-
1
-
-
58549119217
-
New results on the key scheduling algorithm of RC4
-
Lecture Notes in Computer Science 5365
-
M. Akgün, P. Kavak, H. Demirci, New results on the key scheduling algorithm of RC4, in INDOCRYPT'08. Lecture Notes in Computer Science, vol. 5365 (2008), pp. 40-52
-
(2008)
INDOCRYPT'08
, pp. 40-52
-
-
Akgün, M.1
Kavak, P.2
Demirci, H.3
-
2
-
-
79953284100
-
A complete characterization of the evolution of RC4 pseudo random generation algorithm
-
10.1515/JMC.2008.012 1146.94006 2573354
-
R. Basu, S. Ganguly, S. Maitra, G. Paul, A complete characterization of the evolution of RC4 pseudo random generation algorithm. J. Math. Cryptol. 2(3), 257-289 (2008)
-
(2008)
J. Math. Cryptol.
, vol.2
, Issue.3
, pp. 257-289
-
-
Basu, R.1
Ganguly, S.2
Maitra, S.3
Paul, G.4
-
3
-
-
68849117679
-
On some sequences of the secret pseudo-random index j in RC4 key scheduling
-
Lecture Notes in Computer Science 5527
-
R. Basu, S. Maitra, G. Paul, T. Talukdar, On some sequences of the secret pseudo-random index j in RC4 key scheduling, in AAECC'09. Lecture Notes in Computer Science, vol. 5527 (2009), pp. 137-148
-
(2009)
AAECC'09
, pp. 137-148
-
-
Basu, R.1
Maitra, S.2
Paul, G.3
Talukdar, T.4
-
4
-
-
50249183431
-
Efficient reconstruction of RC4 keys from internal states
-
Lecture Notes in Computer Science 5086
-
E. Biham, Y. Carmeli, Efficient reconstruction of RC4 keys from internal states, in FSE'08. Lecture Notes in Computer Science, vol. 5086 (2008), pp. 270-288
-
(2008)
FSE'08
, pp. 270-288
-
-
Biham, E.1
Carmeli, Y.2
-
5
-
-
80054795219
-
How to find short RC4 colliding key pairs
-
Lecture Notes in Computer Science 7001
-
J. Chen, A. Miyaji, How to find short RC4 colliding key pairs, in ISC'11. Lecture Notes in Computer Science, vol. 7001 (2011), pp. 32-46
-
(2011)
ISC'11
, pp. 32-46
-
-
Chen, J.1
Miyaji, A.2
-
6
-
-
84974666258
-
Statistical analysis of the alleged RC4 keystream generator
-
Lecture Notes in Computer Science 1978
-
S.R. Fluhrer, D.A. McGrew, Statistical analysis of the alleged RC4 keystream generator, in FSE'00. Lecture Notes in Computer Science, vol. 1978 (2000), pp. 19-30
-
(2000)
FSE'00
, pp. 19-30
-
-
Fluhrer, S.R.1
McGrew, D.A.2
-
7
-
-
84949223752
-
Weaknesses in the key scheduling algorithm of RC4
-
Lecture Notes in Computer Science 2259
-
S.R. Fluhrer, I. Mantin, A. Shamir, Weaknesses in the key scheduling algorithm of RC4, in SAC'01. Lecture Notes in Computer Science, vol. 2259 (2001), pp. 1-24
-
(2001)
SAC'01
, pp. 1-24
-
-
Fluhrer, S.R.1
Mantin, I.2
Shamir, A.3
-
8
-
-
84957380512
-
Linear statistical weakness of alleged RC4 keystream generator
-
Lecture Notes in Computer Science 1233
-
J.D. Golic, Linear statistical weakness of alleged RC4 keystream generator, in EUROCRYPT'97. Lecture Notes in Computer Science, vol. 1233 (1997), pp. 226-238
