1. The dark side of security by obscurity - And cloning MiFare Classic rail and building passes, anywhere, anytime;Courtois
2. Practical eavesdropping and skimming attacks on high-frequency RFID tokens;Hancke;RFIDSec,2011
3. Extending ISO/IEC 14443 type a eavesdropping range using higher harmonics;Engelhardt,2013
4. Reverse-Engineering a Cryptographic RFID Tag;Nohl,2008