Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
153 | Serge Mister, Stafford E. Tavares |
Cryptanalysis of RC4-like Ciphers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Selected Areas in Cryptography ![In: Selected Areas in Cryptography '98, SAC'98, Kingston, Ontario, Canada, August 17-18, 1998, Proceedings, pp. 131-143, 1998, Springer, 3-540-65894-7. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
152 | Donghoon Chang, Kishan Chand Gupta, Mridul Nandi |
RC4-Hash: A New Hash Function Based on RC4. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2006, 7th International Conference on Cryptology in India, Kolkata, India, December 11-13, 2006, Proceedings, pp. 80-94, 2006, Springer, 3-540-49767-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Hash Function, Collision Attack, RC4, Preimage Attack |
146 | Guang Gong, Kishan Chand Gupta, Martin Hell, Yassir Nawaz |
Towards a General RC4-Like Keystream Generator. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CISC ![In: Information Security and Cryptology, First SKLOIS Conference, CISC 2005, Beijing, China, December 15-17, 2005, Proceedings, pp. 162-174, 2005, Springer, 3-540-30855-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
random shuffle, stream ciphers, RC4, keystream generator |
146 | Itsik Mantin |
A Practical Attack on the Fixed RC4 in the WEP Mode. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2005, 11th International Conference on the Theory and Application of Cryptology and Information Security, Chennai, India, December 4-8, 2005, Proceedings, pp. 395-411, 2005, Springer, 3-540-30684-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Related IV attacks, Cryptanalysis, Stream ciphers, Side-channel attacks, Fault analysis, RC4, Related key attacks |
146 | Itsik Mantin |
Predicting and Distinguishing Attacks on RC4 Keystream Generator. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT 2005, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings, pp. 491-506, 2005, Springer, 3-540-25910-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Predicting attacks, Cryptanalysis, Stream ciphers, RC4, Distinguishing attacks |
132 | Subhamoy Maitra, Goutam Paul 0001 |
Analysis of RC4 and Proposal of Additional Layers for Better Security Margin. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2008, 9th International Conference on Cryptology in India, Kharagpur, India, December 14-17, 2008. Proceedings, pp. 27-39, 2008, Springer, 978-3-540-89753-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
KSA, PRGA, Cryptography, Stream Cipher, Bias, RC4, Secret Key, Keystream |
131 | HongGeun Kim, Jungkyu Han, Seongje Cho |
An efficient implementation of RC4 cipher for encrypting multimedia files on mobile devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2007 ACM Symposium on Applied Computing (SAC), Seoul, Korea, March 11-15, 2007, pp. 1171-1175, 2007, ACM, 1-59593-480-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
RC4 implementation, stream cipher, contents protection |
117 | Alexander Maximov, Dmitry Khovratovich |
New State Recovery Attack on RC4. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO 2008, 28th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2008. Proceedings, pp. 297-316, 2008, Springer, 978-3-540-85173-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
state recovery attack, RC4, key recovery attack |
102 | Goutam Paul 0001, Subhamoy Maitra, Rohit Srivastava |
On Non-randomness of the Permutation After RC4 Key Scheduling. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AAECC ![In: Applied Algebra, Algebraic Algorithms and Error-Correcting Codes, 17th International Symposium, AAECC-17, Bangalore, India, December 16-20, 2007, Proceedings, pp. 100-109, 2007, Springer, 978-3-540-77223-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Key Scheduling Algorithm, Cryptography, Cryptanalysis, Stream Cipher, Bias, RC4 |
102 | Alexander Maximov |
Two Linear Distinguishing Attacks on VMPC and RC4A and Weakness of RC4 Family of Stream Ciphers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption: 12th International Workshop, FSE 2005, Paris, France, February 21-23, 2005, Revised Selected Papers, pp. 342-358, 2005, Springer, 3-540-26541-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
VMPC, RC4A, linear distinguishing attack, cryptanalysis, RC4 |
101 | Sebastiaan Indesteege, Bart Preneel |
Collisions for RC4-Hash. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 11th International Conference, ISC 2008, Taipei, Taiwan, September 15-18, 2008. Proceedings, pp. 355-366, 2008, Springer, 978-3-540-85884-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
