The following pages link to (Q4537980):
Displaying 29 items.
- Proving TLS-attack related open biases of RC4 (Q499670) (← links)
- Image security system using recursive cellular automata substitution (Q869061) (← links)
- Finding an internal state of RC4 stream cipher (Q881845) (← links)
- Further non-randomness in RC4, RC4A and VMPC (Q892388) (← links)
- The analysis of the number of fixed points in the key extending algorithm of RC4 (Q931523) (← links)
- Distinguishing attacks on stream ciphers based on arrays of pseudo-random words (Q990129) (← links)
- Attacks on the RC4 stream cipher (Q1009047) (← links)
- On non-negligible bias of the first output byte of RC4 towards the first three bytes of the secret key (Q1009063) (← links)
- On biases of permutation and keystream bytes of RC4 towards the secret key (Q1032499) (← links)
- A new distinguishing and key recovery attack on NGG stream cipher (Q1032502) (← links)
- Analysing and exploiting the Mantin biases in RC4 (Q1741918) (← links)
- On data complexity of distinguishing attacks versus message recovery attacks on stream ciphers (Q1752540) (← links)
- Glimpses are forever in RC4 amidst the spectre of biases (Q2028088) (← links)
- More glimpses of the RC4 internal state array (Q2152035) (← links)
- On testing pseudorandom generators via statistical tests based on the arcsine law (Q2186921) (← links)
- On the structural weakness of the GGHN stream cipher (Q2380845) (← links)
- (Non-)random sequences from (non-)random permutations -- analysis of RC4 stream cipher (Q2442647) (← links)
- Full Plaintext Recovery Attack on Broadcast RC4 (Q2946878) (← links)
- Discovery and Exploitation of New Biases in RC4 (Q3084245) (← links)
- New Form of Permutation Bias and Secret Key Leakage in Keystream Bytes of RC4 (Q3525678) (← links)
- Efficient Reconstruction of RC4 Keys from Internal States (Q3525679) (← links)
- New State Recovery Attack on RC4 (Q3600226) (← links)
- New Correlations of RC4 PRGA Using Nonzero-Bit Differences (Q3634490) (← links)
- Differential Bias Attack for Block Cipher Under Randomized Leakage with Key Enumeration (Q4975181) (← links)
- On Large Distributions for Linear Cryptanalysis (Q5385519) (← links)
- On Non-randomness of the Permutation After RC4 Key Scheduling (Q5386083) (← links)
- Two Trivial Attacks on Trivium (Q5452245) (← links)
- Permutation After RC4 Key Scheduling Reveals the Secret Key (Q5452271) (← links)
- New Results on the Key Scheduling Algorithm of RC4 (Q5504609) (← links)