Skip to search formSkip to main contentSkip to account menu

Custom hardware attack

Known as: COPACOBANA 
In cryptography, a custom hardware attack uses specifically designed application-specific integrated circuits (ASIC) to decipher encrypted messages… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2013
2013
Special-purpose computing platforms based on reconfigurable hardware have shown to typically exhibit a much better performance… 
2012
2012
Abstract—Despite the occurrence of elegant algorithms forsolving complex problem, exhaustive search has retained itssignificance… 
2011
2011
The KeeLoq cipher is used in many wireless car door systems and garage openers. Recently the algorithm was studied and several… 
2011
2011
The Hitag2 stream cipher is used in many realworld applications, such as car immobilizers and door opening systems, as well as… 
2009
2009
With the rise of the Internet, the number of information processing systems has significantly increased in many fields of daily… 
Review
2009
Review
2009
In this paper, we review three years of development and improvements on COPACOBANA, the probably most popular, reconfigurable… 
2008
2008
In this diploma thesis we present a real-world hardware-assisted attack on the well-known A5/1 stream cipher which is (still… 
2008
2008
Cryptanalysis of symmetric and asymmetric ciphers is a challenging task due to the enormous amount of involved computations. To… 
2008
2008
In the field of eCommerce, online-banking is one of the major application requiring the usage of modern cryptography to protect… 
2007
2007
This paper presents our ongoing work on the analysis and optimization of cryptanalytic time-memory tradeoffs targeting the…