Karsten Nohl

According to our database1, Karsten Nohl authored at least 9 papers between 2006 and 2011.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2011
Peeling Away Layers of an RFID Security System.
Proceedings of the Financial Cryptography and Data Security, 2011

2010
Kann man mit DECT noch vertraulich telefonieren?
Datenschutz und Datensicherheit, 2010

Cryptanalysis of the DECT Standard Cipher.
Proceedings of the Fast Software Encryption, 17th International Workshop, 2010

2009
Extending SAT Solvers to Cryptographic Problems.
Proceedings of the Theory and Applications of Satisfiability Testing, 2009

Privacy through Noise: A Design Space for Private Identification.
Proceedings of the Twenty-Fifth Annual Computer Security Applications Conference, 2009

2008
Algebraic Attacks on the Crypto-1 Stream Cipher in MiFare Classic and Oyster Cards.
IACR Cryptol. ePrint Arch., 2008

Reverse-Engineering a Cryptographic RFID Tag.
Proceedings of the 17th USENIX Security Symposium, 2008

Hiding in Groups: On the Expressiveness of Privacy Distributions.
Proceedings of The IFIP TC-11 23rd International Information Security Conference, 2008

2006
Quantifying Information Leakage in Tree-Based Hash Protocols (Short Paper).
Proceedings of the Information and Communications Security, 8th International Conference, 2006


  Loading...