RC4-Hash, multicollisions, hash functions, collisions |
87 | Subhamoy Maitra, Goutam Paul 0001 |
New Form of Permutation Bias and Secret Key Leakage in Keystream Bytes of RC4. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption, 15th International Workshop, FSE 2008, Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers, pp. 253-269, 2008, Springer, 978-3-540-71038-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Key Leakage, Cryptanalysis, Stream Cipher, Bias, RC4, Keystream |
87 | Subhamoy Maitra, Goutam Paul 0001 |
Recovering RC4 Permutation from 2048 Keystream Bytes if jIs Stuck. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 13th Australasian Conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008, Proceedings, pp. 306-320, 2008, Springer, 978-3-540-69971-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Cryptanalysis, Stream Cipher, Permutation, Fault Analysis, RC4, Keystream |
87 | Mete Akgün, Pinar Kavak, Hüseyin Demirci |
New Results on the Key Scheduling Algorithm of RC4. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2008, 9th International Conference on Cryptology in India, Kharagpur, India, December 14-17, 2008. Proceedings, pp. 40-52, 2008, Springer, 978-3-540-89753-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Key Scheduling Algorithm, State Table, Cryptanalysis, Stream Cipher, RC4 |
79 | Hisham A. Kholidy, Khaled Alghathbar |
A New Accelerated RC4 Scheme Using "Ultra Gridsec" and "HIMAN" and use this Scheme to Secure "HIMAN" Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAS ![In: Proceedings of the Fifth International Conference on Information Assurance and Security, IAS 2009, Xi'An, China, 18-20 August 2009, pp. 617-622, 2009, IEEE Computer Society, 978-0-7695-3744-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
79 | Mitsuru Matsui |
Key Collisions of the RC4 Stream Cipher. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption, 16th International Workshop, FSE 2009, Leuven, Belgium, February 22-25, 2009, Revised Selected Papers, pp. 38-50, 2009, Springer, 978-3-642-03316-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
79 | Yukiyasu Tsunoo, Teruo Saito, Hiroyasu Kubo, Tomoyasu Suzaki |
A Distinguishing Attack on a Fast Software-Implemented RC4-Like Stream Cipher. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Inf. Theory ![In: IEEE Trans. Inf. Theory 53(9), pp. 3250-3255, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
79 | Souradyuti Paul, Bart Preneel |
Analysis of Non-fortuitous Predictive States of the RC4 Keystream Generator. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2003, 4th International Conference on Cryptology in India, New Delhi, India, December 8-10, 2003, Proceedings, pp. 52-67, 2003, Springer, 3-540-20609-4. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
79 | Itsik Mantin, Adi Shamir |
A Practical Attack on Broadcast RC4. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption, 8th International Workshop, FSE 2001 Yokohama, Japan, April 2-4, 2001, Revised Papers, pp. 152-164, 2001, Springer, 3-540-43869-6. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
72 | Riddhipratim Basu, Subhamoy Maitra, Goutam Paul 0001, Tanmoy Talukdar |
On Some Sequences of the Secret Pseudo-random Index j in RC4 Key Scheduling. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AAECC ![In: Applied Algebra, Algebraic Algorithms and Error-Correcting Codes, 18th International Symposium, AAECC-18 2009, Tarragona, Catalonia, Spain, June 8-12, 2009. Proceedings, pp. 137-148, 2009, Springer, 978-3-642-02180-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Cryptanalysis, Stream Cipher, Filter, Permutation, Sequence, Bias, RC4, Key Recovery |
72 | Goutam Paul 0001, Subhamoy Maitra |
Permutation After RC4 Key Scheduling Reveals the Secret Key. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Selected Areas in Cryptography ![In: Selected Areas in Cryptography, 14th International Workshop, SAC 2007, Ottawa, Canada, August 16-17, 2007, Revised Selected Papers, pp. 360-377, 2007, Springer, 978-3-540-77359-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Cryptanalysis, Stream Cipher, Permutation, Bias, RC4, Key Scheduling |
70 | Eli Biham, Louis Granboulan, Phong Q. Nguyen |
Impossible Fault Analysis of RC4 and Differential Fault Analysis of RC4. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption: 12th International Workshop, FSE 2005, Paris, France, February 21-23, 2005, Revised Selected Papers, pp. 359-367, 2005, Springer, 3-540-26541-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
