Cryptography and Cryptanalysis

Arbaugh, William A. “An Inductive Chosen Plaintext Attack Against WEP/WEP2.” Submission to IEEE-802.11, doc# IEEE 802.11-01/230. http://www.cs.umd.edu/~waa/attack/v3dcmnt.htm. May 2001.

Bellardo, J. and S. Savage. “802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions.” Proceedings of the USENIX Security Symposium. Washington, D.C. August 2003. http://www.cs.ucsd.edu/users/savage/papers/UsenixSec03.pdf.

Borisov, Nikita, Ian Goldberg, and David Wagner. “Intercepting Mobile Communications: The Insecurity of 802.11.” 7th Annual Conference on Mobile Computing and Networking. July 2001.

Fluhrer, S., I. Mantin, and A. Shamir. “Weaknesses in the Key Scheduling Algorithm of RC4.” In Proc. 8th Workshop ...

Get Cisco Wireless LAN Security now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.