-
4
-
-
85076292402
-
On the security of RC4 in TLS and WPA
-
University of London
-
ALFARDAN, N. J., and BERNSTEIN., D. J., PATERSON, K. G., PO-ETTERING, B., and SCHULDT, J. C. N. On the security of RC4 in TLS and WPA. Information Security Group at Royal Holloway, University of London, 2013. http://www.isg.rhul.ac.uk/tls/RC4biases.pdf.
-
(2013)
Information Security Group at Royal Holloway
-
-
Alfardan, N.J.1
Bernstein, D.J.2
Paterson, K.G.3
Po-Ettering, B.4
Schuldt, J.C.N.5
-
5
-
-
85076279022
-
-
Amman, B. Personal communication, February 2013
-
AMMAN, B. Personal communication, February 2013.
-
-
-
-
6
-
-
35248836120
-
Password interception in a SSL/TLS channel
-
CANVEL, B., HILTGEN, A., VAUDENAY, S., and VUAGNOUX, M. Password interception in a SSL/TLS channel. Advances in Cryptology-CRYPTO 2003 (2003), 583-599.
-
(2003)
Advances in Cryptology-CRYPTO
, vol.2003
, pp. 583-599
-
-
Canvel, B.1
Hiltgen, A.2
Vaudenay, S.3
Vuagnoux, M.4
-
11
-
-
84949223752
-
Weaknesses in the key scheduling algorithm of RC4
-
S. Vaudenay and A. M. Youssef, Eds., Vol. 2259 of Lecture Notes in Computer Science, Springer
-
FLUHRER, S. R., MANTIN, I., and SHAMIR, A. Weaknesses in the key scheduling algorithm of RC4. In Selected Areas in Cryptography (2001), S. Vaudenay and A. M. Youssef, Eds., Vol. 2259 of Lecture Notes in Computer Science, Springer, pp. 1-24.
-
Selected Areas in Cryptography (2001)
, pp. 1-24
-
-
Fluhrer, S.R.1
Mantin, I.2
Shamir, A.3
-
12
-
-
84974666258
-
Statistical analysis of the alleged RC4 keystream generator
-
B. Schneier, Ed., Vol. 1978 of Lecture Notes in Computer Science, Springer
-
FLUHRER, S. R., and MCGREW, D. Statistical analysis of the alleged RC4 keystream generator. In FSE (2000), B. Schneier, Ed., Vol. 1978 of Lecture Notes in Computer Science, Springer, pp. 19-30.
-
FSE (2000)
, pp. 19-30
-
-
Fluhrer, S.R.1
Mcgrew, D.2
-
13
-
-
84891778578
-
Full plaintext recovery attack on broadcast RC4
-
ISOBE, T., OHIGASHI, T., WATANABE, Y., and MORII, M. Full plaintext recovery attack on broadcast RC4. In Preproceedings of FSE (2013).
-
(2013)
Preproceedings of FSE
-
-
Isobe, T.1
Ohigashi, T.2
Watanabe, Y.3
Morii, M.4
-
14
-
-
84916616993
-
The RC4-HMAC kerberos encryption types used by microsoft windows
-
Dec.
-
JAGANATHAN, K., ZHU, L., and BREZAK, J. The RC4-HMAC Kerberos Encryption Types Used by Microsoft Windows. RFC 4757 (Informational), Dec. 2006.
-
(2006)
RFC 4757 (Informational)
-
-
Jaganathan, K.1
Zhu, L.2
Brezak, J.3
-
15
-
-
79959986641
-
Attack on broadcast RC4 revisited
-
A. Joux, Ed., Vol. 6733 of Lecture Notes in Computer Science, Springer
-
MAITRA, S., PAUL, G., and SENGUPTA, S. Attack on broadcast RC4 revisited. In FSE (2011), A. Joux, Ed., Vol. 6733 of Lecture Notes in Computer Science, Springer, pp. 199-217.
-
FSE (2011)
, pp. 199-217
-
-
Maitra, S.1
Paul, G.2
Sengupta, S.3
-
16
-
-
24944554565
-
Predicting and distinguishing attacks on rc4 keystream generator
-
R. Cramer, Ed., Vol. 3494 of Lecture Notes in Computer Science, Springer
-
MANTIN, I. Predicting and distinguishing attacks on rc4 keystream generator. In EUROCRYPT (2005), R. Cramer, Ed., Vol. 3494 of Lecture Notes in Computer Science, Springer, pp. 491-506.
