Further non-randomness in RC4, RC4A and VMPC
From MaRDI portal
Publication:892388
DOI10.1007/S12095-014-0119-0zbMath1343.94079OpenAlexW2042141460MaRDI QIDQ892388
Publication date: 19 November 2015
Published in: Cryptography and Communications (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s12095-014-0119-0
Related Items (2)
Some Proofs of Joint Distributions of Keystream Biases in RC4 ⋮ Proving TLS-attack related open biases of RC4
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Full Plaintext Recovery Attack on Broadcast RC4
- Plaintext Recovery Attacks Against WPA/TKIP
- How to Recover Any Byte of Plaintext on RC4
- Statistical Attack on RC4
- Attack on Broadcast RC4 Revisited
- A Practical Attack on Broadcast RC4
- Discovery and Exploitation of New Biases in RC4
- Distinguishing Attacks on the Stream Cipher Py
- Predicting and Distinguishing Attacks on RC4 Keystream Generator
- MV3: A New Word Based Stream Cipher Using Rapid Mixing and Revolving Buffers
- On the (In)security of Stream Ciphers Based on Arrays and Modular Addition
- Fast Software Encryption
- Fast Software Encryption
- Fast Software Encryption
- Information Security and Cryptology
This page was built for publication: Further non-randomness in RC4, RC4A and VMPC