Welcome![Sign In][Sign Up]
Location:
Search - 14443

Search list

[USB developUHGKB

Description: 该CRC校验仿真完全符合国际标签卡协议ISO IEC 14443所规定的CRC_A,是一种按字节进行运算的CRC校验法,且兼()
Platform: | Size: 9216 | Author: zwura | Hits:

[SCMISO14443&THM3070

Description: ISO14443在THM3070上的实现,包括常用14443功能函数及THM3070底层驱动。(The implementation of ISO14443 on THM3070 includes commonly used 14443 function functions and THM3070 bottom driver.)
Platform: | Size: 12288 | Author: zdphpn | Hits:

[RFIDDemo_CR95HF

Description: 在工作中曾完成的一个NFC读卡器, 主要使用的ST公司的新推出的CR95HF芯片,做板测试已OK。 对于从事NFC开发的人员绝对是一种值得备用的资料。 (附件提供原理图,CR95HF编程手册,驱动CR95HF的C源代码,另包含有 对双接口芯片M24LR64的驱动) CR95HF芯片有如下特点: 标准频率:13.56-MHz 支持多协议:ISO/IEC 14443 A and B,ISO/IEC 15693,ISO/IEC 18092 提供2种标准接口: SPI 和 UART 。 只需简单的7条指令: (Work was done in a NFC reader, the main use of the ST' s new CR95HF chip board test has to do OK. Personnel engaged in the development of NFC is definitely a worthy alternative information. (Annex provides schematics, CR95HF programming manual, driver CR95HF the C source code, and the other contains the dual interface chip M24LR64 driver) CR95HF chip has the following characteristics: standard frequency :13.56-MHz multi-protocol support: ISO/IEC 14443 A and B, ISO/IEC 15693, ISO/IEC 18092 provides two standard interfaces: SPI and UART. 7 simple instructions:)
Platform: | Size: 279552 | Author: LeoLau | Hits:

[Program docPractical Attacks on the MIFARE Classic

Description: The MIFARE Classic is the most widely used contactless smart card chip in the world. Its communication is based on the open ISO-14443-A standard, but the entire authentication and encryption protocols are proprietary. Several academic researchers have cracked the encryption, and even proposed attacks to recover the secret keys. However, none of their attacks have been released so far. In this project, we analyse their attack descriptions and implement three attacks on the MIFARE Classic chip. The most critical attack recovers ANY secret key requiring wireless access to just the card only in less than five minutes on inexpensive commercial off-the-shelf hardware and without any pre-computation. Using our attacks, we expose the vulnerabilities of the Imperial College's access control system and show our ability to masquerade as any valid Imperial College personnel.
Platform: | Size: 3252486 | Author: AlipayLogin_2088002498429280 | Hits:
« 1 2 3 4 5 6 7»

CodeBus www.codebus.net