Attacking an AES-enabled NFC Tag - Implications from Design to a Real-World Scenario

Thomas Korak, Thomas Plos, Michael Hutter

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Original languageEnglish
Title of host publication3rd International Workshop on Constructive Side-Channel Analysis and Secure Design, Darmstadt, Germany, 3. - 4. May, 2012, Proceedings.
Publisher.
Pages17-32
Publication statusPublished - 2012
EventInternational Workshop on Constructive Side-Channel Analysis and Secure Design - Darmstadt, Germany
Duration: 3 May 20124 May 2012

Conference

ConferenceInternational Workshop on Constructive Side-Channel Analysis and Secure Design
CountryGermany
CityDarmstadt
Period3/05/124/05/12

Fields of Expertise

  • Information, Communication & Computing

Treatment code (Nähere Zuordnung)

  • Application
  • Experimental

Cite this

Korak, T., Plos, T., & Hutter, M. (2012). Attacking an AES-enabled NFC Tag - Implications from Design to a Real-World Scenario. In 3rd International Workshop on Constructive Side-Channel Analysis and Secure Design, Darmstadt, Germany, 3. - 4. May, 2012, Proceedings. (pp. 17-32). ..

Attacking an AES-enabled NFC Tag - Implications from Design to a Real-World Scenario. / Korak, Thomas; Plos, Thomas; Hutter, Michael.

3rd International Workshop on Constructive Side-Channel Analysis and Secure Design, Darmstadt, Germany, 3. - 4. May, 2012, Proceedings.. ., 2012. p. 17-32.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Korak, T, Plos, T & Hutter, M 2012, Attacking an AES-enabled NFC Tag - Implications from Design to a Real-World Scenario. in 3rd International Workshop on Constructive Side-Channel Analysis and Secure Design, Darmstadt, Germany, 3. - 4. May, 2012, Proceedings.. ., pp. 17-32, International Workshop on Constructive Side-Channel Analysis and Secure Design, Darmstadt, Germany, 3/05/12.
Korak T, Plos T, Hutter M. Attacking an AES-enabled NFC Tag - Implications from Design to a Real-World Scenario. In 3rd International Workshop on Constructive Side-Channel Analysis and Secure Design, Darmstadt, Germany, 3. - 4. May, 2012, Proceedings.. . 2012. p. 17-32
Korak, Thomas ; Plos, Thomas ; Hutter, Michael. / Attacking an AES-enabled NFC Tag - Implications from Design to a Real-World Scenario. 3rd International Workshop on Constructive Side-Channel Analysis and Secure Design, Darmstadt, Germany, 3. - 4. May, 2012, Proceedings.. ., 2012. pp. 17-32
@inproceedings{9a04202104f74c1fb1816a9bbc206f5b,
title = "Attacking an AES-enabled NFC Tag - Implications from Design to a Real-World Scenario",
author = "Thomas Korak and Thomas Plos and Michael Hutter",
year = "2012",
language = "English",
pages = "17--32",
booktitle = "3rd International Workshop on Constructive Side-Channel Analysis and Secure Design, Darmstadt, Germany, 3. - 4. May, 2012, Proceedings.",
publisher = ".",

}

TY - GEN

T1 - Attacking an AES-enabled NFC Tag - Implications from Design to a Real-World Scenario

AU - Korak, Thomas

AU - Plos, Thomas

AU - Hutter, Michael

PY - 2012

Y1 - 2012

M3 - Conference contribution

SP - 17

EP - 32

BT - 3rd International Workshop on Constructive Side-Channel Analysis and Secure Design, Darmstadt, Germany, 3. - 4. May, 2012, Proceedings.

PB - .

ER -