-
EUROCRYPT (2005)
, pp. 491-506
-
-
Mantin, I.1
-
17
-
-
84958972140
-
A practical attack on broadcast RC4
-
M. Matsui, Ed., Vol. 2355 of Lecture Notes in Computer Science, Springer
-
MANTIN, I., and SHAMIR, A. A practical attack on broadcast RC4. In FSE (2001), M. Matsui, Ed., Vol. 2355 of Lecture Notes in Computer Science, Springer, pp. 152-164.
-
FSE (2001)
, pp. 152-164
-
-
Mantin, I.1
Shamir, A.2
-
19
-
-
84937401544
-
(Not so) random shuffles of RC4
-
M. Yung, Ed., Vol. 2442 of Lecture Notes in Computer Science, Springer
-
MIRONOV, I. (Not so) random shuffles of RC4. In CRYPTO (2002), M. Yung, Ed., Vol. 2442 of Lecture Notes in Computer Science, Springer, pp. 304-319.
-
CRYPTO (2002)
, pp. 304-319
-
-
Mironov, I.1
-
20
-
-
84883592126
-
-
Feb
-
PHP DOCUMENTATION GROUP. PHP manual, Feb 2013. http://www.php.net/manual/en/session.configuration.php#ini.session.hash-bits-per-character.
-
(2013)
PHP Manual
-
-
-
21
-
-
84865514784
-
-
RFC 5288 (Proposed Standard), Aug.
-
SALOWEY, J., CHOUDHURY, A., and MCGREW, D. AES Galois Counter Mode (GCM) Cipher Suites for TLS. RFC 5288 (Proposed Standard), Aug. 2008.
-
(2008)
AES Galois Counter Mode (GCM) Cipher Suites for TLS
-
-
Salowey, J.1
Choudhury, A.2
Mcgrew, D.3
-
22
-
-
84863274546
-
Proof of empirical RC4 biases and new key correlations
-
SEN GUPTA, S., MAITRA, S., PAUL, G., and SARKAR, S. Proof of empirical RC4 biases and new key correlations. In Selected Areas in Cryptography (2011), pp. 151-168.
-
(2011)
Selected Areas in Cryptography
, pp. 151-168
-
-
Sen Gupta, S.1
Maitra, S.2
Paul, G.3
Sarkar, S.4
-
23
-
-
84892761721
-
(Non-) random sequences from (non-) random permutations - Analysis of RC4 stream cipher
-
SEN GUPTA, S., MAITRA, S., PAUL, G., and SARKAR, S. (Non-) random sequences from (non-) random permutations - analysis of RC4 stream cipher. Journal of Cryptology to appear (2013).
-
(2013)
Journal of Cryptology to Appear
-
-
Sen Gupta, S.1
Maitra, S.2
Paul, G.3
Sarkar, S.4
-
24
-
-
79952593099
-
Discovery and exploitation of new biases in RC4
-
A. Biryukov, G. Gong, and D. R. Stinson, Eds., Vol. 6544 of Lecture Notes in Computer Science, Springer
-
SEPEHRDAD, P., VAUDENAY, S., and VUAGNOUX, M. Discovery and exploitation of new biases in RC4. In Selected Areas in Cryptography (2010), A. Biryukov, G. Gong, and D. R. Stinson, Eds., Vol. 6544 of Lecture Notes in Computer Science, Springer, pp. 74-91.
-
Selected Areas in Cryptography (2010)
, pp. 74-91
-
-
Sepehrdad, P.1
Vaudenay, S.2
Vuagnoux, M.3
-
25
-
-
79957980242
-
Statistical attack on RC4 - Distinguishing WPA
-
K. G. Paterson, Ed., Vol. 6632 of Lecture Notes in Computer Science, Springer
-
SEPEHRDAD, P., VAUDENAY, S., and VUAGNOUX, M. Statistical attack on RC4 - distinguishing WPA. In EUROCRYPT (2011), K. G. Paterson, Ed., Vol. 6632 of Lecture Notes in Computer Science, Springer, pp. 343-363.
-
EUROCRYPT (2011)
, pp. 343-363
-
-
Sepehrdad, P.1
Vaudenay, S.2
Vuagnoux, M.3
-
26
-
-
38549167348
-
Passive-only key recovery attacks on RC4
-
C. M. Adams, A. Miri, and M. J. Wiener, Eds., Vol. 4876 of Lecture Notes in Computer Science, Springer
-
VAUDENAY, S., and VUAGNOUX, M. Passive-only key recovery attacks on RC4. In Selected Areas in Cryptography (2007), C. M. Adams, A. Miri, and M. J. Wiener, Eds., Vol. 4876 of Lecture Notes in Computer Science, Springer, pp. 344-359.
-
Selected Areas in Cryptography (2007)
, pp. 344-359
-
-
Vaudenay, S.1
Vuagnoux, M.2
|