Timo Kasper

According to our database1, Timo Kasper authored at least 28 papers between 2007 and 2016.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2016
Lock It and Still Lose It - on the (In)Security of Automotive Remote Keyless Entry Systems.
Proceedings of the 25th USENIX Security Symposium, 2016

2014
Sweet Dreams and Nightmares: Security in the Internet of Things.
Proceedings of the Information Security Theory and Practice. Securing the Internet of Things, 2014

2013
Security analysis of pervasive wireless devices
PhD thesis, 2013

Wireless Devices and Cryptography: About Digital Pickpocketing, Open Sesame and Tracking Paranoia.
it Inf. Technol., 2013

Fuming Acid and Cryptanalysis: Handy Tools for Overcoming a Digital Locking and Access Control System - Full Version.
IACR Cryptol. ePrint Arch., 2013

When Reverse-Engineering Meets Side-Channel Analysis - Digital Lockpicking in Practice.
Proceedings of the Selected Areas in Cryptography - SAC 2013, 2013

Rights Management with NFC Smartphones and Electronic ID Cards: A Proof of Concept for Modern Car Sharing.
Proceedings of the Radio Frequency Identification, 2013

Fuming Acid and Cryptanalysis: Handy Tools for Overcoming a Digital Locking and Access Control System.
Proceedings of the Advances in Cryptology - CRYPTO 2013, 2013

2011
Keeloq.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

On the Vulnerability of FPGA Bitstream Encryption against Power Analysis Attacks - Extracting Keys from Xilinx Virtex-II FPGAs.
IACR Cryptol. ePrint Arch., 2011

Seitenkanalanalyse kontaktloser SmartCards.
Datenschutz und Datensicherheit, 2011

Praktische Angriffe auf die Bitstromverschlüsselung von Xilinx FPGAs.
Datenschutz und Datensicherheit, 2011

Wireless security threats: Eavesdropping and detecting of active RFIDs and remote controls in the wild.
Proceedings of the 19th International Conference on Software, 2011

Side-Channel Analysis of Cryptographic RFIDs with Analog Demodulation.
Proceedings of the RFID. Security and Privacy - 7th International Workshop, 2011

2010
A Versatile Framework for Implementation Attacks on Cryptographic RFIDs and Embedded Devices.
Trans. Comput. Sci., 2010

Combined Implementation Attack Resistant Exponentiation.
Proceedings of the Progress in Cryptology, 2010

Chameleon: A Versatile Emulator for Contactless Smartcards.
Proceedings of the Information Security and Cryptology - ICISC 2010, 2010

All You Can Eat or Breaking a Real-World Contactless Payment System.
Proceedings of the Financial Cryptography and Data Security, 14th International Conference, 2010

2009
EM Side-Channel Attacks on Commercial Contactless Smartcards Using Low-Cost Equipment.
Proceedings of the Information Security Applications, 10th International Workshop, 2009

KeeLoq and Side-Channel Analysis-Evolution of an Attack.
Proceedings of the Sixth International Workshop on Fault Diagnosis and Tolerance in Cryptography, 2009

Breaking KeeLoq in a Flash: On Extracting Keys at Lightning Speed.
Proceedings of the Progress in Cryptology, 2009

2008
Cryptanalysis with COPACOBANA.
IEEE Trans. Computers, 2008

Physical Cryptanalysis of KeeLoq Code Hopping Applications.
IACR Cryptol. ePrint Arch., 2008

Sicherheit moderner Funktüröffnersysteme.
Datenschutz und Datensicherheit, 2008

On the Power of Power Analysis in the Real World: A Complete Break of the KeeLoqCode Hopping Scheme.
Proceedings of the Advances in Cryptology, 2008

2007
An Embedded System for Practical Security Analysis of Contactless Smartcards.
Proceedings of the Information Security Theory and Practices. Smart Cards, 2007

E-Passport: Cracking Basic Access Control Keys.
Proceedings of the On the Move to Meaningful Internet Systems 2007: CoopIS, 2007

Collision Attacks on AES-Based MAC: Alpha-MAC.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2007


  Loading...