Hello Dear Community
http://eprint.iacr.org/2007/120.pdf
Here you can find a new Attack to WEP, directly derived from Klein's Attack,
but with a foundamental advantage,
this attack is extended such that is it possible to compute key bytes independently of each other
And as you can understand, time computation is drastically dropped down
Hope this post will be useuful to someone
Have a nice Day!