Author of the publication

Reverse-Engineering a Cryptographic RFID Tag.

, , , and . USENIX Security Symposium, page 185-194. USENIX Association, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Extending SAT Solvers to Cryptographic Problems., , and . SAT, volume 5584 of Lecture Notes in Computer Science, page 244-257. Springer, (2009)Peeling Away Layers of an RFID Security System., and . Financial Cryptography, volume 7035 of Lecture Notes in Computer Science, page 205-219. Springer, (2011)Quantifying Information Leakage in Tree-Based Hash Protocols (Short Paper)., and . ICICS, volume 4307 of Lecture Notes in Computer Science, page 228-237. Springer, (2006)Hiding in Groups: On the Expressiveness of Privacy Distributions., and . SEC, volume 278 of IFIP, page 1-15. Springer, (2008)Reverse-Engineering a Cryptographic RFID Tag., , , and . USENIX Security Symposium, page 185-194. USENIX Association, (2008)Privacy through Noise: A Design Space for Private Identification., and . ACSAC, page 518-527. IEEE Computer Society, (2009)