Login / Signup
From Dragondoom to Dragonstar: Side-channel Attacks and Formally Verified Implementation of WPA3 Dragonfly Handshake.
Daniel De Almeida Braga
Natalia Kulatova
Mohamed Sabt
Pierre-Alain Fouque
Karthikeyan Bhargavan
Published in:
CoRR (2023)
Keyphrases
</>
efficient implementation
implementation issues
knowledge base
general purpose
real time
data sets
objective function
data model
implementation details