65 | Sammy H. M. Kwok, Edmund Y. Lam |
Effective Uses of FPGAs for Brute-Force Attack on RC4 Ciphers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Very Large Scale Integr. Syst. ![In: IEEE Trans. Very Large Scale Integr. Syst. 16(8), pp. 1096-1100, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
65 | Souradyuti Paul, Bart Preneel |
A New Weakness in the RC4 Keystream Generator and an Approach to Improve the Security of the Cipher. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption, 11th International Workshop, FSE 2004, Delhi, India, February 5-7, 2004, Revised Papers, pp. 245-259, 2004, Springer, 3-540-22171-9. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
65 | Violeta Tomasevic, Slobodan Bojanic |
Reducing the State Space of RC4 Stream Cipher. ![Search on Bibsonomy](Pics/bibsonomy.png) |
International Conference on Computational Science ![In: Computational Science - ICCS 2004, 4th International Conference, Kraków, Poland, June 6-9, 2004, Proceedings, Part I, pp. 644-647, 2004, Springer, 3-540-22114-X. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
65 | Ilya Mironov |
(Not So) Random Shuffles of RC4. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO 2002, 22nd Annual International Cryptology Conference, Santa Barbara, California, USA, August 18-22, 2002, Proceedings, pp. 304-319, 2002, Springer, 3-540-44050-X. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
65 | Scott R. Fluhrer, Itsik Mantin, Adi Shamir |
Weaknesses in the Key Scheduling Algorithm of RC4. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Selected Areas in Cryptography ![In: Selected Areas in Cryptography, 8th Annual International Workshop, SAC 2001 Toronto, Ontario, Canada, August 16-17, 2001, Revised Papers, pp. 1-24, 2001, Springer, 3-540-43066-0. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
65 | Lars R. Knudsen, Willi Meier, Bart Preneel, Vincent Rijmen, Sven Verdoolaege |
Analysis Methods for (Alleged) RC4. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT '98, International Conference on the Theory and Applications of Cryptology and Information Security, Beijing, China, October 18-22, 1998, Proceedings, pp. 327-341, 1998, Springer, 3-540-65109-8. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
65 | Jovan Dj. Golic |
Linear Statistical Weakness of Alleged RC4 Keystream Generator. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT '97, International Conference on the Theory and Application of Cryptographic Techniques, Konstanz, Germany, May 11-15, 1997, Proceeding, pp. 226-238, 1997, Springer, 3-540-62975-0. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
|
57 | Shahram Khazaei, Willi Meier |
On Reconstruction of RC4 Keys from Internal States. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MMICS ![In: Mathematical Methods in Computer Science, MMICS 2008, Karlsruhe, Germany, December 17-19, 2008 - Essays in Memory of Thomas Beth, pp. 179-189, 2008, Springer, 978-3-540-89993-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Binary Hypothesis Testing, Stream Ciphers, RC4, Key Recovery |
57 | Eli Biham, Yaniv Carmeli |
Efficient Reconstruction of RC4 Keys from Internal States. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption, 15th International Workshop, FSE 2008, Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers, pp. 270-288, 2008, Springer, 978-3-540-71038-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Initial Permutation, Cryptanalysis, Stream Cipher, RC4, Key Scheduling |
57 | Serge Vaudenay, Martin Vuagnoux |
Passive-Only Key Recovery Attacks on RC4. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Selected Areas in Cryptography ![In: Selected Areas in Cryptography, 14th International Workshop, SAC 2007, Ottawa, Canada, August 16-17, 2007, Revised Selected Papers, pp. 344-359, 2007, Springer, 978-3-540-77359-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
key related attack, cryptanalysis, stream cipher, RC4, WEP |
52 | Zong Wang, Tughrul Arslan, Ahmet T. Erdogan |
Implementation of Hardware Encryption Engine for Wireless Communication on a Reconfigurable Instruction Cell Architecture. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DELTA ![In: 4th IEEE International Symposium on Electronic Design, Test and Applications, DELTA 2008, Hong Kong, January 23-25, 2008, pp. 148-152, 2008, IEEE Computer Society, 978-0-7695-3110-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Hardware Encryption, RICA, AES, RC4 |
