Analysis Methods for (Alleged) RC4
From MaRDI portal
Publication:4249277
DOI10.1007/3-540-49649-1_26zbMath0931.94031OpenAlexW2123460950MaRDI QIDQ4249277
Willi Meier, Bart Preneel, Sven Verdoolaege, Vincent Rijmen, Lars R. Knudsen
Publication date: 17 June 1999
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/3-540-49649-1_26
Related Items (18)
On the structural weakness of the GGHN stream cipher ⋮ How TKIP Induces Biases of Internal States of Generic RC4 ⋮ Full Plaintext Recovery Attack on Broadcast RC4 ⋮ Recovering RC4 Permutation from 2048 Keystream Bytes if j Is Stuck ⋮ Efficient Reconstruction of RC4 Keys from Internal States ⋮ (Non-)random sequences from (non-)random permutations -- analysis of RC4 stream cipher ⋮ A complete characterization of the evolution of RC4 pseudo random generation algorithm ⋮ The analysis of the number of fixed points in the key extending algorithm of RC4 ⋮ New State Recovery Attack on RC4 ⋮ Discovery and Exploitation of New Biases in RC4 ⋮ New Correlations of RC4 PRGA Using Nonzero-Bit Differences ⋮ Settling the mystery of \(Z_{r} = r\) in RC4 ⋮ A Theoretical Analysis of the Structure of HC-128 ⋮ On biases of permutation and keystream bytes of RC4 towards the secret key ⋮ A new distinguishing and key recovery attack on NGG stream cipher ⋮ Analysis of RC4 and Proposal of Additional Layers for Better Security Margin ⋮ New Results on the Key Scheduling Algorithm of RC4 ⋮ A probabilistic cryptanalytic method for a time-variant permutation generator
This page was built for publication: Analysis Methods for (Alleged) RC4