Generalized Classes of Weak Keys on RC4 Using Predictive State
暂无分享,去创建一个
[1] Voon Chin Phua,et al. Wireless lan medium access control (mac) and physical layer (phy) specifications , 1999 .
[2] Scott R. Fluhrer,et al. Statistical Analysis of the Alleged RC4 Keystream Generator , 2000, FSE.
[3] 염흥렬,et al. [서평]「Applied Cryptography」 , 1997 .
[4] Serge Vaudenay,et al. Passive-Only Key Recovery Attacks on RC4 , 2007, Selected Areas in Cryptography.
[5] Itsik Mantin,et al. Predicting and Distinguishing Attacks on RC4 Keystream Generator , 2005, EUROCRYPT.
[6] Hidenori Kuwakado,et al. Fast WEP-Key Recovery Attack Using Only Encrypted IP Packets , 2010, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..
[7] Goutam Paul,et al. Permutation After RC4 Key Scheduling Reveals the Secret Key , 2007, Selected Areas in Cryptography.
[8] Andreas Klein,et al. Attacks on the RC4 stream cipher , 2008, Des. Codes Cryptogr..
[9] Vincent Rijmen,et al. Analysis Methods for (Alleged) RC4 , 1998, ASIACRYPT.
[10] Bart Preneel,et al. Analysis of Non-fortuitous Predictive States of the RC4 Keystream Generator , 2003, INDOCRYPT.
[11] Rafik Chaabouni. Break WEP Faster with Statistical Analysis , 2013, IACR Cryptol. ePrint Arch..
[12] Adi Shamir,et al. A Practical Attack on Broadcast RC4 , 2001, FSE.
[13] Erik Tews,et al. Breaking 104 Bit WEP in Less Than 60 Seconds , 2007, WISA.
[14] Masakatu Morii,et al. New Weakness in the Key-Scheduling Algorithm of RC4 , 2008, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..
[15] Eli Biham,et al. Efficient Reconstruction of RC4 Keys from Internal States , 2008, FSE.
[16] Wi-Fi Alliance,et al. Wi-Fi protected access , 2003 .
[17] Goutam Paul,et al. RC4 State Information at Any Stage Reveals the Secret Key , 2007, IACR Cryptol. ePrint Arch..
[18] Adi Shamir,et al. Weaknesses in the Key Scheduling Algorithm of RC4 , 2001, Selected Areas in Cryptography.