1. [1] A. Das, S. Maitra, G. Paul, and S. Sarkar, “Some combinatorial results towards state recovery attack on RC4,” Information Systems Security, Lecture Notes in Computer Science, vol.7093, pp.204-214, Springer Berlin Heidelberg, Berlin, Heidelberg, 2011.
2. [2] N. Ferguson, “Michael: an improved MIC for 802.11 WEP,” doc.:IEEE 802.11-02/020r0, April 2002.
3. [3] S. Fluhrer, I. Mantin, and A. Shamir, “Weaknesses in the key scheduling algorithm of RC4,” Selected Areas in Cryptography, Lecture Notes in Computer Science, vol.2259, pp.1-24, Springer Berlin Heidelberg, Berlin, Heidelberg, 2001.
4. [4] S.S. Gupta, S. Maitra, W. Meier, G. Paul, and S. Sarkar, “Dependence in IV-related bytes of RC4 key enhances vulnerabilities in WPA,” Fast Software Encryption, Lecture Notes in Computer Science, vol.8540, pp.350-369, Springer Berlin Heidelberg, Berlin, Heidelberg, 2015.
5. [5] R. Housley, D. Whiting, and N. Ferguson, “Alternate temporal key hash,” doc.:IEEE 802.11-02/282r2, April 2002.