52 | Bartosz Zoltak |
VMPC One-Way Function and Stream Cipher. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption, 11th International Workshop, FSE 2004, Delhi, India, February 5-7, 2004, Revised Papers, pp. 210-225, 2004, Springer, 3-540-22171-9. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
lower bound, cryptanalysis, stream cipher, one-way function, RC4 |
52 | Jonathan J. Hoch, Adi Shamir |
Fault Analysis of Stream Ciphers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHES ![In: Cryptographic Hardware and Embedded Systems - CHES 2004: 6th International Workshop Cambridge, MA, USA, August 11-13, 2004. Proceedings, pp. 240-253, 2004, Springer, 3-540-22666-4. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Lili-128, SOBER-t32, Stream cipher, LFSR, fault attack, RC4 |
50 | Atsuko Miyaji, Masahiro Sukegawa |
New Correlations of RC4 PRGA Using Nonzero-Bit Differences. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 14th Australasian Conference, ACISP 2009, Brisbane, Australia, July 1-3, 2009, Proceedings, pp. 134-152, 2009, Springer, 978-3-642-02619-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
50 | Goutam Paul 0001, Siddheshwar Rathi, Subhamoy Maitra |
On non-negligible bias of the first output byte of RC4 towards the first three bytes of the secret key. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Des. Codes Cryptogr. ![In: Des. Codes Cryptogr. 49(1-3), pp. 123-134, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
AMS Classification 94A60 |
50 | Andreas Klein 0001 |
Attacks on the RC4 stream cipher. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Des. Codes Cryptogr. ![In: Des. Codes Cryptogr. 48(3), pp. 269-286, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
AMS Classifications 68P25, 94A60 |
50 | Ahmed Alazzawe, Anis Nawaz, Duminda Wijesekera |
Extracting Kerberos passwords through RC4-HMAC encryption type analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AICCSA ![In: The 6th ACS/IEEE International Conference on Computer Systems and Applications, AICCSA 2008, Doha, Qatar, March 31 - April 4, 2008, pp. 679-685, 2008, IEEE Computer Society, 978-1-4244-1967-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
50 | Nathaniel Couture, Kenneth B. Kent |
The Effectiveness of Brute Force Attacks on RC4. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CNSR ![In: 2nd Annual Conference on Communication Networks and Services Research (CNSR 2004), 19-21 May 2004, Fredericton, N.B., Canada, pp. 333-336, 2004, IEEE Computer Society, 0-7695-2096-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
50 | Kuen Hung Tsoi, Kin-Hong Lee, Philip Heng Wai Leong |
A Massively Parallel RC4 Key Search Engine. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FCCM ![In: 10th IEEE Symposium on Field-Programmable Custom Computing Machines (FCCM 2002), 22-24 April 2002, Napa, CA, USA, Proceedings, pp. 13-21, 2002, IEEE Computer Society, 0-7695-1801-X. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
50 | Scott R. Fluhrer, David A. McGrew |
Statistical Analysis of the Alleged RC4 Keystream Generator. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption, 7th International Workshop, FSE 2000, New York, NY, USA, April 10-12, 2000, Proceedings, pp. 19-30, 2000, Springer, 3-540-41728-1. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
40 | Ayesha Khalid, Goutam Paul 0001, Anupam Chattopadhyay |
RC4-AccSuite: A Hardware Acceleration Suite for RC4-Like Stream Ciphers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Very Large Scale Integr. Syst. ![In: IEEE Trans. Very Large Scale Integr. Syst. 25(3), pp. 1072-1084, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
40 | Pei Xue, Tao Li, Han Dong, Chunbo Liu, Wenjing Ma, Songwen Pei |
GB-RC4: Effective brute force attacks on RC4 algorithm using GPU. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IGSC ![In: Seventh International Green and Sustainable Computing Conference, IGSC 2016, Hangzhou, China, November 7-9, 2016, pp. 1-6, 2016, IEEE Computer Society, 978-1-5090-5117-5. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
40 | Goutam Paul 0001, Subhamoy Maitra, Anupam Chattopadhyay |
Quad-RC4: Merging Four RC4 States towards a 32-bit Stream Cipher. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2013, pp. 572, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP BibTeX RDF |
|
40 | Maytham M. Hammood, Kenji Yoshigoe, Ali M. Sagheer |