-
(1997)
EUROCRYPT'97
, pp. 226-238
-
-
Golic, J.D.1
-
9
-
-
84958985862
-
Iterative probabilistic cryptanalysis of RC4 keystream generator
-
Lecture Notes in Computer Science 1841
-
J.D. Golic, Iterative probabilistic cryptanalysis of RC4 keystream generator, in ACISP'00. Lecture Notes in Computer Science, vol. 1841 (2000), pp. 220-233
-
(2000)
ACISP'00
, pp. 220-233
-
-
Golic, J.D.1
-
12
-
-
38349034222
-
-
Published on the Internet
-
R.J. Jenkins, ISAAC and RC4 (1996). Published on the Internet at http://burtleburtle.net/bob/rand/isaac.html
-
(1996)
ISAAC and RC4
-
-
Jenkins, R.J.1
-
13
-
-
58849146687
-
On reconstruction of RC4 keys from internal states
-
Lecture Notes in Computer Science 5393
-
S. Khazaei, W. Meier, On reconstruction of RC4 keys from internal states, in MMICS'08. Lecture Notes in Computer Science, vol. 5393 (2008), pp. 179-189
-
(2008)
MMICS'08
, pp. 179-189
-
-
Khazaei, S.1
Meier, W.2
-
14
-
-
47749085463
-
Attacks on the RC4 stream cipher
-
10.1007/s10623-008-9206-6 1179.94064 2411115
-
A. Klein, Attacks on the RC4 stream cipher. Des. Codes Cryptogr. 48(3), 269-286 (2008)
-
(2008)
Des. Codes Cryptogr.
, vol.48
, Issue.3
, pp. 269-286
-
-
Klein, A.1
-
15
-
-
84944076741
-
Analysis methods for (alleged) RC4
-
Lecture Notes in Computer Science 1514
-
L.R. Knudsen, W. Meier, B. Preneel, V. Rijmen, S. Verdoolaege, Analysis methods for (alleged) RC4, in ASIACRYPT'98. Lecture Notes in Computer Science, vol. 1514 (1998), pp. 327-341
-
(1998)
ASIACRYPT'98
, pp. 327-341
-
-
Knudsen, L.R.1
Meier, W.2
Preneel, B.3
Rijmen, V.4
Verdoolaege, S.5
-
16
-
-
79959986641
-
Attack on broadcast RC4 revisited
-
Lecture Notes in Computer Science 6733
-
S. Maitra, G. Paul, S. Sen Gupta, Attack on broadcast RC4 revisited, in FSE'11. Lecture Notes in Computer Science, vol. 6733 (2011), pp. 199-217
-
(2011)
FSE'11
, pp. 199-217
-
-
Maitra, S.1
Paul, G.2
Sen Gupta, S.3
-
17
-
-
2942557845
-
-
Master's Thesis, The Weizmann Institute of Science, Israel
-
I. Mantin, Analysis of the stream cipher RC4. Master's Thesis, The Weizmann Institute of Science, Israel (2001). Available at http://www.wisdom. weizmann.ac.il/~itsik/RC4/rc4.html
-
(2001)
Analysis of the Stream Cipher RC4
-
-
Mantin, I.1
-
18
-
-
84958972140
-
A practical attack on broadcast RC4
-
Lecture Notes in Computer Science 2355
-
I. Mantin, A. Shamir, A practical attack on broadcast RC4, in FSE'01. Lecture Notes in Computer Science, vol. 2355 (2002), pp. 152-164
-
(2002)
FSE'01
, pp. 152-164
-
-
Mantin, I.1
Shamir, A.2
-
19
-
-
24944554565
-
Predicting and distinguishing attacks on RC4 keystream generator
-
Lecture Notes in Computer Science 3494
-
I. Mantin, Predicting and distinguishing attacks on RC4 keystream generator, in EUROCRYPT'05. Lecture Notes in Computer Science, vol. 3494 (2005), pp. 491-506
