New Results on the Key Scheduling Algorithm of RC4
From MaRDI portal
Publication:5504609
Recommendations
Cites work
- scientific article; zbMATH DE number 1942428 (Why is no real title available?)
- scientific article; zbMATH DE number 1759259 (Why is no real title available?)
- scientific article; zbMATH DE number 2085191 (Why is no real title available?)
- A Practical Attack on Broadcast RC4
- Analysis Methods for (Alleged) RC4
- Attacks on the RC4 stream cipher
- Efficient Reconstruction of RC4 Keys from Internal States
- New Form of Permutation Bias and Secret Key Leakage in Keystream Bytes of RC4
- New State Recovery Attack on RC4
- On Reconstruction of RC4 Keys from Internal States
- Passive–Only Key Recovery Attacks on RC4
- Permutation After RC4 Key Scheduling Reveals the Secret Key
- Predicting and Distinguishing Attacks on RC4 Keystream Generator
Cited in
(8)- Analysis of RC4 and Proposal of Additional Layers for Better Security Margin
- (Non-)random sequences from (non-)random permutations -- analysis of RC4 stream cipher
- Efficient Reconstruction of RC4 Keys from Internal States
- On biases of permutation and keystream bytes of RC4 towards the secret key
- New Results on Generalization of Roos-Type Biases and Related Keystreams of RC4
- Revisiting RC4 key collision: faster search algorithm and new 22-byte colliding key pairs
- Permutation After RC4 Key Scheduling Reveals the Secret Key
- On some sequences of the secret pseudo-random index \(j\) in RC4 key scheduling
This page was built for publication: New Results on the Key Scheduling Algorithm of RC4
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5504609)