Proving TLS-attack related open biases of RC4
From MaRDI portal
Publication:499670
DOI10.1007/S10623-014-0003-0zbMath1329.94076OpenAlexW2081850508MaRDI QIDQ499670
Sourav Sen Gupta, Goutam Paul, Subhamoy Maitra, Santanu Sarkar
Publication date: 30 September 2015
Published in: Designs, Codes and Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s10623-014-0003-0
Related Items (1)
Cites Work
- Unnamed Item
- Unnamed Item
- Further non-randomness in RC4, RC4A and VMPC
- (Non-)random sequences from (non-)random permutations -- analysis of RC4 stream cipher
- Proof of Empirical RC4 Biases and New Key Correlations
- Smashing WEP in a Passive Attack
- Full Plaintext Recovery Attack on Broadcast RC4
- Statistical Attack on RC4
- Attack on Broadcast RC4 Revisited
- A Practical Attack on Broadcast RC4
- Discovery and Exploitation of New Biases in RC4
- A complete characterization of the evolution of RC4 pseudo random generation algorithm
- Linear models for a time-variant permutation generator
- New Results on Generalization of Roos-Type Biases and Related Keystreams of RC4
- Predicting and Distinguishing Attacks on RC4 Keystream Generator
- On Non-randomness of the Permutation After RC4 Key Scheduling
This page was built for publication: Proving TLS-attack related open biases of RC4