-
(2005)
EUROCRYPT'05
, pp. 491-506
-
-
Mantin, I.1
-
20
-
-
33646812220
-
A practical attack on the fixed RC4 in the WEP mode
-
Lecture Notes in Computer Science 3788
-
I. Mantin, A practical attack on the fixed RC4 in the WEP mode, in ASIACRYPT'05. Lecture Notes in Computer Science, vol. 3788 (2005), pp. 395-411
-
(2005)
ASIACRYPT'05
, pp. 395-411
-
-
Mantin, I.1
-
21
-
-
70350367211
-
Key collisions of the RC4 stream cipher
-
Lecture Notes in Computer Science 5665
-
M. Matsui, Key collisions of the RC4 stream cipher, in FSE'09. Lecture Notes in Computer Science, vol. 5665 (2009), pp. 38-50
-
(2009)
FSE'09
, pp. 38-50
-
-
Matsui, M.1
-
22
-
-
51849130337
-
New state recovery attack on RC4
-
Lecture Notes in Computer Science 5157
-
A. Maximov, D. Khovratovich, New state recovery attack on RC4, in CRYPTO'08. Lecture Notes in Computer Science, vol. 5157 (2008), pp. 297-316
-
(2008)
CRYPTO'08
, pp. 297-316
-
-
Maximov, A.1
Khovratovich, D.2
-
23
-
-
84937401544
-
(Not so) random shuffles of RC4
-
Lecture Notes in Computer Science 2442
-
I. Mironov, (Not so) random shuffles of RC4, in CRYPTO'02. Lecture Notes in Computer Science, vol. 2442 (2002), pp. 304-319
-
(2002)
CRYPTO'02
, pp. 304-319
-
-
Mironov, I.1
-
24
-
-
84859054985
-
Cryptanalysis of RC4-like ciphers
-
Lecture Notes in Computer Science 1999
-
S. Mister, S.E. Tavares, Cryptanalysis of RC4-like ciphers, in SAC'98. Lecture Notes in Computer Science, vol. 1999 (1998), pp. 131-143
-
(1998)
SAC'98
, pp. 131-143
-
-
Mister, S.1
Tavares, S.E.2
-
25
-
-
0347526103
-
Analysis of non-fortuitous predictive states of the RC4 keystream generator
-
Lecture Notes in Computer Science 2904
-
S. Paul, B. Preneel, Analysis of non-fortuitous predictive states of the RC4 keystream generator, in INDOCRYPT'03. Lecture Notes in Computer Science, vol. 2904 (2003), pp. 52-67
-
(2003)
INDOCRYPT'03
, pp. 52-67
-
-
Paul, S.1
Preneel, B.2
-
26
-
-
38549126576
-
Permutation after RC4 key scheduling reveals the secret key
-
Lecture Notes in Computer Science 4876
-
G. Paul, S. Maitra, Permutation after RC4 key scheduling reveals the secret key, in SAC'07. Lecture Notes in Computer Science, vol. 4876 (2007), pp. 360-377
-
(2007)
SAC'07
, pp. 360-377
-
-
Paul, G.1
Maitra, S.2
-
27
-
-
0038331163
-
-
Two posts in sci.crypt, message-id 43u1eh1j3@hermes.is.co.za and 44ebgellf@hermes.is.co.za
-
A. Roos, A class of weak keys in the RC4 stream cipher. Two posts in sci.crypt, message-id 43u1eh1j3@hermes.is.co.za and 44ebgellf@hermes.is.co.za (1995). Available at http://www.impic.org/papers/WeakKeys-report.pdf
-
(1995)
A Class of Weak Keys in the RC4 Stream Cipher
-
-
Roos, A.1
-
28
-
-
84863274546
-
Proof of empirical RC4 biases and new key correlations
-
Lecture Notes in Computer Science 7118
-
