Tommorow afternoon I'll be unleashing a paper on the TKIP algorithm
from 802.11i on my website.  My attack breaks the algorithm in "theory"
and cannot be used in practice just yet.

Just want to get some attention to the paper.  I've never really broken
a fielded algorithm and I'd be grateful for feedback [and perhaps some
peer review].

Thanks,
Tom

__________________________________
Do you Yahoo!?
Yahoo! Calendar - Free online calendar with sync to Outlook(TM).
http://calendar.yahoo.com

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]

Reply via email to