-
2
-
-
0001859010
-
Stream ciphers
-
ed. G.J. Simmons, IEEE Press, New York
-
R.A. Rueppel, "Stream ciphers," in Contemporary Cryptology, ed. G.J. Simmons, pp.65-134, IEEE Press, New York, 1992.
-
(1992)
Contemporary Cryptology
, pp. 65-134
-
-
Rueppel, R.A.1
-
3
-
-
84957630525
-
SOBER cryptanalysis
-
Proc. FSE'99 Springer-Verlag
-
D. Bleichenbacher and S. Patel, "SOBER cryptanalysis," Proc. FSE'99, LNCS 1636, pp.305-316, Springer-Verlag, 1999.
-
(1999)
LNCS
, vol.1636
, pp. 305-316
-
-
Bleichenbacher, D.1
Patel, S.2
-
4
-
-
84937412475
-
Exploiting multiples of the connection polynomial in word-oriented stream cipher
-
Proc. ASIACRYPT2000 Springer-Verlag
-
P. Hawkes and G. Rose, "Exploiting multiples of the connection polynomial in word-oriented stream cipher," Proc. ASIACRYPT2000, LNCS 1976, pp.302-316, Springer-Verlag, 2000.
-
(2000)
LNCS
, vol.1976
, pp. 302-316
-
-
Hawkes, P.1
Rose, G.2
-
5
-
-
24944553900
-
Guess-and-determine attacks on SNOW
-
Proc. SAC'02, Springer-Verlag
-
P. Hawkes and G. Rose, "Guess-and-determine attacks on SNOW," Proc. SAC'02, LNCS 2595, pp.37-116, Springer-Verlag, 2003.
-
(2003)
LNCS
, vol.2595
, pp. 37-116
-
-
Hawkes, P.1
Rose, G.2
-
6
-
-
27844517104
-
Experimental analysis of guess-and-determine attacks on clock-controlled stream ciphers
-
Oct.
-
S. Kiyomoto, T. Tanaka, and K. Sakurai, "Experimental analysis of guess-and-determine attacks on clock-controlled stream ciphers," IEICE Trans. Fundamentals, vol.E88-A, no.10, pp.2778-2791, Oct. 2005.
-
(2005)
IEICE Trans. Fundamentals
, vol.E88-A
, Issue.10
, pp. 2778-2791
-
-
Kiyomoto, S.1
Tanaka, T.2
Sakurai, K.3
-
7
-
-
74049119654
-
Improved guess and determine attack on SOSEMANUK
-
available at
-
H. Ahmadi, T. Eghlidos, and S. Khazaei, "Improved guess and determine attack on SOSEMANUK," ECRYPT Stream Cipher Project, Report 2005/085, 2005, available at http://www.ecrypt.eu.org/stream/papersdir/085.pdf
-
(2005)
ECRYPT Stream Cipher Project, Report 2005/ 085
-
-
Ahmadi, H.1
Eghlidos, T.2
Khazaei, S.3
-
8
-
-
78650819509
-
Evaluation of SOSEMANUK with regard to guess-and-determine attacks
-
available at
-
Y. Tsunoo, T. Saito, M. Shigeri, T. Suzaki, H. Ahmadi, T. Eghlidos, and S. Khazaei, "Evaluation of SOSEMANUK with regard to guess-and-determine attacks," ECRYPT Stream Cipher Project, Report 2006/009, 2006, available at http://www.ecrypt.eu.org/stream/papersdir/2006/009.pdf
-
(2006)
ECRYPT Stream Cipher Project, Report 2006/009
-
-
Tsunoo, Y.1
Saito, T.2
Shigeri, M.3
Suzaki, T.4
Ahmadi, H.5
Eghlidos, T.6
Khazaei, S.7
-
9
-
-
84879530904
-
A guess-and-determine attack on the stream cipher Polar Bear
-
available at
-
J. Mattsson, "A guess-and-determine attack on the stream cipher Polar Bear," ECRYPT Stream Cipher Project, Report 2006/017, 2006, available at http://www.ecrypt.eu.org/stream/papersdir/2006/017.pdf
-
(2006)
ECRYPT Stream Cipher Project, Report 2006/017
-
-
Mattsson, J.1
-
11
-
-
79959372828
-
Wireless Ian medium access control (MAC) and physical layer (PHY) specifications
-
IEEE Computer Society
-
IEEE Computer Society, "Wireless Ian medium access control (MAC) and physical layer (PHY) specifications," IEEE Std 802.11, 1999.
-
(1999)
IEEE Std. 802.11
-
-
-
12
-
-
84949223752
-
Weaknesses in the key scheduling algorithm of RC4
-
Proc. SAC2001, Springer-Verlag
-
S. Fluhrer, I. Mantin, and A. Shamir, "Weaknesses in the key scheduling algorithm of RC4," Proc. SAC2001, LNCS 2259, pp.1-24, Springer-Verlag, 2001.
