Analysis Methods for (Alleged) RC4
From MaRDI portal
Publication:4249277
DOI10.1007/3-540-49649-1_26zbMATH Open0931.94031OpenAlexW2123460950MaRDI QIDQ4249277FDOQ4249277
Authors: Willi Meier, Bart Preneel, Vincent Rijmen, Sven Verdoolaege, Lars R. Knudsen
Publication date: 17 June 1999
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/3-540-49649-1_26
Recommendations
Cited In (23)
- Analysis of RC4 and Proposal of Additional Layers for Better Security Margin
- Discovery and exploitation of new biases in RC4
- Full plaintext recovery attack on broadcast RC4
- MARC: modified ARC4
- A probabilistic cryptanalytic method for a time-variant permutation generator
- New Correlations of RC4 PRGA Using Nonzero-Bit Differences
- (Non-)random sequences from (non-)random permutations -- analysis of RC4 stream cipher
- New State Recovery Attack on RC4
- Recovering RC4 Permutation from 2048 Keystream Bytes if j Is Stuck
- Finding an internal state of RC4 stream cipher
- A complete characterization of the evolution of RC4 pseudo random generation algorithm
- New Results on the Key Scheduling Algorithm of RC4
- Efficient Reconstruction of RC4 Keys from Internal States
- How TKIP induces biases of internal states of generic RC4
- Computational Science - ICCS 2004
- Settling the mystery of \(Z_{r} = r\) in RC4
- A new distinguishing and key recovery attack on NGG stream cipher
- On biases of permutation and keystream bytes of RC4 towards the secret key
- Title not available (Why is that?)
- The analysis of the number of fixed points in the key extending algorithm of RC4
- A theoretical analysis of the structure of HC-128
- On the structural weakness of the GGHN stream cipher
- Attacks on the RC4 stream cipher
This page was built for publication: Analysis Methods for (Alleged) RC4
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4249277)