Cited By
View all- Verstegen AVerdult RBokslag WRossow CYounan Y(2018)Hitag 2 hell - brutally optimizing guess-and-determine attacksProceedings of the 12th USENIX Conference on Offensive Technologies10.5555/3307423.3307437(14-14)Online publication date: 13-Aug-2018
- Duval SLallemand VRotella Y(2016)Cryptanalysis of the FLIP Family of Stream CiphersProceedings, Part I, of the 36th Annual International Cryptology Conference on Advances in Cryptology --- CRYPTO 2016 - Volume 981410.1007/978-3-662-53018-4_17(457-475)Online publication date: 14-Aug-2016
- Meier W(2011)Fast correlation attacksProceedings of the 18th international conference on Fast software encryption10.5555/2022159.2022165(55-67)Online publication date: 13-Feb-2011
- Show More Cited By