-
1
-
-
50249183431
-
Efficient Reconstruction of RC4 Keys from Internal States
-
Nyberg, K. (ed.) FSE 2008, Springer, Heidelberg
-
Biham, E., Carmeli, Y.: Efficient Reconstruction of RC4 Keys from Internal States. In: Nyberg, K. (ed.) FSE 2008. LNCS, vol. 5086, pp. 270-288. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5086
, pp. 270-288
-
-
Biham, E.1
Carmeli, Y.2
-
5
-
-
84949223752
-
Weaknesses in the Key Scheduling Algorithm of RC4
-
Vaudenay, S., Youssef, A.M. (eds.) SAC 2001, Springer, Heidelberg
-
Fluhrer, S.R., Mantin, I., Shamir, A.: Weaknesses in the Key Scheduling Algorithm of RC4. In: Vaudenay, S., Youssef, A.M. (eds.) SAC 2001. LNCS, vol. 2259, pp. 1-24. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2259
, pp. 1-24
-
-
Fluhrer, S.R.1
Mantin, I.2
Shamir, A.3
-
6
-
-
84974666258
-
Statistical Analysis of the Alleged RC4 Keystream Generator
-
Fast Software Encryption
-
Fluhrer, S.R., McGrew, D.A.: Statistical Analysis of the Alleged RC4 Keystream Generator. In: Schneier, B. (ed.) FSE 2000. LNCS, vol. 1978, pp. 19-30. Springer, Heidelberg (2001) (Pubitemid 33236938)
-
(2001)
Lecture Notes in Computer Science
, Issue.1978
, pp. 19-30
-
-
Fluhrer, S.R.1
McGrew, D.A.2
-
7
-
-
84957380512
-
Linear Statistical Weakness of Alleged RC4 Keystream Generator
-
Advances in Cryptology - Eurocrypt '97
-
Golic, J.D.: Linear statistical weakness of alleged RC4 keystream generator. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol. 1233, pp. 226-238. Springer, Heidelberg (1997) (Pubitemid 127067804)
-
(1997)
Lecture Notes in Computer Science
, Issue.1233
, pp. 226-238
-
-
Golic, J.D.1
-
8
-
-
84958985862
-
Iterative Probabilistic Cryptanalysis of RC4 Keystream Generator
-
Dawson, E., Clark, A., Boyd, C. (eds.) ACISP 2000, Springer, Heidelberg
-
Golic, J.D.: Iterative Probabilistic Cryptanalysis of RC4 Keystream Generator. In: Dawson, E., Clark, A., Boyd, C. (eds.) ACISP 2000. LNCS, vol. 1841, pp. 220-233. Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1841
, pp. 220-233
-
-
Golic, J.D.1
-
10
-
-
79952596527
-
ANSI/IEEE standard 802.11i: Amendment 6 Wireless LAN Medium Access Control (MAC) and Physical Layer (phy) Specifications
-
IEEE
-
IEEE. ANSI/IEEE standard 802.11i: Amendment 6 Wireless LAN Medium Access Control (MAC) and Physical Layer (phy) Specifications, Draft 3 (2003)
-
(2003)
Draft
, vol.3
-
-
-
12
-
-
38549088702
-
Attacks on the RC4 Stream Cipher
-
Klein, A.: Attacks on the RC4 Stream Cipher. Personal Andreas Klein website (2006), http://cage.ugent.be/~klein/RC4/RC4-en.ps
-
(2006)
Personal Andreas Klein Website
-
-
Klein, A.1
-
13
-
-
47749085463
-
Attacks on the RC4 Stream Cipher
-
Klein, A.: Attacks on the RC4 Stream Cipher. Des. Codes Cryptography 48(3), 269-286 (2008)
-
(2008)
Des. Codes Cryptography
, vol.48
, Issue.3
, pp. 269-286
-
-
Klein, A.1
-
14
-
-
84944076741
-
Analysis Methods for (Alleged) RC4
-
Advances in Cryptology - ASIACRYPT '98
-
Knudsen, L.R., Meier, W., Preneel, B., Rijmen, V., Verdoolaege, S.: Analysis Methods for (Alleged) RC4. In: Ohta, K., Pei, D. (eds.) ASIACRYPT 1998. LNCS, vol. 1514, pp. 327- 341. Springer, Heidelberg (1998) (Pubitemid 128151430)