RC4-2S: RC4 Stream Cipher with Two State Tables. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITCS ![In: Information Technology Convergence - Security, Robotics, Automations and Communication, 5th International Conference on Information Technology Convergence and Services, ITCS 2013, Fukuoka, Japan, July 8-10, 2013., pp. 13-20, 2013, Springer, 978-94-007-6995-3. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
40 | Qian Yu, Chang N. Zhang, Mohammad Ali Orumiehchiha, Hua Li |
RC4-BHF: An Improved RC4-Based Hash Function. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIT ![In: 12th IEEE International Conference on Computer and Information Technology, CIT 2012, Chengdu, Sichuan, China, October 27-29, 2012, pp. 322-326, 2012, IEEE Computer Society, 978-1-4673-4873-7. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
37 | Ezedin Barka, Emad Eldin Mohamed, Kadhim Hayawi |
End-to-end security solutions for WLAN: a performance analysis for the underlying encryption algorithms in the lightweight devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWCMC ![In: Proceedings of the International Conference on Wireless Communications and Mobile Computing, IWCMC 2006, Vancouver, British Columbia, Canada, July 3-6, 2006, pp. 1295-1300, 2006, ACM, 1-59593-306-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
end-to-end wireless security, AES, J2ME, RC4, SSL/TLS |
37 | Matthew Henricksen, Ed Dawson |
Ensuring Fast Implementations of Symmetric Ciphers on the Intel Pentium 4 and Beyond. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 11th Australasian Conference, ACISP 2006, Melbourne, Australia, July 3-5, 2006, Proceedings, pp. 52-63, 2006, Springer, 3-540-35458-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Intel Pentium 4, Dragon, HC-256, MAG, Mir-1, Py, Implementation, Stream cipher, RC4 |
35 | Dino Schweitzer, Leemon C. Baird III |
Discovering an RC4 anomaly through visualization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VizSEC ![In: 3rd International Workshop on Visualization for Computer Security, VizSEC 2006, Alexandria, VA, USA, November 3, 2006, pp. 91-94, 2006, ACM, 1-59593-549-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
visualization, cryptography, algorithm analysis |
30 | Nathan Keller, Stephen D. Miller, Ilya Mironov, Ramarathnam Venkatesan |
MV3: A New Word Based Stream Cipher Using Rapid Mixing and Revolving Buffers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CT-RSA ![In: Topics in Cryptology - CT-RSA 2007, The Cryptographers' Track at the RSA Conference 2007, San Francisco, CA, USA, February 5-9, 2007, Proceedings, pp. 1-19, 2007, Springer, 3-540-69327-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
cryptanalysis, stream cipher, random walks, expander graph |
30 | Panu Hämäläinen, Jari Heikkinen, Marko Hännikäinen, Timo D. Hämäläinen |
Design of Transport Triggered Architecture Processors for Wireless Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DSD ![In: Eighth Euromicro Symposium on Digital Systems Design (DSD 2005), 30 August - 3 September 2005, Porto, Portugal, pp. 144-152, 2005, IEEE Computer Society, 0-7695-2433-8. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
30 | Avishai Wool |
A note on the fragility of the "Michael" message integrity code. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Wirel. Commun. ![In: IEEE Trans. Wirel. Commun. 3(5), pp. 1459-1462, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
30 | Prasanth Ganesan, Alexander G. Dean |
Enhancing the AvrX Kernel with Efficient Secure Communication Using Software Thread Integration. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Real-Time and Embedded Technology and Applications Symposium ![In: 10th IEEE Real-Time and Embedded Technology and Applications Symposium (RTAS 2004), 25-28 May 2004, Toronto, Canada, pp. 265-275, 2004, IEEE Computer Society, 0-7695-2148-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
23 | Erik Tews, Martin Beck |
Practical attacks against WEP and WPA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISEC ![In: Proceedings of the Second ACM Conference on Wireless Network Security, WISEC 2009, Zurich, Switzerland, March 16-19, 2009, pp. 79-86, 2009, ACM, 978-1-60558-460-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
cryptanalysis, 802.11, rc4, wep, wlan, wpa, tkip |
20 | Caiban Sun, Wenrui Liu, Jiafeng Cheng, Nengyuan Sun, Zhaokang Peng, Heng Sha, Weize Yu |
