Login / Signup
Tornado Attack on RC4 with Applications to WEP & WPA.
Pouyan Sepehrdad
Petr Susil
Serge Vaudenay
Martin Vuagnoux
Published in:
IACR Cryptol. ePrint Arch. (2015)
Keyphrases
</>
secret key
smart card
stream cipher
authentication scheme
floating point
public key
wireless local area network
pseudorandom
encryption scheme
hash functions
security mechanisms
ciphertext
information systems
authentication protocol
block cipher
countermeasures
malicious users
distributed systems