1. Nadhem J AlFardan , Daniel J Bernstein , Kenneth G Paterson , Bertram Poettering , and Jacob CN Schuldt . 2013 . On the security of RC4 in TLS and WPA . In USENIX Security Symposium, Vol. 173 . Nadhem J AlFardan, Daniel J Bernstein, Kenneth G Paterson, Bertram Poettering, and Jacob CN Schuldt. 2013. On the security of RC4 in TLS and WPA. In USENIX Security Symposium, Vol. 173.
2. Amit Seal Ami , Nathan Cooper , Kaushal Kafle , Kevin Moran , Denys Poshyvanyk , and Adwait Nadkarni . 2022 . Why Crypto-detectors Fail: A Systematic Evaluation of Cryptographic Misuse Detection Techniques. In 2022 IEEE Symposium on Security and Privacy (SP). IEEE, 614–631 . Amit Seal Ami, Nathan Cooper, Kaushal Kafle, Kevin Moran, Denys Poshyvanyk, and Adwait Nadkarni. 2022. Why Crypto-detectors Fail: A Systematic Evaluation of Cryptographic Misuse Detection Techniques. In 2022 IEEE Symposium on Security and Privacy (SP). IEEE, 614–631.
3. Recommendation for key management:
4. Daniel J Bernstein 2008 . ChaCha, a variant of Salsa20 . In Workshop record of SASC, Vol. 8 . Lausanne, Switzerland, 3–5. Daniel J Bernstein 2008. ChaCha, a variant of Salsa20. In Workshop record of SASC, Vol. 8. Lausanne, Switzerland, 3–5.
5. On the Practical (In-)Security of 64-bit Block Ciphers