New Results on the Key Scheduling Algorithm of RC4 (Q5504609): Difference between revisions

From MaRDI portal
Set OpenAlex properties.
ReferenceBot (talk | contribs)
Changed an Item
 
Property / cites work
 
Property / cites work: Efficient Reconstruction of RC4 Keys from Internal States / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4736417 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4537980 / rank
 
Normal rank
Property / cites work
 
Property / cites work: On Reconstruction of RC4 Keys from Internal States / rank
 
Normal rank
Property / cites work
 
Property / cites work: Attacks on the RC4 stream cipher / rank
 
Normal rank
Property / cites work
 
Property / cites work: Analysis Methods for (Alleged) RC4 / rank
 
Normal rank
Property / cites work
 
Property / cites work: New Form of Permutation Bias and Secret Key Leakage in Keystream Bytes of RC4 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Predicting and Distinguishing Attacks on RC4 Keystream Generator / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Practical Attack on Broadcast RC4 / rank
 
Normal rank
Property / cites work
 
Property / cites work: New State Recovery Attack on RC4 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4409126 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Permutation After RC4 Key Scheduling Reveals the Secret Key / rank
 
Normal rank
Property / cites work
 
Property / cites work: Passive–Only Key Recovery Attacks on RC4 / rank
 
Normal rank

Latest revision as of 23:30, 28 June 2024

scientific article; zbMATH DE number 5496641
Language Label Description Also known as
English
New Results on the Key Scheduling Algorithm of RC4
scientific article; zbMATH DE number 5496641

    Statements

    New Results on the Key Scheduling Algorithm of RC4 (English)
    0 references
    0 references
    0 references
    0 references
    22 January 2009
    0 references
    RC4
    0 references
    Stream Cipher
    0 references
    Cryptanalysis
    0 references
    Key Scheduling Algorithm
    0 references
    State Table
    0 references

    Identifiers