The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for RC4 with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1997-2002 (17) 2003-2004 (20) 2005 (17) 2006-2007 (29) 2008 (19) 2009-2010 (15) 2011-2012 (23) 2013 (21) 2014 (19) 2015 (17) 2016 (15) 2017-2018 (17) 2019-2021 (24) 2022-2023 (4)
Publication types (Num. hits)
article(118) incollection(2) inproceedings(137)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 129 occurrences of 52 keywords

Results
Found 257 publication records. Showing 257 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
20Alexander Maximov, Dmitry Khovratovich New State Recovery Attack on RC4. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2008 DBLP  BibTeX  RDF
20Jovan Dj. Golic, Guglielmo Morgari Iterative Probabilistic Reconstruction of RC4 Internal States. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2008 DBLP  BibTeX  RDF
20Subhamoy Maitra, Goutam Paul 0001 Analysis of RC4 and Proposal of Additional Layers for Better Security Margin. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2008 DBLP  BibTeX  RDF
20Riddhipratim Basu, Shirshendu Ganguly, Subhamoy Maitra, Goutam Paul 0001 A complete characterization of the evolution of RC4 pseudo random generation algorithm. Search on Bibsonomy J. Math. Cryptol. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
20Bogdan Crainicu, Florian Mircea Boian KSAm - An Improved RC4 Key-Scheduling Algorithm for Securing WEP. Search on Bibsonomy TeNe The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
20Chetan Nanjunda Mathur, K. P. Subbalakshmi A Light Weight Enhancement to RC4 Based Security for Resource Constrained Wireless Devices. Search on Bibsonomy Int. J. Netw. Secur. The full citation details ... 2007 DBLP  BibTeX  RDF
20Violeta Tomasevic, Slobodan Bojanic, Octavio Nieto-Taladriz Finding an internal state of RC4 stream cipher. Search on Bibsonomy Inf. Sci. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
20Goutam Paul 0001, Subhamoy Maitra RC4 State Information at Any Stage Reveals the Secret Key. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2007 DBLP  BibTeX  RDF
20Goutam Paul 0001, Subhamoy Maitra, Rohit Srivastava On Non-Randomness of the Permutation after RC4 Key Scheduling. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2007 DBLP  BibTeX  RDF
20Alexander Maximov Two Linear Distinguishing Attacks on VMPC and RC4A and Weakness of RC4 Family of Stream Ciphers (Corrected). Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2007 DBLP  BibTeX  RDF
20Subhamoy Maitra, Goutam Paul 0001 New Form of Permutation Bias and Secret Key Leakage in Keystream Bytes of RC4. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2007 DBLP  BibTeX  RDF
20Allam Mousa, Ahmad Hamad Evaluation of the RC4 Algorithm for Data Encryption. Search on Bibsonomy Int. J. Comput. Sci. Appl. The full citation details ... 2006 DBLP  BibTeX  RDF
20Karthik Jaganathan, Larry Zhu, John Brezak The RC4-HMAC Kerberos Encryption Types Used by Microsoft Windows. Search on Bibsonomy RFC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
20Sergey Doroshenko, Boris Ryabko The experimental distinguishing attack on RC4. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2006 DBLP  BibTeX  RDF
20Chang N. Zhang, Qian Yu An RC4 based Light Weight Secure Protocol for Sensor Networks. Search on Bibsonomy Wireless and Optical Communications The full citation details ... 2006 DBLP  BibTeX  RDF
20Ziping Hu, Stamatios V. Kartalopoulos, Pramode K. Verma RC4-based Security in Ethernet Passive Optical Networks. Search on Bibsonomy GLOBECOM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
20Caroline Fontaine RC4. Search on Bibsonomy Encyclopedia of Cryptography and Security The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
20Hongjun Wu Cryptanalysis of a 32-bit RC4-like Stream Cipher. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2005 DBLP  BibTeX  RDF
20Yassir Nawaz, Kishan Chand Gupta, Guang Gong A 32-bit RC4-like Keystream Generator. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2005 DBLP  BibTeX  RDF
