These are different attack vectors.
The classic one was listening to a key, then impersonating it later.
Rolling keys fixed that.
For keyless, the usual attack is working as a relay.
Victim is 30m from their car, too far for keyless.
Attacker stands between the car and the victim with a transceiver that links the car and the key together, despite the distance, and opens it.