1. The TLS protocol, version 1.0;Dierks;Internet Engineering Task Force,1999
2. Applied cryptanalysis - breaking ciphers in the real world;Stamp,2007
3. Weaknesses in the key scheduling algorithm of RC4;Fluhrer,2001
4. New weakness in the key-scheduling algorithm of RC4. article;Ohigashi;IEICE TRANS.FUNDAMENTALS,2008
5. Passive-only key recovery attacks on RC4;Vaudenay,2007