Attacks on the RC4 stream cipher
暂无分享,去创建一个
[1] Bruce Schneier,et al. Practical cryptography , 2003 .
[2] J. Andel. Sequential Analysis , 2022, The SAGE Encyclopedia of Research Design.
[3] Stafford E. Tavares,et al. Cryptanalysis of RC4-like Ciphers , 1998, Selected Areas in Cryptography.
[4] Jovan Dj. Golic. Iterative Probabilistic Cryptanalysis of RC4 Keystream Generator , 2000, ACISP.
[5] Guang Gong,et al. A 32-bit RC4-like Keystream Generator , 2005, IACR Cryptol. ePrint Arch..
[6] Adi Shamir,et al. Weaknesses in the Key Scheduling Algorithm of RC4 , 2001, Selected Areas in Cryptography.
[7] Jovan Dj. Golic,et al. Linear models for a time-variant permutation generator , 1999, IEEE Trans. Inf. Theory.
[8] Bart Preneel,et al. A New Weakness in the RC4 Keystream Generator and an Approach to Improve the Security of the Cipher , 2004, FSE.
[9] Jovan Dj. Golic,et al. Linear Statistical Weakness of Alleged RC4 Keystream Generator , 1997, EUROCRYPT.
[10] Ilya Mironov,et al. (Not So) Random Shuffles of RC4 , 2002, IACR Cryptol. ePrint Arch..
[11] Scott R. Fluhrer,et al. Statistical Analysis of the Alleged RC4 Keystream Generator , 2000, FSE.
[12] Adi Shamir,et al. A Practical Attack on Broadcast RC4 , 2001, FSE.
[13] Itsik Mantin,et al. Predicting and Distinguishing Attacks on RC4 Keystream Generator , 2005, EUROCRYPT.