Login / Signup
Practical attacks against WEP and WPA.
Martin Beck
Erik Tews
Published in:
IACR Cryptol. ePrint Arch. (2008)
Keyphrases
</>
security mechanisms
stream cipher
secret key
real world
power consumption
hash functions
resource constrained
pseudorandom
security threats
wireless local area network