20Hongjun Wu The Misuse of RC4 in Microsoft Word and Excel. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2005 DBLP  BibTeX  RDF
20Yoshiaki Shiraishi, Toshihiro Ohigashi, Masakatu Morii Internal-State Reconstruction of a Stream Cipher RC4. Search on Bibsonomy IEICE Trans. Fundam. Electron. Commun. Comput. Sci. The full citation details ... 2003 DBLP  BibTeX  RDF
20Marina Pudovkina The number of initial states of the RC4 cipher with the same cycle structure. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2003 DBLP  BibTeX  RDF
20Phongsak Prasithsangaree, Prashant Krishnamurthy Analysis of energy consumption of RC4 and AES algorithms in wireless LANs. Search on Bibsonomy GLOBECOM The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
20Marina Pudovkina Statistical weaknesses in the alleged RC4 keystream generator. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2002 DBLP  BibTeX  RDF
20Ilya Mironov (Not So) Random Shuffles of RC4. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2002 DBLP  BibTeX  RDF
20Jovan Dj. Golic Iterative Probabilistic Cryptanalysis of RC4 Keystream Generator. Search on Bibsonomy ACISP The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
20Panu Hämäläinen, Marko Hännikäinen, Timo Hämäläinen 0001, Jukka Saarinen Hardware implementation of the improved WEP and RC4 encryption algorithms for wireless terminals. Search on Bibsonomy EUSIPCO The full citation details ... 2000 DBLP  BibTeX  RDF
15Martin Gebser, Benjamin Kaufmann, Torsten Schaub The Conflict-Driven Answer Set Solver clasp: Progress Report. Search on Bibsonomy LPNMR The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
15Gaurav Sengar, Debdeep Mukhopadhyay, Dipanwita Roy Chowdhury Secured Flipped Scan-Chain Model for Crypto-Architecture. Search on Bibsonomy IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
15Erik Tews, Ralf-Philipp Weinmann, Andrei Pyshkin Breaking 104 Bit WEP in Less Than 60 Seconds. Search on Bibsonomy WISA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
15Gautham Sekar, Souradyuti Paul, Bart Preneel Related-Key Attacks on the Py-Family of Ciphers and an Approach to Repair the Weaknesses. Search on Bibsonomy INDOCRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
15Songhe Zhao, Charles A. Shoniregun Critical Review of Unsecured WEP. Search on Bibsonomy IEEE SCW The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
15Souradyuti Paul, Bart Preneel On the (In)security of Stream Ciphers Based on Arrays and Modular Addition. Search on Bibsonomy ASIACRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
15Souradyuti Paul, Bart Preneel, Gautham Sekar Distinguishing Attacks on the Stream Cipher Py. Search on Bibsonomy FSE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
15Tim Good, Mohammed Benaissa AES as stream cipher on a small FPGA. Search on Bibsonomy ISCAS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
15Cédric Archambeau, Eric Peeters, François-Xavier Standaert, Jean-Jacques Quisquater Template Attacks in Principal Subspaces. Search on Bibsonomy CHES The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
15Frederik Armknecht, Willi Meier Fault Attacks on Combiners with Memory. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
15Ahmad M. Kholaif, Magda B. Fayek, Hussein Sherif Eissa, Hoda Baraka DRKH: dynamic re-keying with key hopping. Search on Bibsonomy PE-WASUN The full citation details ... 2005 DBLP  DOI  BibTeX  RDF dynamic re-keying, key hopping, low power devices, authentication, WLAN security
15Miguel León Chávez, Carlos Hernández Rosete, Francisco Rodríguez-Henríquez Achieving Confidentiality Security Service for CAN. Search on Bibsonomy CONIELECOMP The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
15Jianyong Huang, Jennifer Seberry, Willy Susilo, Martin W. Bunder Security Analysis of Michael: The IEEE 802.11i Message Integrity Code. Search on Bibsonomy EUC Workshops The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