-
(1998)
Lecture Notes in Computer Science
, Issue.1514
, pp. 327-341
-
-
Knudsen, L.R.1
Meier, W.2
Preneel, B.3
Rijmen, V.4
Verdoolaege, S.5
-
15
-
-
79958008508
-
-
KoreK. Need Security Pointers (2004), http://www.netstumbler.org/ showthread.php?postid=89036#post89036
-
(2004)
Need Security Pointers
-
-
Kore, K.1
-
17
-
-
50249171695
-
New Form of Permutation Bias and Secret Key Leakage in Keystream Bytes of RC4
-
Nyberg, K. (ed.) FSE 2008, Springer, Heidelberg
-
Maitra, S., Paul, G.: New Form of Permutation Bias and Secret Key Leakage in Keystream Bytes of RC4. In: Nyberg, K. (ed.) FSE 2008. LNCS, vol. 5086, pp. 253-269. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5086
, pp. 253-269
-
-
Maitra, S.1
Paul, G.2
-
19
-
-
24944554565
-
Predicting and distinguishing attacks on RC4 keystream generator
-
Advances in Cryptology - EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Proceedings
-
Mantin, I.: Predicting and Distinguishing Attacks on RC4 Keystream Generator. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 491-506. Springer, Heidelberg (2005) (Pubitemid 41313971)
-
(2005)
Lecture Notes in Computer Science
, vol.3494
, pp. 491-506
-
-
Mantin, I.1
-
20
-
-
84958972140
-
A practical attack on broadcast RC4
-
Matsui, M. (ed.) FSE 2001, Springer, Heidelberg
-
Mantin, I., Shamir, A.: A Practical Attack on Broadcast RC4. In: Matsui, M. (ed.) FSE 2001. LNCS, vol. 2355, pp. 152-164. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2355
, pp. 152-164
-
-
Mantin, I.1
Shamir, A.2
-
21
-
-
26444526997
-
Two linear distinguishing attacks on VMPC and RC4A and weakness of RC4 family of stream ciphers
-
Fast Software Encryption: 12th International Workshop, FSE 2005. Revised Selected Papers
-
Maximov, A.: Two Linear Distinguishing Attacks on VMPC and RC4A and Weakness of RC4 Family of Stream Ciphers. In: Gilbert, H., Handschuh, H. (eds.) FSE 2005. LNCS, vol. 3557, pp. 342-358. Springer, Heidelberg (2005) (Pubitemid 41425174)
-
(2005)
Lecture Notes in Computer Science
, vol.3557
, pp. 342-358
-
-
Maximov, A.1
-
22
-
-
51849130337
-
New state recovery attack on RC4
-
Wagner, D. (ed.) CRYPTO 2008, Springer, Heidelberg
-
Maximov, A., Khovratovich, D.: New State Recovery Attack on RC4. In: Wagner, D. (ed.) CRYPTO 2008. LNCS, vol. 5157, pp. 297-316. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5157
, pp. 297-316
-
-
Maximov, A.1
Khovratovich, D.2
-
23
-
-
84937401544
-
(Not So) Random shuffles of RC4
-
Yung, M. (ed.) CRYPTO 2002, Springer, Heidelberg
-
Mironov, I.: (Not So) Random Shuffles of RC4. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 304-319. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2442
, pp. 304-319
-
-
Mironov, I.1
-
24
-
-
33444473347
-
Weaknesses in the temporal key hash of WPA
-
Moen, V., Raddum, H., Hole, K.J.: Weaknesses in the Temporal Key Hash of WPA. Mobile Computing and Communications Review 8(2), 76-83 (2004)
-
(2004)
Mobile Computing and Communications Review
, vol.8
, Issue.2
, pp. 76-83
-
-
Moen, V.1
Raddum, H.2
Hole, K.J.3
-
25
-
-
38549126576
-