-
(2001)
LNCS
, vol.2259
, pp. 1-24
-
-
Fluhrer, S.1
Mantin, I.2
Shamir, A.3
-
13
-
-
33748569747
-
Attacks on RC4 and WEP
-
RSA Laboratories
-
S. Fluhrer, I. Mantin, and A. Shamir, "Attacks on RC4 and WEP," CryptoBytes, vol.5, no.2, pp.26-34, RSA Laboratories, 2002.
-
(2002)
CryptoBytes
, vol.5
, Issue.2
, pp. 26-34
-
-
Fluhrer, S.1
Mantin, I.2
Shamir, A.3
-
14
-
-
3142552643
-
A key recovery attack on the 802.11b wired equivalent privacy protocol (WEP)
-
May
-
A. Stubblefield, J. Ioannidis, and A.D. Rubin, "A key recovery attack on the 802.11b wired equivalent privacy protocol (WEP)," ACM Trans. Information and System Security, vol.7, no.2, pp.319-332, May 2004.
-
(2004)
ACM Trans. Information and System Security
, vol.7
, Issue.2
, pp. 319-332
-
-
Stubblefield, A.1
Ioannidis, J.2
Rubin, A.D.3
-
15
-
-
85027171139
-
-
available at
-
Wepcrack, available at http://sourceforge.net/projects/wepcrack/
-
-
-
-
16
-
-
85027162903
-
Yet other weak IVs for recovering wep keys
-
Parma, Italy, Oct.
-
K. Kobara and H. Imai, "Yet other weak IVs for recovering wep keys" Proc. ISITA2004, pp.1130-1134, Parma, Italy, Oct. 2004.
-
(2004)
Proc. ISITA2004
, pp. 1130-1134
-
-
Kobara, K.1
Imai, H.2
-
17
-
-
33646844622
-
FMS attack-resistant WEP implementation is still broken - Most IVs leak a part of key information
-
Proc. CIS2005, Part II, Springer-Verlag
-
T. Ohigashi, Y. Shiraishi, and M. Morii, "FMS attack-resistant WEP implementation is still broken - Most IVs leak a part of key information," Proc. CIS2005, Part II, Lecture Notes in Artificial Intelligence, vol.3802, pp.17-26, Springer-Verlag, 2005.
-
(2005)
Lecture Notes in Artificial Intelligence
, vol.3802
, pp. 17-26
-
-
Ohigashi, T.1
Shiraishi, Y.2
Morii, M.3
-
18
-
-
33748578653
-
Key-dependent weak IVs and weak keys in WEP - How to trace conditions back to their patterns
-
Aug.
-
K. Kobara and H. Imai, "Key-dependent weak IVs and weak keys in WEP - How to trace conditions back to their patterns," IEICE Trans. Fundamentals, vol.E89-A, no.8, pp.2198-2206, Aug. 2006.
-
(2006)
IEICE Trans. Fundamentals
, vol.E89-A
, Issue.8
, pp. 2198-2206
-
-
Kobara, K.1
Imai, H.2
-
21
-
-
50249147960
-
Breaking 104 bit WEP in less than 60 seconds
-
available at
-
E. Tews, R. Weinmann, and A. Pyshkin, "Breaking 104 bit WEP in less than 60 seconds," Cryptology ePrint, 2007, available at http://eprint.iacr.org/2007/120.pdf
-
(2007)
Cryptology EPrint
-
-
Tews, E.1
Weinmann, R.2
Pyshkin, A.3
-
23
-
-
84898198306
-
-
Wi-Fi Alliance, available at
-
Wi-Fi Alliance, "Wi-Fi protected access," available at http://www.weca.net/opensection/protected-access.asp
-
Wi-Fi Protected Access
-
-
-
24
-
-
84958985862
-
Iterative probabilistic cryptanalysis of RC4 keystream generator
-
Proc. ACISP2000, Springer-Verlag
-
J. Dj. Golić, "Iterative probabilistic cryptanalysis of RC4 keystream generator," Proc. ACISP2000, LNCS 1841, pp.220-233, Springer-Verlag, 2000.
-
(2000)
LNCS
, vol.1841
, pp. 220-233
-
-
Dj. Golić, J.1
-
25
-
-
48349116107
-
Linear statistical weakness of alleged RC4 keystream generator
-
Proc. EUROCRYPT'97, Springer-Verlag
-
I. Dj. Golić, "Linear statistical weakness of alleged RC4 keystream generator," Proc. EUROCRYPT'97, LNCS 1233, pp.226-238, Springer-Verlag, 1997.
