Login / Signup
Using the Fluhrer, Mantin, and Shamir Attack to Break WEP.
Adam Stubblefield
John Ioannidis
Aviel D. Rubin
Published in:
NDSS (2002)
Keyphrases
</>
secret key
smart card
stream cipher
authentication scheme
public key
key management
pseudorandom
encryption scheme
authentication protocol
hash functions
ciphertext
low cost
signature scheme