How to List-up Weak IVs and Weak Keys in WEP : Swap Operations and Weak Patterns
スポンサーリンク
概要
- 論文の詳細を見る
- 2005-11-20
著者
-
Kobara Kazukuni
The Univ. Of Tokyo And Concurrently The Research Center For Information Security Of Aist.
-
IMAI Hideki
The University of Tokyo
-
Imai Hideki
National Inst. Advanced Industrial Sci. And Technol. Tokyo Jpn
-
Imai Hideki
The Univ. Of Tokyo And Concurrently The Research Center For Information Security Of Aist.
関連論文
- Traitor Tracing Scheme Secure against Adaptive Key Exposure and its Application to Anywhere TV Service(Discrete Mathematics and Its Applications)
- New Security Architecture for Mobile IPv6 Networks
- CDMA Multi-Cell Performance of Combined Serial Interference Canceller and Normalized Griffiths' Algorithm(Special Issue on Multiple Access and Signal Transmission Techniques for Future Mobile Communications)
- Spectroscopic Studies of the Solar Corona I. Spatial Variations in Line Parameters of Green and Red Coronal Lines
- Daily Urinary Excretion of Bisphenol A
- On Decoding Techniques for Cryptanalysis of Certain Encryption Algorithms(Special Section on Fundamentals of Information and Communications)
- Formal Security Treatments for IBE-to-Signature Transformation : Relations among Security Notions
- Key-Insulated Public Key Encryption with Auxiliary Helper Key : Model, Constructions and Formal Security Proofs(Information Theory and Its Applications)
- Efficient Identity-Based Encryption with Tight Security Reduction(Information Theory and Its Applications)
- A New Key-Insulated Public Key Encryption Scheme with Auxiliary Helper Key
- A Trade-off Traitor Tracing Scheme
- On the Hierarchical Structure of Trusted Authority for Unconditionally Secure Cryptography
- A New Hash Function Based on SQH and NH^a
- A Formulation of Key Privacy in Plaintext Checking Attack Model
- Universally Composable and Statistically Secure Verifiable Secret Sharing Scheme Based on Pre-Distributed Data
- How to List-up Weak IVs and Weak Keys in WEP : Swap Operations and Weak Patterns