Author:
Sarkar Santanu,Venkateswarlu Ayineedi
Publisher
Springer Science and Business Media LLC
Subject
Applied Mathematics,Computer Science Applications
Reference20 articles.
1. AlFardan N., Bernstein D., Paterson K., Poettering B., Schuldt J.: On the security of RC4 in TLS. In: USENIX 2013, pp. 305–320 (2013). http://www.isg.rhul.ac.uk/tls/ .
2. Biham E., Carmeli Y.: Efficient reconstruction of RC4 keys from internal states. In: FSE 2008. LNCS, vol. 5086, pp. 270–288 (2008).
3. Isobe T., Ohigashi T., Watanabe Y., Morii M.: Full plaintext recovery attack on broadcast RC4. In: FSE 2013. LNCS, vol. 8424, pp. 179–202 (2013).
4. Klein A.: Attacks on the RC4 stream cipher. Des. Codes Cryptogr. 48(3), 269–286 (2008)
5. Maitra S., Paul G.: New form of permutation bias and secret key leakage in keystream bytes of RC4. In: FSE 2008. LNCS, vol. 5086, pp. 253–269 (2008).
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献