Theoretical Information
- Weaknesses in the Key Scheduling Algorithm of RC4 by Scott Fluhrer, Itsik Mantin, and Adi Shamir, 2001 or later.
- Detecting Wireless LAN MAC Address Spoofing by Joshua Wright, 2003.
- A Survey of 802.11a Wireless Security Threats and Security Mechanisms by Colonel Donald J. Welch, Ph.D. and Major Scott D. Lathrop, 2003.
- Weaknesses in the Temporal Key Hash of WPA by Vebjørn Moen, Håvard Raddum, and Kjell J. Hole, 2004.
- Attacks on the RC4 stream cipher by Andreas Klein, 2006.
- Break WEP faster with statistical analysis by Rafik Chaabouni, 2006.
- Wi-Fi Security - How to Break and Exploit by Hallvar Helleseth, 2006.
- Securing Wireless Networks from ARP Cache Poisoning by Roney Philip, 2007.
- Breaking 104 bit WEP in less than 60 seconds by Erik Tews, Ralf-Philipp Weinmann and Andrei Pyshkin, 2007.
- Attacks on the WEP protocol by Erik Tews, 2007.
- Practical attacks against WEP and WPA by Martin Beck and Erik Tews, 2008.
- WPA password cracking - Parallel Processing on the Cell BE by Martin Daniel, 2009.
- Cryptanalysis of IEEE 802.11i TKIP by Finn Michael Halvorsen and Olav Haugen, 2009.
- A Practical Message Falsification Attack on WPA by Toshihiro Ohigashi and Masakatu Morii, 2009 or later.
Read more about this topic: Cracking Of Wireless Networks
Famous quotes containing the words theoretical and/or information:
“Post-structuralism is among other things a kind of theoretical hangover from the failed uprising of 68Ma way of keeping the revolution warm at the level of language, blending the euphoric libertarianism of that moment with the stoical melancholia of its aftermath.”
—Terry Eagleton (b. 1943)
“I am the very pattern of a modern Major-Gineral,
Ive information vegetable, animal, and mineral;
I know the kings of England, and I quote the fights historical,
From Marathon to Waterloo, in order categorical;”
—Sir William Schwenck Gilbert (18361911)