Expanding Weak-key Space of RC4
暂无分享,去创建一个
[1] Serge Vaudenay,et al. Discovery and Exploitation of New Biases in RC4 , 2010, Selected Areas in Cryptography.
[2] Goutam Paul,et al. Attack on Broadcast RC4 Revisited , 2011, FSE.
[3] Atsuko Miyaji,et al. Generalized RC4 Key Collisions and Hash Collisions , 2010, SCN.
[4] Hidenori Kuwakado,et al. Generalized Classes of Weak Keys on RC4 Using Predictive State , 2011, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..
[5] Adi Shamir,et al. A Practical Attack on Broadcast RC4 , 2001, FSE.
[6] Mitsuru Matsui. Key Collisions of the RC4 Stream Cipher , 2009, FSE.
[7] Scott R. Fluhrer,et al. Statistical Analysis of the Alleged RC4 Keystream Generator , 2000, FSE.
[8] Bernard P. Zajac. Applied cryptography: Protocols, algorithms, and source code in C , 1994 .
[9] Adi Shamir,et al. Weaknesses in the Key Scheduling Algorithm of RC4 , 2001, Selected Areas in Cryptography.
[10] Wi-Fi Alliance,et al. Wi-Fi protected access , 2003 .
[11] Serge Vaudenay,et al. Passive-Only Key Recovery Attacks on RC4 , 2007, Selected Areas in Cryptography.
[12] Serge Vaudenay,et al. Smashing WEP in a Passive Attack , 2013, FSE.
[13] Alexander Maximov,et al. New State Recovery Attack on RC4 , 2008, CRYPTO.
[14] Bart Preneel,et al. Analysis of Non-fortuitous Predictive States of the RC4 Keystream Generator , 2003, INDOCRYPT.
[15] Jovan Dj. Golic,et al. Linear Statistical Weakness of Alleged RC4 Keystream Generator , 1997, EUROCRYPT.
[16] Itsik Mantin,et al. Predicting and Distinguishing Attacks on RC4 Keystream Generator , 2005, EUROCRYPT.
[17] Vincent Rijmen,et al. Analysis Methods for (Alleged) RC4 , 1998, ASIACRYPT.