Login / Signup

From Dragondoom to Dragonstar: Side-channel Attacks and Formally Verified Implementation of WPA3 Dragonfly Handshake.

Daniel De Almeida BragaNatalia KulatovaMohamed SabtPierre-Alain FouqueKarthikeyan Bhargavan
Published in: CoRR (2023)
Keyphrases
  • efficient implementation
  • implementation issues
  • knowledge base
  • general purpose
  • real time
  • data sets
  • objective function
  • data model
  • implementation details