1. AlFardan N.J., Bernstein D.J., Paterson K.G., Poettering B., Schuldt J.C.N.: On the Security of RC4 in TLS. In: Proceedings of the 22nd USENIX Conference on Security, SEC’13, pp. 305–320. USENIX Association, Berkeley, CA, USA (2013).
http://dl.acm.org/citation.cfm?id=2534766.2534793
2. Arnold B., Balakrishnan N., Nagaraja H.: A first course in order statistics. SIAM (2008)
3. Fluhrer S.R., McGrew D.: Statistical analysis of the alleged RC4 keystream generator. In: Schneier B. (ed.) FSE. Lecture Notes in Computer Science, vol. 1978, pp. 19–30. Springer, New York (2000).
4. Garman C., Paterson K.G., van der Merwe T.: Attacks only get better: Password recovery attacks against RC4 in TLS. In: USENIX Security Symposium (2015).
http://www.isg.rhul.ac.uk/tls/RC4mustdie.html
5. Isobe T., Ohigashi T., Watanabe Y., Morii M.: Full plaintext recovery attack on broadcast RC4. In: S. Moriai (ed.) Fast Software Encryption - 20th International Workshop, FSE 2013, Singapore, March 11-13, 2013. Revised Selected Papers. Lecture Notes in Computer Science, vol. 8424, pp. 179–202. Springer (2013). doi:
10.1007/978-3-662-43933-3_10
.