-
(1997)
LNCS
, vol.1233
, pp. 226-238
-
-
Dj. Golić, I.1
-
26
-
-
84974666258
-
Statistical analysis of the alleged RC4 keystream generator
-
Proc. FSE2000
-
S. Fluhrer and D. McGrew, "Statistical analysis of the alleged RC4 keystream generator" Proc. FSE2000, LNCS 1978, pp.19-30, 2001.
-
(2001)
LNCS
, vol.1978
, pp. 19-30
-
-
Fluhrer, S.1
McGrew, D.2
-
27
-
-
84958972140
-
A practical attack on broadcast RC4
-
Proc. FSE2001,Springer-Verlag
-
I. Mantin and A. Shamir, "A practical attack on broadcast RC4," Proc. FSE2001, LNCS 2355, pp.152-164, Springer-Verlag, 2001.
-
(2001)
LNCS
, vol.2355
, pp. 152-164
-
-
Mantin, I.1
Shamir, A.2
-
28
-
-
26444620896
-
A new weakness in the RC4 keystream generator and an approach to improve the security of the cipher
-
Proc. FSE2004, Springer-Verlag
-
S. Paul and B. Preneel, "A new weakness in the RC4 keystream generator and an approach to improve the security of the cipher," Proc. FSE2004, LNCS 3017, pp.245-259, Springer-Verlag, 2004.
-
(2004)
LNCS
, vol.3017
, pp. 245-259
-
-
Paul, S.1
Preneel, B.2
-
29
-
-
24944554565
-
Predicting and distinguishing attacks on RC4 keystream generator
-
Proc. EUROCRYPT2005, Springer-Verlag
-
I. Mantin, "Predicting and distinguishing attacks on RC4 keystream generator," Proc. EUROCRYPT2005, LNCS 3494, pp.491-506, Springer-Verlag, 2005.
-
(2005)
LNCS
, vol.3494
, pp. 491-506
-
-
Mantin, I.1
-
30
-
-
38349034222
-
-
available at
-
R. Jenkins, "Isaac and RC4," available at http://burtleburtle. net/bob/rand/isaac.html
-
Isaac and RC4
-
-
Jenkins, R.1
-
31
-
-
84944076741
-
Analysis methods for (alleged) RC4
-
Proc. ASIACRYPT'98, Springer-Verlag
-
L.R. Knudsen, W. Meier, B. Preneel, V. Rijmen, and S. Verdoolaege, "Analysis methods for (alleged) RC4," Proc. ASIACRYPT'98, LNCS 1514, pp.327-341, Springer-Verlag, 1998.
-
(1998)
LNCS
, vol.1514
, pp. 327-341
-
-
Knudsen, L.R.1
Meier, W.2
Preneel, B.3
Rijmen, V.4
Verdoolaege, S.5
-
32
-
-
84859054985
-
Cryptanalysis of RC4-like ciphers
-
Proc. SAC'98, Springer-Verlag
-
S. Mister and S.E. Tavares, "Cryptanalysis of RC4-like ciphers," Proc. SAC'98, LNCS 1556, pp.131-143, Springer-Verlag, 1999.
-
(1999)
LNCS
, vol.1556
, pp. 131-143
-
-
Mister, S.1
Tavares, S.E.2
-
33
-
-
0242413023
-
Internal-state reconstruction of a stream cipher RC4
-
Oct.
-
Y Shiraishi, T. Ohigashi, and M. Morii, "Internal-state reconstruction of a stream cipher RC4," IEICE Trans. Fundamentals, vol.E86-A, no.10, pp.2636-2638, Oct. 2003.
-
(2003)
IEICE Trans. Fundamentals
, vol.E86-A
, Issue.10
, pp. 2636-2638
-
-
Shiraishi, Y.1
Ohigashi, T.2
Morii, M.3
-
34
-
-
35048865762
-
Reducing the state space of RC4 stream cipher
-
Proc. ICCS2004, Springer-Verlag
-
V. Tomaševič and S. Bojanič, "Reducing the state space of RC4 stream cipher," Proc. ICCS2004, LNCS 3036, pp.644-647, Springer-Verlag, 2004.
-
(2004)
LNCS
, vol.3036
, pp. 644-647
-
-
Tomaševič, V.1
Bojanič, S.2
-
36
-
-
85027171231
-
-
available at
-
AirSnort, available at http://airsnort.shmoo.com/
-
-
-
-
37
-
-
85027141143
-
-
Aircrack, http://www.cr0.net:8040/code/network/aircrack/
-
-
-
-
38
-
-
85027141847
-
-
Dwepcrack, http://www.e.kth.se/~pvz/wifi/
-
Dwepcrack
-
-
-
39
-
-
85027109650
-
-
Weplab, http://weplab.sourceforge.net/
-
-
-
|