Author:
Jindal Poonam,Makkar Shikhar
Reference12 articles.
1. Stinson DR (1995) Cryptography: theory and practice, 2005th edn. CRC Press, Boca Raton
2. Mantin I (2005) A practical attack on the fixed RC4 in the WEP mode. In: ASIACRYPT, vol 3788, pp 395–411
3. Maitra S, Paul G (2008) Analysis of RC4 and proposal of additional layers for better security margin. In: INDOCRYPT, vol 5365, pp 27–39
4. Jindal P, Singh B (2015) RC4 encryption-a literature survey. Proc Comput Sci 46:697–705
5. Roos A (1995) A class of weak keys in the RC4 stream cipher
Cited by
8 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献