Permutation after RC4 key scheduling reveals the secret key
-
Selected Areas in Cryptography - 14th International Workshop, SAC 2007, Revised Selected Papers
-
Paul, G., Maitra, S.: Permutation After RC4 Key Scheduling Reveals the Secret Key. In: Adams, C., Miri, A., Wiener, M. (eds.) SAC 2007. LNCS, vol. 4876, pp. 360-377. Springer, Heidelberg (2007) (Pubitemid 351153096)
-
(2007)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4876
, pp. 360-377
-
-
Paul, G.1
Maitra, S.2
-
26
-
-
38349067080
-
On non-negligible bias of the first output bytes of rc4 towards the first three bytes of the secret key
-
Paul, G., Rathi, S., Maitra, S.: On Non-negligible Bias of the First Output Bytes of RC4 towards the First Three Bytes of the Secret Key. In: WCC 2007 - International Workshop on Coding and Cryptography, pp. 285-294 (2007)
-
(2007)
WCC 2007 - International Workshop on Coding and Cryptography
, pp. 285-294
-
-
Paul, G.1
Rathi, S.2
Maitra, S.3
-
27
-
-
26444620896
-
A New Weakness in the RC4 Keystream Generator and an Approach to Improve the Security of the Cipher
-
Roy, B., Meier,W. (eds.), FSE 2004, Springer, Heidelberg
-
Paul, S., Preneel, B.: A New Weakness in the RC4 Keystream Generator and an Approach to Improve the Security of the Cipher. In: Roy, B., Meier,W. (eds.) FSE 2004. LNCS, vol. 3017, pp. 245-259. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3017
, pp. 245-259
-
-
Paul, S.1
Preneel, B.2
-
29
-
-
70349147400
-
Practical attacks against WEP and WPA
-
Basin, D.A., Capkun, S., Lee, W. (eds.), ACM, New York
-
Tews, E., Beck, M.: Practical attacks against WEP and WPA. In: Basin, D.A., Capkun, S., Lee, W. (eds.) WISEC, pp. 79-86. ACM, New York (2009)
-
(2009)
WISEC
, pp. 79-86
-
-
Tews, E.1
Beck, M.2
-
30
-
-
38549101578
-
Breaking 104 BitWEP in Less Than 60 Seconds
-
Kim, S., Yung, M., Lee, H.-W. (eds.), WISA 2007, Springer, Heidelberg
-
Tews, E.,Weinmann, R.-P., Pyshkin, A.: Breaking 104 BitWEP in Less Than 60 Seconds. In: Kim, S., Yung, M., Lee, H.-W. (eds.) WISA 2007. LNCS, vol. 4867, pp. 188-202. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.4867
, pp. 188-202
-
-
Tews, E.1
Weinmann, R.-P.2
Pyshkin, A.3
-
31
-
-
33846288293
-
Finding an internal state of RC4 stream cipher
-
DOI 10.1016/j.ins.2006.10.010, PII S0020025506003203, Fuzzy set applications in Industrial Engineering
-
Tomasevic, V., Bojanic, S.,Nieto-Taladriz, O.: Finding an internal state of RC4 stream cipher. Finding an internal state of RC4 stream cipher 177(7), 1715-1727 (2007) (Pubitemid 46110986)
-
(2007)
Information Sciences
, vol.177
, Issue.7
, pp. 1715-1727
-
-
Tomasevic, V.1
Bojanic, S.2
Nieto-Taladriz, O.3
-
32
-
-
38549167348
-
Passive-only key recovery attacks on RC4
-
Selected Areas in Cryptography - 14th International Workshop, SAC 2007, Revised Selected Papers
-
Vaudenay, S., Vuagnoux, M.: Passive-Only Key Recovery Attacks on RC4. In: Adams, C., Miri, A., Wiener, M. (eds.) SAC 2007. LNCS, vol. 4876, pp. 344-359. Springer, Heidelberg (2007) (Pubitemid 351153095)
-
(2007)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4876
, pp. 344-359
-
-
Vaudenay, S.1
Vuagnoux, M.2
|