Vulnerabilities of IEEE 802.11i Wireless LAN CCMP Protocol
暂无分享,去创建一个
[1] Morris Dworkin,et al. Special Publication 800-38C, Recommendation for Block Cipher Modes of Operation: the CCM Mode for Authentication and Confidentiality , 2003 .
[2] Bruce Schneier,et al. Minimal Key Lengths for Symmetric Ciphers to Provide Adequate Commercial Security. A Report by an Ad Hoc Group of Cryptographers and Computer Scientists , 1996 .
[3] Martin E. Hellman,et al. A cryptanalytic time-memory trade-off , 1980, IEEE Trans. Inf. Theory.
[4] Russ Housley,et al. Counter with CBC-MAC (CCM) , 2003, RFC.
[5] Scott R. Fluhrer,et al. Attacks on Additive Encryption of Redundant Plaintext and Implications on Internet Security , 2000, Selected Areas in Cryptography.
[6] Palash Sarkar,et al. Rediscovery of Time Memory Tradeoffs , 2005, IACR Cryptol. ePrint Arch..
[7] Alex Biryukov,et al. Real Time Cryptanalysis of A5/1 on a PC , 2000, FSE.
[8] David McGrew. Counter Mode Security: Analysis and Recommendations , 2002 .