메뉴 건너뛰기




Volumn 3802 LNAI, Issue , 2005, Pages 17-26

FMS attack-resistant WEP implementation is still broken - Most IVs leak a part of key information

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTATIONAL METHODS; COMPUTER SCIENCE; INFORMATION TECHNOLOGY; SECURITY OF DATA;

EID: 33646844622     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11596981_3     Document Type: Conference Paper
Times cited : (7)

References (6)
  • 2
    • 84949223752 scopus 로고    scopus 로고
    • Weaknesses in the koy scheduling algorithm of RC4
    • Proc. SAC2001, Springer-Verlag
    • S. Fluhrer, I. Mantin, and A. Shamir, "Weaknesses in the koy scheduling algorithm of RC4," Proc. SAC2001, LNCS, vol.2259, pp.1-24, Springer-Verlag, 2001.
    • (2001) LNCS , vol.2259 , pp. 1-24
    • Fluhrer, S.1    Mantin, I.2    Shamir, A.3
  • 3
    • 0003629990 scopus 로고    scopus 로고
    • NIST, FIPS PUB 180-2 Aug.
    • NIST, FIPS PUB 180-2 "Secure Hash Standard," Aug. 2002.
    • (2002) Secure Hash Standard
  • 6
    • 3142552643 scopus 로고    scopus 로고
    • A key recovery attack on the 802.11b wired equivalent privacy protocol (WEP)
    • May
    • A. Stubblefield, J. Loannidis and A. D. Rubin, "A key recovery attack on the 802.11b wired equivalent privacy protocol (WEP)," ACM Trans. Inf. Syst. Secur., vol.7, no.2, pp.319-332, May 2004.
    • (2004) ACM Trans. Inf. Syst. Secur. , vol.7 , Issue.2 , pp. 319-332
    • Stubblefield, A.1    Loannidis, J.2    Rubin, A.D.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.