On biases of permutation and keystream bytes of RC4 towards the secret key
From MaRDI portal
Publication:1032499
DOI10.1007/S12095-008-0009-4zbMath1178.94198OpenAlexW2109166339MaRDI QIDQ1032499
Publication date: 26 October 2009
Published in: Cryptography and Communications (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s12095-008-0009-4
Related Items (1)
Cites Work
- Finding an internal state of RC4 stream cipher
- Attacks on the RC4 stream cipher
- A Practical Attack on Broadcast RC4
- New Form of Permutation Bias and Secret Key Leakage in Keystream Bytes of RC4
- Efficient Reconstruction of RC4 Keys from Internal States
- New State Recovery Attack on RC4
- Analysis Methods for (Alleged) RC4
- Predicting and Distinguishing Attacks on RC4 Keystream Generator
- On Non-randomness of the Permutation After RC4 Key Scheduling
- Progress in Cryptology - INDOCRYPT 2003
- A Practical Attack on the Fixed RC4 in the WEP Mode
- Passive–Only Key Recovery Attacks on RC4
- Permutation After RC4 Key Scheduling Reveals the Secret Key
- On Reconstruction of RC4 Keys from Internal States
- New Results on the Key Scheduling Algorithm of RC4
- Fast Software Encryption
- Unnamed Item
- Unnamed Item
- Unnamed Item
This page was built for publication: On biases of permutation and keystream bytes of RC4 towards the secret key