• New Attack on Low-Cost Contactless Smartcard

    Cryptographers David Oswald and Christof Parr published a great paper at this week’s CHES 2011 conference, “Breaking Mifare DESFire MF3ICD40: Power Analysis and Templates in the Real World.” In this paper, they used differential power analysis to break the DESFire contactless smartcard. It builds upon previous work published in CHES 2002 on Template Analysis, a machine learning technique. The paper

        in Identity Assurance, Technical
    0