S. Sen Gupta, S. Maitra, G. Paul, S. Sarkar, Proof of empirical RC4 biases and new key correlations, in SAC'11. Lecture Notes in Computer Science, vol. 7118 (2011), pp. 151-168
-
(2011)
SAC'11
, pp. 151-168
-
-
Sen Gupta, S.1
Maitra, S.2
Paul, G.3
Sarkar, S.4
-
30
-
-
79952593099
-
Discovery and exploitation of new biases in RC4
-
Lecture Notes in Computer Science 6544
-
P. Sepehrdad, S. Vaudenay, M. Vuagnoux, Discovery and exploitation of new biases in RC4, in SAC'10. Lecture Notes in Computer Science, vol. 6544 (2011), pp. 74-91
-
(2011)
SAC'10
, pp. 74-91
-
-
Sepehrdad, P.1
Vaudenay, S.2
Vuagnoux, M.3
-
31
-
-
79957980242
-
Statistical attack on RC4 - Distinguishing WPA
-
Lecture Notes in Computer Science 6632
-
P. Sepehrdad, S. Vaudenay, M. Vuagnoux, Statistical attack on RC4 - distinguishing WPA, in EUROCRYPT'11. Lecture Notes in Computer Science, vol. 6632 (2011), pp. 343-363
-
(2011)
EUROCRYPT'11
, pp. 343-363
-
-
Sepehrdad, P.1
Vaudenay, S.2
Vuagnoux, M.3
-
32
-
-
2642513982
-
An improved internal-state reconstruction method of a stream cipher RC4
-
Track 440-088, New York, USA December 10-12
-
Y. Shiraishi, T. Ohigashi, M. Morii, An improved internal-state reconstruction method of a stream cipher RC4, in Communication, Network, and Information Security. Track 440-088, New York, USA, December 10-12 (2003)
-
(2003)
Communication, Network, and Information Security
-
-
Shiraishi, Y.1
Ohigashi, T.2
Morii, M.3
-
33
-
-
33846288293
-
Finding an internal state of RC4 stream cipher
-
10.1016/j.ins.2006.10.010 1116.68419 2303182
-
V. Tomasevic, S. Bojanic, O. Nieto-Taladriz, Finding an internal state of RC4 stream cipher. Inf. Sci. 177, 1715-1727 (2007)
-
(2007)
Inf. Sci.
, vol.177
, pp. 1715-1727
-
-
Tomasevic, V.1
Bojanic, S.2
Nieto-Taladriz, O.3
-
34
-
-
38549101578
-
Breaking 104 bit WEP in less than 60 seconds
-
Lecture Notes in Computer Science 4867
-
E. Tews, R.-P. Weinmann, A. Pyshkin, Breaking 104 bit WEP in less than 60 seconds, in WISA'07. Lecture Notes in Computer Science, vol. 4867 (2007), pp. 188-202
-
(2007)
WISA'07
, pp. 188-202
-
-
Tews, E.1
Weinmann, R.-P.2
Pyshkin, A.3
-
35
-
-
70349147400
-
Practical attacks against WEP and WPA
-
ACM New York
-
E. Tews, M. Beck, Practical attacks against WEP and WPA, in WISEC'09 (ACM, New York, 2009), pp. 79-86
-
(2009)
WISEC'09
, pp. 79-86
-
-
Tews, E.1
Beck, M.2
-
36
-
-
38549167348
-
Passive-only key recovery attacks on RC4
-
Lecture Notes in Computer Science 4876
-
S. Vaudenay, M. Vuagnoux, Passive-only key recovery attacks on RC4, in SAC'07. Lecture Notes in Computer Science, vol. 4876 (2007), pp. 344-359
-
(2007)
SAC'07
, pp. 344-359
-
-
Vaudenay, S.1
Vuagnoux, M.2
-
37
-
-
38349020857
-
-
D.A. Wagner, My RC4 weak keys (1995). http://www.cs.berkeley.edu/~daw/my- posts/my-rc4-weak-keys
-
(1995)
My RC4 Weak Keys
-
-
Wagner, D.A.1
|