Attacks on the RC4 stream cipher
From MaRDI portal
Publication:1009047
DOI10.1007/s10623-008-9206-6zbMath1179.94064OpenAlexW2149237395WikidataQ56627260 ScholiaQ56627260MaRDI QIDQ1009047
Publication date: 31 March 2009
Published in: Designs, Codes and Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s10623-008-9206-6
Related Items
Proof of Empirical RC4 Biases and New Key Correlations, Generalization of roos bias in RC4 and some results on key-keystream relations, Smashing WEP in a Passive Attack, Some observations on HC-128, New Form of Permutation Bias and Secret Key Leakage in Keystream Bytes of RC4, Efficient Reconstruction of RC4 Keys from Internal States, (Non-)random sequences from (non-)random permutations -- analysis of RC4 stream cipher, Proving empirical key-correlations in RC4, Revisiting (nested) Roos bias in RC4 key scheduling algorithm, Efficient deterministic and non-deterministic pseudorandom number generation, Unnamed Item, A new reversible date-hiding algorithm for encrypted images, Passive–Only Key Recovery Attacks on RC4, Permutation After RC4 Key Scheduling Reveals the Secret Key, Discovery and Exploitation of New Biases in RC4, Settling the mystery of \(Z_{r} = r\) in RC4, On biases of permutation and keystream bytes of RC4 towards the secret key, A new distinguishing and key recovery attack on NGG stream cipher, Analysis of RC4 and Proposal of Additional Layers for Better Security Margin, New Results on the Key Scheduling Algorithm of RC4, Novel way to research nonlinear feedback shift register, A matrix PRNG with s-box output filtering
Cites Work