-
3
-
-
84949223752
-
Weaknesses in the key scheduling algorithm of RC4
-
Springer-Verlag
-
S. Fluhrer, I. Mantin, and A. Shamir, "Weaknesses in the key scheduling algorithm of RC4," SAC2001, Lecture Notes in Computer Science, vol. 2259, pp. 1-24, Springer-Verlag, 2001.
-
(2001)
SAC2001, Lecture Notes in Computer Science
, vol.2259
, pp. 1-24
-
-
Fluhrer, S.1
Mantin, I.2
Shamir, A.3
-
4
-
-
85027201575
-
-
Orinoco, WEPplus white paper Oct 2001
-
Orinoco, "WEPplus white paper," Oct. 2001.
-
-
-
-
5
-
-
85027204972
-
-
The Aircrack-NG Team, Aircrack-NG
-
The Aircrack-NG Team, "Aircrack-NG." http://www.aircrack-ng. org/
-
-
-
-
6
-
-
33646844622
-
FMS attack-resistant WEP implementation is still broken - Most IVs leak a part of key information
-
DOI 10.1007/11596981-3, Computational Intelligence and Security - International Conference, CIS 2005, Proceedings
-
T. Ohigashi, Y. Shiraishi, and M. Morii, "FMS attack-resistant WEP implementation is still broken-Most IVs leak a part of key information-," LNCS, vol. 3802, pp 17-26, 2005. (Pubitemid 43775222)
-
(2005)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3802
, pp. 17-26
-
-
Ohigashi, T.1
Shiraishi, Y.2
Morii, M.3
-
7
-
-
70350556447
-
New weakness in the key-scheduling algorithm of RC4
-
Jan
-
T. Ohigashi, Y. Shiraishi, and M. Morii, "New weakness in the key-scheduling algorithm of RC4," IEICE Trans. Fundamentals, vol. E91-A, no. 1, pp. 3-11, Jan. 2008.
-
(2008)
IEICE Trans. Fundamentals
, vol.E91-A
, Issue.1
, pp. 3-11
-
-
Ohigashi, T.1
Shiraishi, Y.2
Morii, M.3
-
8
-
-
50249147960
-
Breaking 104 bit WEP in less than 60 seconds
-
available at
-
E. Tews, R. Weinmann, and A. Pyshkin, "Breaking 104 bit WEP in less than 60 seconds," Cryptology ePrint, 2007, available at http://eprint.iacr.org/2007/120.pdf
-
(2007)
Cryptology EPrint
-
-
Tews, E.1
Weinmann, R.2
Pyshkin, A.3
-
9
-
-
77950640259
-
Fast WEP-Key recovery attack using only encrypted IP packets
-
Jan
-
R. Teramura, Y. Asakura, T. Ohigashi, H. Kuwakado, and M. Morii, "Fast WEP-Key recovery attack using only encrypted IP packets," IEICE Trans. Fundamentals, vol. E93-A, no. 1, pp. 164-171, Jan. 2010.
-
(2010)
IEICE Trans. Fundamentals
, vol.E93-A
, Issue.1
, pp. 164-171
-
-
Teramura, R.1
Asakura, Y.2
Ohigashi, T.3
Kuwakado, H.4
Morii, M.5
-
10
-
-
70349147400
-
Practical attacks against WEP and WPA
-
M. Beck and E. Tews, "Practical attacks against WEP and WPA," Proc. PacSec'08, pp. 79-85, 2008.
-
(2008)
Proc. PacSec'08
, pp. 79-85
-
-
Beck, M.1
Tews, E.2
-
12
-
-
80155161094
-
Effective falsification attack on WPA-TKIP by modifying any packet to QoS packet
-
CDROM, 1B-3
-
Y. Todo, T. Ohigashi, and M. Morii, "Effective falsification attack on WPA-TKIP by modifying any packet to QoS packet," Proc. JWIS 2010, CDROM, 1B-3, 2010.
-
(2010)
Proc. JWIS 2010
-
-
Todo, Y.1
Ohigashi, T.2
Morii, M.3
-
13
-
-
47749085463
-
Attacks on the RC4 stream cipher
-
Sept
-
A. Klein, "Attacks on the RC4 stream cipher," Designs, Codes and Cryptography, vol. 48, no. 3, pp. 269-286, Sept. 2008.
-
(2008)
Designs, Codes and Cryptography
, vol.48
, Issue.3
, pp. 269-286
-
-
Klein, A.1
-
16
-
-
85027205827
-
-
KoreK, Chopchop (Experimental WEP attacks) available at
-
KoreK, "Chopchop (Experimental WEP attacks)," 2004, available at http://www.netstumbler.org/showthread.php?t=12489
-
(2004)
-
-
-
18
-
-
78650757225
-
An improved attack on TKIP
-
F.M. Halvorsen, O. Haugen, M. Eian, and S.F. Mjølsnes, "An improved attack on TKIP," Proc. NordSec2009, LNCS, vol. 5838, pp. 120-132, 2009.
-
(2009)
Proc. NordSec2009, LNCS
, vol.5838
, pp. 120-132
-
-
Halvorsen, F.M.1
Haugen, O.2
Eian, M.3
Mjølsnes, S.F.4
|