

FPGA / reader chip / authentication protocol / Using Tiny Encryption Algorithm / Chip Design / blank chips / encryption algorithm / even large chips / 2 2.1 Hardware Analysis The chip / silicon chip / distance bounding protocols / block cipher / A5/2 algorithms / reader chips / abstract challenge-response protocol / smart card / cloning / secret key / initialization protocol / Mifare Classic chip / image processing / Integrated Circuits / challengeresponse protocol / Encryption / cellular telephone / cryptography / flash memory / fraud detection algorithms / Mifare encryption / Mifare reader chip / Mifare chip / silicon chips / Keeloq algorithms / Radio Frequency / GSM / simulation / Distance Bounding Protocol / Software Encryption / Tiny Encryption Algorithm / stream cipher / on revealing proprietary cryptography / /

URL

www.cs.vu.nl/˜ast/ov-chip-card / http /

SocialTag