Login / Signup

Dependence in IV-Related Bytes of RC4 Key Enhances Vulnerabilities in WPA.

Sourav Sen GuptaSubhamoy MaitraWilli MeierGoutam PaulSantanu Sarkar
Published in: FSE (2014)
Keyphrases
  • database
  • search algorithm
  • closely related