1 code implementation • 9 Sep 2020 • Carlo Meijer, Veelasha Moonsamy, Jos Wetzels
The continuing use of proprietary cryptography in embedded systems across many industry verticals, from physical access control systems and telecommunications to machine-to-machine authentication, presents a significant obstacle to black-box security-evaluation efforts.
Cryptography and Security 68M25 E.3