Efficient Reconstruction of RC4 Keys from Internal States
暂无分享,去创建一个
[1] Ariel J. Feldman,et al. Lest we remember: cold-boot attacks on encryption keys , 2008, CACM.
[2] Andreas Klein,et al. Attacks on the RC4 stream cipher , 2008, Des. Codes Cryptogr..
[3] Aggelos Kiayias,et al. Polynomial Reconstruction Based Cryptography , 2001, Selected Areas in Cryptography.
[4] Erik Tews,et al. Breaking 104 Bit WEP in Less Than 60 Seconds , 2007, WISA.
[5] Adi Shamir,et al. A Practical Attack on Broadcast RC4 , 2001, FSE.
[6] Vincent Rijmen,et al. Analysis Methods for (Alleged) RC4 , 1998, ASIACRYPT.
[7] Itsik Mantin,et al. Predicting and Distinguishing Attacks on RC4 Keystream Generator , 2005, EUROCRYPT.
[8] Jovan Dj. Golic,et al. Linear Statistical Weakness of Alleged RC4 Keystream Generator , 1997, EUROCRYPT.
[9] Serge Vaudenay,et al. Passive-Only Key Recovery Attacks on RC4 , 2007, Selected Areas in Cryptography.
[10] Kazuo Ohta,et al. Advances in Cryptology — ASIACRYPT’98 , 2002, Lecture Notes in Computer Science.
[11] Dan S. Wallach,et al. A Related-Key Cryptanalysis of RC4 , 2000 .
[12] Gerhard Goos,et al. Fast Software Encryption , 2001, Lecture Notes in Computer Science.
[13] Goutam Paul,et al. RC4 State Information at Any Stage Reveals the Secret Key , 2007, IACR Cryptol. ePrint Arch..
[14] Walter Fumy,et al. Advances in Cryptology — EUROCRYPT ’97 , 2001, Lecture Notes in Computer Science.
[15] Eli Biham,et al. Impossible Fault Analysis of RC4 and Differential Fault Analysis of RC4 , 2005, FSE.
[16] G. G. Stokes. "J." , 1890, The New Yale Book of Quotations.
[17] Goutam Paul,et al. Permutation After RC4 Key Scheduling Reveals the Secret Key , 2007, Selected Areas in Cryptography.
[18] Christopher Allen,et al. The TLS Protocol Version 1.0 , 1999, RFC.
[19] Adi Shamir,et al. Weaknesses in the Key Scheduling Algorithm of RC4 , 2001, Selected Areas in Cryptography.
[20] Scott R. Fluhrer,et al. Statistical Analysis of the Alleged RC4 Keystream Generator , 2000, FSE.
[21] Ronald Cramer,et al. Advances in Cryptology - EUROCRYPT 2005, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings , 2005, EUROCRYPT.