A high-speed and low-latency hardware implementation of RC4 cryptographic algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Circuit Theory Appl. ![In: Int. J. Circuit Theory Appl. 51(12), pp. 5980-5996, December 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
20 | Oleg Khovayko, Dmitry Schelkunov |
RC4OK. An improvement of the RC4 stream cipher. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2023, pp. 1486, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP BibTeX RDF |
|
20 | Imad S. Alshawi, Hasan Al-badrei |
Secure Routing Protocol for WSNs Using Bacterial Foraging Optimization and Improved RC4. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Informatica (Slovenia) ![In: Informatica (Slovenia) 46(8), 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
20 | Rizk Masoud Rizk-Allah, Hatem Abdul-Kader, Samah S. Abd Elatif, Wail S. El-Kilani, Eslam Al Maghayreh, Habib Dhahri, Awais Mahmood |
A Novel Binary Hybrid PSO-EO Algorithm for Cryptanalysis of Internal State of RC4 Cipher. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sensors ![In: Sensors 22(10), pp. 3844, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
20 | Senthil Murugan Maniam, T. Sasilatha |
Area-efficient and high-speed hardware structure of hybrid cryptosystem (AES-RC4) for maximizing key lifetime using parallel subpipeline architecture. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Concurr. Comput. Pract. Exp. ![In: Concurr. Comput. Pract. Exp. 33(3), 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
20 | Anjali Malik, Sangeeta Dhal, Shailender Gupta |
An improved bit plane image encryption technique using RC4 and quantum chaotic demeanour. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Multim. Tools Appl. ![In: Multim. Tools Appl. 80(5), pp. 7911-7937, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
20 | Ryoma Ito 0001, Atsuko Miyaji |
New Iterated RC4 Key Correlations and their Application to Plaintext Recovery on WPA-TKIP. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEICE Trans. Fundam. Electron. Commun. Comput. Sci. ![In: IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 104-A(1), pp. 190-202, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
20 | Pranab Chakraborty, Subhamoy Maitra |
Further clarification on Mantin's Digraph Repetition Bias in RC4. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Des. Codes Cryptogr. ![In: Des. Codes Cryptogr. 89(1), pp. 127-141, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
20 | Alexey Semenkov, Dmitry Bragin, Yakov Usoltsev, Anton Konev, Evgeny Kostuchenko |
Generation of an EDS Key Based on a Graphic Image of a Subject's Face Using the RC4 Algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. ![In: Inf. 12(1), pp. 19, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
20 | Seyyed Keyvan Mousavi, Ali Ghaffari, Sina Besharat, Hamed Afshari |
Security of Internet of Things using RC4 and ECC Algorithms (Case Study: Smart Irrigation Systems). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Wirel. Pers. Commun. ![In: Wirel. Pers. Commun. 116(3), pp. 1713-1742, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
20 | Chandratop Chakraborty, Pranab Chakraborty, Subhamoy Maitra |
Glimpses are forever in RC4 amidst the spectre of biases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Discret. Appl. Math. ![In: Discret. Appl. Math. 298, pp. 84-102, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
20 | Evaristo José Madarro-Capó, Carlos Miguel Legón-Pérez, Omar Rojas, Guillermo Sosa Gómez |
Information Theory Based Evaluation of the RC4 Stream Cipher Outputs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Entropy ![In: Entropy 23(7), pp. 896, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
20 | Ala Mughaid, Ahmed Al-Arjan, Mohammad Rasmi, Shadi AlZu'bi |
Intelligent security in the era of AI: The key vulnerability of RC4 algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIT ![In: International Conference on Information Technology, ICIT 2021, Amman, Jordan, July 14-15, 2021, pp. 691-694, 2021, IEEE, 978-1-6654-2870-5. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
20 | Lih-Yuan Deng, Dale Bowman, Ching-Chi Yang, Henry Horng-Shing Lu |
Extending RC4 to Construct Secure Random Number Generators. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ANNSIM ![In: Annual Modeling and Simulation Conference, ANNSIM 2021, Virtual Event / Fairfax, VA, USA, July 19-22, 2021, pp. 1-12, 2021, IEEE, 978-1-56555-375-0. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
20 | Jinquan Zhang, Haoran Liu, Lina Ni |
