The shorter time is attributed to tricking a WPA-secured AP into sending large amounts of data and a "mathematical breakthrough" that speeds the TKIP crack.
The crack enables one-way communication from AP to client, but not vice-versa since the attack does not break the encryption keys used by the client.
The article says that some of the code used in the new attack was "quietly added to Beck’s Aircrack-ng Wi-Fi encryption hacking tool two weeks ago".