Revisiting (nested) Roos bias in RC4 key scheduling algorithm
From MaRDI portal
Publication:510460
DOI10.1007/s10623-016-0219-2zbMath1366.94532OpenAlexW2358306375WikidataQ122918184 ScholiaQ122918184MaRDI QIDQ510460
Ayineedi Venkateswarlu, Santanu Sarkar
Publication date: 10 February 2017
Published in: Designs, Codes and Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s10623-016-0219-2
Related Items (1)
Uses Software
Cites Work
- Unnamed Item
- Attacks on the RC4 stream cipher
- On non-negligible bias of the first output byte of RC4 towards the first three bytes of the secret key
- Big Bias Hunting in Amazonia: Large-Scale Computation and Exploitation of RC4 Biases (Invited Paper)
- Full Plaintext Recovery Attack on Broadcast RC4
- Plaintext Recovery Attacks Against WPA/TKIP
- Statistical Attack on RC4
- Attack on Broadcast RC4 Revisited
- A Practical Attack on Broadcast RC4
- New Form of Permutation Bias and Secret Key Leakage in Keystream Bytes of RC4
- Efficient Reconstruction of RC4 Keys from Internal States
- New Results on Generalization of Roos-Type Biases and Related Keystreams of RC4
- Permutation After RC4 Key Scheduling Reveals the Secret Key
This page was built for publication: Revisiting (nested) Roos bias in RC4 key scheduling algorithm