Affiliation:
1. Japan Advanced Institute of Science and Technology
2. Graduate School of Engineering, Osaka University
3. CREST, JST
Publisher
Institute of Electronics, Information and Communications Engineers (IEICE)
Subject
Applied Mathematics,Electrical and Electronic Engineering,Computer Graphics and Computer-Aided Design,Signal Processing
Reference22 articles.
1. [1] A. Das, S. Maitra, G. Paul, and S. Sarkar, “Some combinatorial results towards state recovery attack on RC4,” Information Systems Security, Lecture Notes in Computer Science, vol.7093, pp.204-214, Springer Berlin Heidelberg, Berlin, Heidelberg, 2011.
2. [2] S. Fluhrer, I. Mantin, and A. Shamir, “Weaknesses in the key scheduling algorithm of RC4,” Selected Areas in Cryptography, Lecture Notes in Computer Science, vol.2259, pp.1-24, Springer Berlin Heidelberg, Berlin, Heidelberg, 2001.
3. [3] S.S. Gupta, S. Maitra, W. Meier, G. Paul, and S. Sarkar, “Dependence in IV-related bytes of RC4 key enhances vulnerabilities in WPA,” Fast Software Encryption, Lecture Notes in Computer Science, vol.8540, pp.350-369, Springer Berlin Heidelberg, Berlin, Heidelberg, 2015.
4. [4] T. Isobe, T. Ohigashi, Y. Watanabe, and M. Morii, “Full plaintext recovery attack on broadcast RC4,” Fast Software Encryption, Lecture Notes in Computer Science, vol.8424, pp.179-202, Springer Berlin Heidelberg, Berlin, Heidelberg, 2014.
5. [5] R. Ito and A. Miyaji, “New integrated long-term glimpse of RC4,” Information Security Applications, Lecture Notes in Computer Science, vol.8909, pp.137-149, Springer International Publishing, Cham, 2015.
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献