15A. Murat Fiskiran, Ruby B. Lee Fast Parallel Table Lookups to Accelerate Symmetric-Key Cryptography. Search on Bibsonomy ITCC (1) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
15Duhyun Bae, Gwanyeon Kim, Jiho Kim, Sehyun Park, Ohyoung Song Design and Implementation of Efficient Cipher Engine for IEEE 802.11i Compatible with IEEE 802.11n and IEEE 802.11e. Search on Bibsonomy CIS (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
15Ahmad M. Kholaif, Magda B. Fayek, Hussein Sherif Eissa, Hoda Baraka DRKH: A Power Efficient Encryption Protocol forWireless Devices. Search on Bibsonomy LCN The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Power Devices, Dynamic Re-keying, Key Hopping, Authentication, WLAN Security
15Vebjørn Moen, Håvard Raddum, Kjell Jørgen Hole Weaknesses in the temporal key hash of WPA. Search on Bibsonomy ACM SIGMOBILE Mob. Comput. Commun. Rev. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF MIC, Michael, temporal key hash, 802.11, WPA, TKIP
15Adam Stubblefield, John Ioannidis, Aviel D. Rubin A key recovery attack on the 802.11b wired equivalent privacy protocol (WEP). Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF wired equivalent privacy, Wireless security
15Elchanan Mossel, Yuval Peres, Alistair Sinclair Shuffling by Semi-Random Transpositions. Search on Bibsonomy FOCS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
15Miguel León Chávez, Francisco Rodríguez-Henríquez SDL Specification of a Security Architecture for WorldFIP. Search on Bibsonomy CONIELECOMP The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
15Alexander Klimov, Adi Shamir New Cryptographic Primitives Based on Multiword T-Functions. Search on Bibsonomy FSE The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
15Prasanth Ganesan, Ramnath Venugopalan, Pushkin Peddabachagari, Alexander G. Dean, Frank Mueller 0001, Mihail L. Sichitiu Analyzing and modeling encryption overhead for sensor network nodes. Search on Bibsonomy Wireless Sensor Networks and Applications The full citation details ... 2003 DBLP  DOI  BibTeX  RDF encryption overhead, model, sensor networks, embedded systems, analysis
15Niels Ferguson, Doug Whiting, Bruce Schneier, John Kelsey, Stefan Lucks, Tadayoshi Kohno Helix: Fast Encryption and Authentication in a Single Cryptographic Primitive. Search on Bibsonomy FSE The full citation details ... 2003 DBLP  DOI  BibTeX  RDF authentication, Stream cipher, encryption, MAC
15Ramnath Venugopalan, Prasanth Ganesan, Pushkin Peddabachagari, Alexander G. Dean, Frank Mueller 0001, Mihail L. Sichitiu Encryption overhead in embedded systems and sensor network nodes: modeling and analysis. Search on Bibsonomy CASES The full citation details ... 2003 DBLP  DOI  BibTeX  RDF security, sensor networks, embedded systems, encryption
15Thomas Johansson 0001 Analysis and Design of Modern Stream Ciphers: (Invited Paper) p. Search on Bibsonomy IMACC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
15Suresh Chari, Josyula R. Rao, Pankaj Rohatgi Template Attacks. Search on Bibsonomy CHES The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
15N. Komninos, Bahram Honary, Michael Darnell An Efficient Stream Cipher Alpha1 for Mobile and Wireless Devices. Search on Bibsonomy IMACC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
15Duncan S. Wong, Hector Ho Fuentes, Agnes Hui Chan The Performance Measurement of Cryptographic Primitives on Palm Devices. Search on Bibsonomy ACSAC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
15David Naccache, Adi Shamir, Julien P. Stern How to Copyright a Function? Search on Bibsonomy Public Key Cryptography The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
15Bruce Schneier, Doug Whiting Fast Software Encryption: Designing Encryption Algorithms for Optimal Software Speed on the Intel Pentium Processor. Search on Bibsonomy FSE The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
Displaying result #201 - #257 of 257 (100 per page; Change: )
Pages: [<<][1][2][3]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license