Attacking an AES-enabled NFC Tag - Implications from Design to a Real-World Scenario

Thomas Korak, Thomas Plos, Michael Hutter

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Original languageEnglish
Title of host publication3rd International Workshop on Constructive Side-Channel Analysis and Secure Design, Darmstadt, Germany, 3. - 4. May, 2012, Proceedings.
Publisher.
Pages17-32
Publication statusPublished - 2012
EventInternational Workshop on Constructive Side-Channel Analysis and Secure Design - Darmstadt, Germany
Duration: 3 May 20124 May 2012

Conference

ConferenceInternational Workshop on Constructive Side-Channel Analysis and Secure Design
CountryGermany
CityDarmstadt
Period3/05/124/05/12

Fields of Expertise

  • Information, Communication & Computing

Treatment code (Nähere Zuordnung)

  • Application
  • Experimental

Cite this

Korak, T., Plos, T., & Hutter, M. (2012). Attacking an AES-enabled NFC Tag - Implications from Design to a Real-World Scenario. In 3rd International Workshop on Constructive Side-Channel Analysis and Secure Design, Darmstadt, Germany, 3. - 4. May, 2012, Proceedings. (pp. 17-32). ..