Dismantling MIFARE Classic FD Garcia, G de Koning Gans, R Muijrers, P Van Rossum, R Verdult, ... 13th European Symposium on Research in Computer Security (ESORICS 2008), 97-114, 2008 | 348 | 2008 |
Wirelessly Pickpocketing a MIFARE Classic Card FD Garcia, P Rossum, R Verdult, R Wichers Schreur 30th IEEE Symposium on Security and Privacy (S&P 2009), 3-15, 2009 | 214 | 2009 |
Dismantling Megamos Crypto: Wirelessly Lockpicking a Vehicle Immobilizer R Verdult, FD Garcia, B Ege 22nd USENIX Security Symposium (USENIX Security 2013), 2013 | 163 | 2013 |
Gone in 360 seconds: Hijacking with Hitag2 R Verdult, FD Garcia, J Balasch 21st USENIX Security Symposium (USENIX Security 2012), 237-252, 2012 | 158 | 2012 |
Defeating IMSI Catchers F van den Broek, R Verdult, J de Ruiter 22nd ACM Conference on Computer and Communications Security (CCS 2015), 340-351, 2015 | 105 | 2015 |
Practical Attacks on NFC Enabled Cell Phones R Verdult, F Kooman 3rd International Workshop on Near Field Communication (NFC 2011), 77-82, 2011 | 96 | 2011 |
Power Analysis of Atmel CryptoMemory - Recovering Keys from Secure EEPROMs J Balasch, B Gierlichs, R Verdult, L Batina, I Verbauwhede 12th Cryptographers' Track at the RSA Conference (CT-RSA 2012), 19-34, 2012 | 86 | 2012 |
PIE: Parser identification in embedded systems L Cojocar, J Zaddach, R Verdult, H Bos, A Francillon, D Balzarotti Proceedings of the 31st Annual Computer Security Applications Conference …, 2015 | 47 | 2015 |
Dismantling SecureMemory, CryptoMemory and CryptoRF FD Garcia, P van Rossum, R Verdult, R Wichers Schreur 17th ACM Conference on Computer and Communications Security (CCS 2010), 250-259, 2010 | 45 | 2010 |
Dismantling iClass and iClass Elite FD Garcia, G de Koning Gans, R Verdult, M Meriac 17th European Symposium on Research in Computer Security (ESORICS 2012), 697-715, 2012 | 40 | 2012 |
Using NFC Phones for Proving Credentials G Alpár, L Batina, R Verdult 16th Measurement, Modelling, and Evaluation of Computing Systems and De …, 2012 | 38 | 2012 |
Designed to Fail: A USB-Connected Reader for Online Banking A Blom, G de Koning Gans, E Poll, J de Ruiter, R Verdult 17th Nordic Conference on Secure IT Systems (NordSec 2012), 1-16, 2012 | 34 | 2012 |
Ciphertext-only Cryptanalysis on Hardened Mifare Classic Cards C Meijer, R Verdult 22nd ACM Conference on Computer and Communications Security (CCS 2015), 18-30, 2015 | 32 | 2015 |
Scrutinizing WPA2 Password Generating Algorithms in Wireless Routers EN Lorente, C Meijer, R Verdult 9th USENIX Workshop on Offensive Technologies (WOOT 2015), 2015 | 32 | 2015 |
Proof of Concept, Cloning the OV-chip Card R Verdult Technical report, Radboud University Nijmegen, 2008 | 31 | 2008 |
The (in)security of proprietary cryptography R Verdult Radboud University and KU Leuven, 2015 | 30 | 2015 |
Security Analysis of RFID Tags R Verdult Radboud University Nijmegen, 2008 | 29 | 2008 |
A Toolbox for RFID Protocol Analysis R Verdult, G de Koning Gans, FD Garcia 4th International EURASIP Workshop on RFID Technology (EURASIP RFID 2012), 2012 | 28 | 2012 |
Tutorial: Proxmark, the Swiss Army Knife for RFID Security Research FD Garcia, G de Koning Gans, R Verdult Technical report, Radboud University Nijmegen, 2012 | 26 | 2012 |
Exposing iClass Key Diversification FD Garcia, G de Koning Gans, R Verdult 5th USENIX Workshop on Offensive Technologies (WOOT 2011), 128-136, 2011 | 26 | 2011 |