Attacking an AES-enabled NFC Tag - Implications from Design to a Real-World Scenario

Thomas Korak, Thomas Plos, Michael Hutter

Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

Original languageEnglish
Title of host publication3rd International Workshop on Constructive Side-Channel Analysis and Secure Design, Darmstadt, Germany, 3. - 4. May, 2012, Proceedings.
Publisher.
Pages17-32
Publication statusPublished - 2012
EventInternational Workshop on Constructive Side-Channel Analysis and Secure Design - Darmstadt, Germany
Duration: 3 May 20124 May 2012

Conference

ConferenceInternational Workshop on Constructive Side-Channel Analysis and Secure Design
Country/TerritoryGermany
CityDarmstadt
Period3/05/124/05/12

Fields of Expertise

  • Information, Communication & Computing

Treatment code (Nähere Zuordnung)

  • Application
  • Experimental
  • RFID Security

    Wenger, E., Hutter, M., Oswald, M. E., Posch, K., Plos, T., Herbst, C., Schmidt, J., Feldhofer, M., Szekely, A., Dominikus, S., Aigner, M. J., Kirschbaum, M., Medwed, M. & Posch, R.

    1/01/0515/07/19

    Project: Research area

  • CRYPTA - Cryptographic Protected Tags for new RFID Applications

    Posch, K., Feldhofer, M., Dominikus, S., Plos, T., Aigner, M. J., Hutter, M. & Schmidt, J.

    1/02/0931/03/11

    Project: Research project

  • VLSI Design

    Medwed, M., Wenger, E., Aigner, M. J., Posch, K., Hutter, M., Kirschbaum, M., Schmidt, J., Posch, R., Dominikus, S., Szekely, A., Feldhofer, M. & Plos, T.

    1/01/9515/07/19

    Project: Research area

Cite this