Timo Kasper
According to our database1,
Timo Kasper
authored at least 28 papers
between 2007 and 2016.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2016
Lock It and Still Lose It - on the (In)Security of Automotive Remote Keyless Entry Systems.
Proceedings of the 25th USENIX Security Symposium, 2016
2014
Proceedings of the Information Security Theory and Practice. Securing the Internet of Things, 2014
2013
Wireless Devices and Cryptography: About Digital Pickpocketing, Open Sesame and Tracking Paranoia.
it Inf. Technol., 2013
Fuming Acid and Cryptanalysis: Handy Tools for Overcoming a Digital Locking and Access Control System - Full Version.
IACR Cryptol. ePrint Arch., 2013
When Reverse-Engineering Meets Side-Channel Analysis - Digital Lockpicking in Practice.
Proceedings of the Selected Areas in Cryptography - SAC 2013, 2013
Rights Management with NFC Smartphones and Electronic ID Cards: A Proof of Concept for Modern Car Sharing.
Proceedings of the Radio Frequency Identification, 2013
Fuming Acid and Cryptanalysis: Handy Tools for Overcoming a Digital Locking and Access Control System.
Proceedings of the Advances in Cryptology - CRYPTO 2013, 2013
2011
On the Vulnerability of FPGA Bitstream Encryption against Power Analysis Attacks - Extracting Keys from Xilinx Virtex-II FPGAs.
IACR Cryptol. ePrint Arch., 2011
Datenschutz und Datensicherheit, 2011
Wireless security threats: Eavesdropping and detecting of active RFIDs and remote controls in the wild.
Proceedings of the 19th International Conference on Software, 2011
Proceedings of the RFID. Security and Privacy - 7th International Workshop, 2011
2010
A Versatile Framework for Implementation Attacks on Cryptographic RFIDs and Embedded Devices.
Trans. Comput. Sci., 2010
Proceedings of the Progress in Cryptology, 2010
Proceedings of the Information Security and Cryptology - ICISC 2010, 2010
Proceedings of the Financial Cryptography and Data Security, 14th International Conference, 2010
2009
EM Side-Channel Attacks on Commercial Contactless Smartcards Using Low-Cost Equipment.
Proceedings of the Information Security Applications, 10th International Workshop, 2009
Proceedings of the Sixth International Workshop on Fault Diagnosis and Tolerance in Cryptography, 2009
Proceedings of the Progress in Cryptology, 2009
2008
IACR Cryptol. ePrint Arch., 2008
On the Power of Power Analysis in the Real World: A Complete Break of the KeeLoqCode Hopping Scheme.
Proceedings of the Advances in Cryptology, 2008
2007
Proceedings of the Information Security Theory and Practices. Smart Cards, 2007
Proceedings of the On the Move to Meaningful Internet Systems 2007: CoopIS, 2007
Proceedings of the Cryptographic Hardware and Embedded Systems, 2007