Key Reinstallation Attacks
Top Cited Papers
- 30 October 2017
- proceedings article
- Published by Association for Computing Machinery (ACM)
- p. 1313-1328
- https://doi.org/10.1145/3133956.3134027
Abstract
No abstract availableKeywords
This publication has 21 references indexed in Scilit:
- A practical investigation of identity theft vulnerabilities in EduroamPublished by Association for Computing Machinery (ACM) ,2015
- A Messy State of the Union: Taming the Composite State Machines of TLSPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2015
- Practical verification of WPA-TKIP vulnerabilitiesPublished by Association for Computing Machinery (ACM) ,2013
- Nonce Generators and the Nonce Reset ProblemPublished by Springer Nature ,2009
- An Improved Attack on TKIPPublished by Springer Nature ,2009
- On the Security of the CCM Encryption Mode and of a Slight VariantPublished by Springer Nature ,2008
- Discovering and exploiting 802.11 wireless driver vulnerabilitiesJournal of Computer Virology and Hacking Techniques, 2007
- On the Security of CTR + CBC-MACPublished by Springer Nature ,2003
- Weaknesses in the Key Scheduling Algorithm of RC4Published by Springer Nature ,2001
- TCP/IP security threats and attack methodsComputer Communications, 1999