-
1
-
-
26444596644
-
Impossible fault analysis of RC4 and differential fault analysis, Fast Software Encryption 2005
-
Biham E., Granboulan L., and Nguyen P. Impossible fault analysis of RC4 and differential fault analysis, Fast Software Encryption 2005. Lecture Notes in Computer Science 3557 (2005) 359-367
-
(2005)
Lecture Notes in Computer Science
, vol.3557
, pp. 359-367
-
-
Biham, E.1
Granboulan, L.2
Nguyen, P.3
-
2
-
-
84949223752
-
Weakness in the key scheduling algorithm of RC4, Selected Areas in Cryptography 2001
-
Fluhrer S., Mantin I., and Shamir A. Weakness in the key scheduling algorithm of RC4, Selected Areas in Cryptography 2001. Lecture Notes in Computer Science 2259 (2001) 1-24
-
(2001)
Lecture Notes in Computer Science
, vol.2259
, pp. 1-24
-
-
Fluhrer, S.1
Mantin, I.2
Shamir, A.3
-
3
-
-
84974666258
-
Statistical analysis of the alleged RC4 Keystream Generator, Fast Software Encryption 2000
-
Fluhrer S., and McGrew D. Statistical analysis of the alleged RC4 Keystream Generator, Fast Software Encryption 2000. Lecture Notes in Computer Science 1978 (2000) 19-30
-
(2000)
Lecture Notes in Computer Science
, vol.1978
, pp. 19-30
-
-
Fluhrer, S.1
McGrew, D.2
-
4
-
-
84957380512
-
Linear statistical weakness of alleged RC4 Keystream Generator, Advances in Cryptology - EUROCRYPT '97
-
Golić J. Linear statistical weakness of alleged RC4 Keystream Generator, Advances in Cryptology - EUROCRYPT '97. Lecture Notes in Computer Science 1233 (1997) 226-238
-
(1997)
Lecture Notes in Computer Science
, vol.1233
, pp. 226-238
-
-
Golić, J.1
-
5
-
-
33846321363
-
-
A. Grosul, D. Wallach, A related-key cryptanalysis of RC4, Rice University, Technical Report TR-00-358, June 2000.
-
-
-
-
6
-
-
84944076741
-
"Analysis methods for (alleged) RC4", Advances in Cryptology - ASIACRYPT '98
-
Knudsen L., Meier W., Preneel B., Rijmen V., and Verdoolaege S. "Analysis methods for (alleged) RC4", Advances in Cryptology - ASIACRYPT '98. Lecture Notes in Computer Science 1514 (1998)
-
(1998)
Lecture Notes in Computer Science
, vol.1514
-
-
Knudsen, L.1
Meier, W.2
Preneel, B.3
Rijmen, V.4
Verdoolaege, S.5
-
7
-
-
24944554565
-
Predicting and distinguishing attacks on RC4 Keystream generator, Advances in Cryptology - EUROCRYPT 20 05
-
Mantin I. Predicting and distinguishing attacks on RC4 Keystream generator, Advances in Cryptology - EUROCRYPT 20 05. Lecture Notes in Computer Science 3494 (2005) 491-506
-
(2005)
Lecture Notes in Computer Science
, vol.3494
, pp. 491-506
-
-
Mantin, I.1
-
8
-
-
84958972140
-
"A practical attack on broadcast RC4". Fast Software Encryption FSE 2001
-
Mantin I., and Shamir A. "A practical attack on broadcast RC4". Fast Software Encryption FSE 2001. Lecture Notes in Computer Science 2355 (2002) 152-164
-
(2002)
Lecture Notes in Computer Science
, vol.2355
, pp. 152-164
-
-
Mantin, I.1
Shamir, A.2
-
9
-
-
84859054985
-
Cryptanalysis of RC4-like ciphers, Selected Areas in Cryptography - SAC '98
-
Mister S., and Tavares S. Cryptanalysis of RC4-like ciphers, Selected Areas in Cryptography - SAC '98. Lecture Notes in Computer Science 1556 (1999) 131-143
-
(1999)
Lecture Notes in Computer Science
, vol.1556
, pp. 131-143
-
-
Mister, S.1
Tavares, S.2
-
10
-
-
26444620896
-
A new weakness in the RC4 Keystream generator and an approach to improve the security of the cipher, Fast Software Encryption FSE
-
Paul S., and Prennel B. A new weakness in the RC4 Keystream generator and an approach to improve the security of the cipher, Fast Software Encryption FSE. Lecture Notes in Computer Science 3017 (2004) 245-259
-
(2004)
Lecture Notes in Computer Science
, vol.3017
, pp. 245-259
-
-
Paul, S.1
Prennel, B.2
-
11
-
-
0347526103
-
Analysis of non-fortuitons predictive states of the RC4 Keystream generator, INDOCRYPT
-
Paul S., and Prennel B. Analysis of non-fortuitons predictive states of the RC4 Keystream generator, INDOCRYPT. Lecture Notes in Computer Science 2904 (2003) 52-67
-
(2003)
Lecture Notes in Computer Science
, vol.2904
, pp. 52-67
-
-
Paul, S.1
Prennel, B.2
-
12
-
-
33846317205
-
-
J. Pearl, Heuristics - Intelligent search strategies for computer problem solving, Addison-Wesley Series in Artificial Intelligence, 1984.
-
-
-
-
13
-
-
33846334950
-
-
A. Roos, A class of weak keys in the RC4 stream cipher, Sci. Crypt., September 1995.
-
-
-
-
15
-
-
33846324124
-
-
V. Tomašević, S. Bojanić, O. Nieto-Taladriz, An approach for analysis of stream ciphers based on table-shuffling. The State of the Art of Stream Ciphers, Workshop Record, Brugge, October 2004, pp. 165-174.
-
-
-
-
16
-
-
33745983856
-
OWA trees and their role in security modeling using attack trees
-
Yager R.R. OWA trees and their role in security modeling using attack trees. Information Science 176/20 (2006) 2933-2959
-
(2006)
Information Science
, vol.176-20
, pp. 2933-2959
-
-
Yager, R.R.1
|