Cryptography and Cryptanalysis

Arbaugh, William A. "An Inductive Chosen Plaintext Attack Against WEP/WEP2." Submission to IEEE-802.11, doc# IEEE 802.11-01/230. http://www.cs.umd.edu/~waa/attack/v3dcmnt.htm. May 2001.

Bellardo, J. and S. Savage. "802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions." Proceedings of the USENIX Security Symposium. Washington, D.C. August 2003. http://www.cs.ucsd.edu/users/savage/papers/UsenixSec03.pdf.

Borisov, Nikita, Ian Goldberg, and David Wagner. "Intercepting Mobile Communications: The Insecurity of 802.11." 7th Annual Conference on Mobile Computing and Networking. July 2001.

Fluhrer, S., I. Mantin, and A. Shamir. "Weaknesses in the Key Scheduling Algorithm of RC4." In Proc. 8th Workshop on Selected Areas in Cryptography, LNCS 2259. Springer-Verlag, 2001. http://www.drizzle.com/~aboba/IEEE/rc4_ksaproc.pdf.

Schneier, B. "Attack Trees." Dr. Dobb's Journal. December 1999. http://www.schneier.com/paper-attacktrees-ddj-ft.html.

Walker, Jesse. Unsafe at Any Key Size: An Analysis of the WEP Encapsulation. IEEE doc #802.11-00/362, October 2000.

Cryptography and Cryptanalysis Websites

http://wombat.doc.ic.ac.uk/foldoc/foldoc.cgi?RC4

http://www.cisco.com/warp/public/cc/pd/witc/ao350ap/prodlit/1515_pp.h

http://www.cypherspace.org/adam/rsa/rc4.html

http://www.ncat.edu/~grogans/main.htm

http://www.ssh.fi/support/cryptography/algorithms/symmetric.html

http://www.wow-com.com/industry/tech/