A Secure Energy-Saving Communication and Encrypted Storage Model Based on RC4 for EHR. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 8, pp. 38995-39012, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
20 | Loganaden Velvindron |
Deprecating RC4 in Secure Shell (SSH). ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 8758, pp. 1-5, April 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
20 | Pranab Chakraborty, Subhamoy Maitra |
Further Clarification on Mantin's Digraph Repetition Bias in RC4. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2020, pp. 68, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
20 | Chandratop Chakraborty, Pranab Chakraborty, Subhamoy Maitra |
Glimpses are Forever in RC4 amidst the Spectre of Biases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2020, pp. 512, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
20 | Lijun Zhang, Cheng Tan, Fei Yu |
Fast Decryption of Excel Document Encrypted by RC4 Algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCT ![In: 20th IEEE International Conference on Communication Technology, ICCT 2020, Nanning, China, October 28-31, 2020, pp. 1572-1576, 2020, IEEE, 978-1-7281-8141-7. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
20 | Hassan Noura 0001, Ola Salman, Ali Chehab, Raphaël Couturier |
Efficient and Secure Keyed Hash Function Scheme Based on RC4 Stream Cipher. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCC ![In: IEEE Symposium on Computers and Communications, ISCC 2020, Rennes, France, July 7-10, 2020, pp. 1-7, 2020, IEEE, 978-1-7281-8086-1. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
20 | Pranab Chakraborty, Subhamoy Maitra |
More Glimpses of the RC4 Internal State Array. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2020 - 21st International Conference on Cryptology in India, Bangalore, India, December 13-16, 2020, Proceedings, pp. 294-311, 2020, Springer, 978-3-030-65276-0. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
20 | Rahul Saha, G. Geetha 0001, Gulshan Kumar, Tai-Hoon Kim, William J. Buchanan |
MRC4: A Modified RC4 Algorithm Using Symmetric Random Function Generator for Improved Cryptographic Features. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 7, pp. 172045-172054, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
20 | Sabyasachi Dey 0001, Santanu Sarkar 0001 |
Settling the mystery of Z r = r in RC4. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cryptogr. Commun. ![In: Cryptogr. Commun. 11(4), pp. 697-715, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
20 | Iwona Polak, Mariusz Boryczka |
Tabu Search in revealing the internal state of RC4+ cipher. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Appl. Soft Comput. ![In: Appl. Soft Comput. 77, pp. 509-519, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
20 | Bartosz Zoltak |
Message Authentication (MAC) Algorithm For The VMPC-R (RC4-like) Stream Cipher. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2019, pp. 41, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP BibTeX RDF |
|
20 | Junggab Son, Euiseong Ko, Uday Bhaskar Boyanapalli, Donghyun Kim 0001, Youngsoon Kim, Mingon Kang |
Fast and Accurate Machine Learning-based Malware Detection via RC4 Ciphertext Analysis*. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICNC ![In: International Conference on Computing, Networking and Communications, ICNC 2019, Honolulu, HI, USA, February 18-21, 2019, pp. 159-163, 2019, IEEE, 978-1-5386-9223-3. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
20 | Hassan Noura 0001, Ali Chehab |
An Efficient and Secure Variant of RC4 Stream Cipher Scheme for Emerging Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WCNC ![In: 2019 IEEE Wireless Communications and Networking Conference, WCNC 2019, Marrakesh, Morocco, April 15-18, 2019, pp. 1-8, 2019, IEEE, 978-1-5386-7646-2. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
20 | Chandratop Chakraborty, Pranab Chakraborty, Subhamoy Maitra |
RC4: Non-randomness in the Index j and Some Results on Its Cycles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2019 - 20th International Conference on Cryptology in India, Hyderabad, India, December 15-18, 2019, Proceedings, pp. 95-114, 2019, Springer, 978-3-030-35422-0. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
20 | Goutam Paul 0001, Souvik Ray |
Analysis of burn-in period for RC4 state transition. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cryptogr. Commun. ![In: Cryptogr. Commun. 10(5), pp. 881-908, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
20 | Amit Jana, Goutam Paul 0001 |
