Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,397,757 papers from all fields of science
Search
Sign In
Create Free Account
Custom hardware attack
Known as:
COPACOBANA
In cryptography, a custom hardware attack uses specifically designed application-specific integrated circuits (ASIC) to decipher encrypted messages…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
18 relations
Application-specific integrated circuit
Bombe
Brute-force attack
Cryptography
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2013
2013
High-Performance Cryptanalysis on RIVYERA and COPACOBANA Computing Systems
Tim Güneysu
,
Timo Kasper
,
M. Novotný
,
C. Paar
,
Lars Wienbrandt
,
Ralf Zimmermann
2013
Corpus ID: 59630039
Special-purpose computing platforms based on reconfigurable hardware have shown to typically exhibit a much better performance…
Expand
2012
2012
On the Performance of Exhaustive Search with Cooperating agents
T. Stojanovski
,
Ljupco Krstevski
arXiv.org
2012
Corpus ID: 17161383
Abstract—Despite the occurrence of elegant algorithms forsolving complex problem, exhaustive search has retained itssignificance…
Expand
2011
2011
Cryptanalysis of KeeLoq code-hopping using a Single FPGA
Idan Sheetrit
,
A. Wool
IACR Cryptology ePrint Archive
2011
Corpus ID: 13271178
The KeeLoq cipher is used in many wireless car door systems and garage openers. Recently the algorithm was studied and several…
Expand
2011
2011
Cryptanalysis of Hitag-2 Cipher
Petr tembera
,
M. Novotný
2011
Corpus ID: 26670201
The Hitag2 stream cipher is used in many realworld applications, such as car immobilizers and door opening systems, as well as…
Expand
2009
2009
CRYPTOGRAPHY AND CRYPTANALYSIS ON RECONFIGURABLE DEVICES Security Implementations for Hardware and Reprogrammable Devices
Tim Güneysu
2009
Corpus ID: 62390310
With the rise of the Internet, the number of information processing systems has significantly increased in many fields of daily…
Expand
Review
2009
Review
2009
Three Years of Evolution : Cryptanalysis with COPACOBANA
Tim Güneysu
,
Gerd Pfeiffer
,
C. Paar
,
M. Schimmler
2009
Corpus ID: 15123269
In this paper, we review three years of development and improvements on COPACOBANA, the probably most popular, reconfigurable…
Expand
2008
2008
Hardware-Based Cryptanalysis of the GSM A 5 / 1 Encryption Algorithm
Timo Gendrullis
2008
Corpus ID: 9870270
In this diploma thesis we present a real-world hardware-assisted attack on the well-known A5/1 stream cipher which is (still…
Expand
2008
2008
Enhancing COPACOBANA for advanced applications in cryptography and cryptanalysis
Tim Güneysu
,
C. Paar
,
Gerd Pfeiffer
,
M. Schimmler
International Conference on Field-Programmable…
2008
Corpus ID: 11399334
Cryptanalysis of symmetric and asymmetric ciphers is a challenging task due to the enormous amount of involved computations. To…
Expand
2008
2008
Breaking Legacy Banking Standards with Special-Purpose Hardware
Tim Güneysu
,
C. Paar
Financial Cryptography
2008
Corpus ID: 5713046
In the field of eCommerce, online-banking is one of the major application requiring the usage of modern cryptography to protect…
Expand
2007
2007
Cryptanalytic Time-Memory Tradeoffs on COPACOBANA
Tim Güneysu
,
Andy Rupp
,
S. Spitz
GI Jahrestagung
2007
Corpus ID: 1284108
This paper presents our ongoing work on the analysis and optimization of cryptanalytic time-memory tradeoffs targeting the…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE