Tommorow afternoon I'll be unleashing a paper on the TKIP algorithm from 802.11i on my website. My attack breaks the algorithm in "theory" and cannot be used in practice just yet.
Just want to get some attention to the paper. I've never really broken a fielded algorithm and I'd be grateful for feedback [and perhaps some peer review]. Thanks, Tom __________________________________ Do you Yahoo!? Yahoo! Calendar - Free online calendar with sync to Outlook(TM). http://calendar.yahoo.com --------------------------------------------------------------------- The Cryptography Mailing List Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]