Revisiting RC4 key collision: Faster search algorithm and new 22-byte colliding key pairs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cryptogr. Commun. ![In: Cryptogr. Commun. 10(3), pp. 479-508, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
20 | Kenneth G. Paterson, Jacob C. N. Schuldt |
Statistical attacks on cookie masking for RC4. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cryptogr. Commun. ![In: Cryptogr. Commun. 10(5), pp. 777-801, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
20 | Sonu Jha, Subhadeep Banik, Takanori Isobe 0001, Toshihiro Ohigashi, Santanu Sarkar 0001 |
Theoretical Understanding of Some Conditional and Joint Biases in RC4 Stream Cipher. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEICE Trans. Fundam. Electron. Commun. Comput. Sci. ![In: IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 101-A(11), pp. 1869-1879, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
20 | Rémi Bricout, Sean Murphy, Kenneth G. Paterson, Thyla van der Merwe |
Analysing and exploiting the Mantin biases in RC4. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Des. Codes Cryptogr. ![In: Des. Codes Cryptogr. 86(4), pp. 743-770, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
20 | Benjamin Kaduk, Michiko Short |
Deprecate Triple-DES (3DES) and RC4 in Kerberos. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 8429, pp. 1-10, October 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
20 | Kenneth G. Paterson, Jacob C. N. Schuldt |
Statistical Attacks on Cookie Masking for RC4. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2018, pp. 93, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP BibTeX RDF |
|
20 | Sabyasachi Dey 0001, Santanu Sarkar 0001 |
Generalization of Roos bias in RC4 and some results on key-keystream relations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Math. Cryptol. ![In: J. Math. Cryptol. 12(1), pp. 43-56, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
20 | Ryoma Ito 0001, Atsuko Miyaji |
New Iterated RC4 Key Correlations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 23rd Australasian Conference, ACISP 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings, pp. 154-171, 2018, Springer, 978-3-319-93637-6. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
20 | Santanu Sarkar 0001 |
Results on significant anomalies of state values after key scheduling algorithm in RC4. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IET Inf. Secur. ![In: IET Inf. Secur. 11(5), pp. 267-272, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
20 | Yuhei Watanabe, Takanori Isobe 0001, Toshihiro Ohigashi, Masakatu Morii |
How to Efficiently Exploit Different Types of Biases for Plaintext Recovery of RC4. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEICE Trans. Fundam. Electron. Commun. Comput. Sci. ![In: IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 100-A(3), pp. 803-810, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
20 | Ryoma Ito 0001, Atsuko Miyaji |
Refined Construction of RC4 Key Setting in WPA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEICE Trans. Fundam. Electron. Commun. Comput. Sci. ![In: IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 100-A(1), pp. 138-148, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
20 | Santanu Sarkar 0001, Ayineedi Venkateswarlu |
Revisiting (nested) Roos bias in RC4 key scheduling algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Des. Codes Cryptogr. ![In: Des. Codes Cryptogr. 82(1-2), pp. 131-148, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
20 | Poonam Jindal, Brahmjit Singh |
Optimization of the Security-Performance Tradeoff in RC4 Encryption Algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Wirel. Pers. Commun. ![In: Wirel. Pers. Commun. 92(3), pp. 1221-1250, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
20 | Sabyasachi Dey 0001, Santanu Sarkar 0001 |
Settling the mystery of Zr=r in RC4. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2017, pp. 1072, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP BibTeX RDF |
|
20 | Goutam Paul 0001, Souvik Ray |
Analysis of Burn-in period for RC4 State Transition. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2017, pp. 175, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP BibTeX RDF |
|
20 | Qian Yu, Chang N. Zhang |
A new and fast cryptographic hash function based on RC4. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cryptologia ![In: Cryptologia 40(6), pp. 522-540, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|