Analysing and exploiting the Mantin biases in RC4
暂无分享,去创建一个
Kenneth G. Paterson | Sean Murphy | Thyla van der Merwe | Rémi Bricout | K. Paterson | S. Murphy | Rémi Bricout
[1] Carl-Erik W. Sundberg,et al. List Viterbi decoding algorithms with applications , 1994, IEEE Trans. Commun..
[2] Kenneth G. Paterson,et al. Plaintext Recovery Attacks Against WPA/TKIP , 2014, FSE.
[3] D. Farnsworth. A First Course in Order Statistics , 1993 .
[4] Masakatu Morii,et al. How to Recover Any Byte of Plaintext on RC4 , 2013, Selected Areas in Cryptography.
[5] Kenneth G. Paterson,et al. On the Security of RC4 in TLS , 2013, USENIX Security Symposium.
[6] Masakatu Morii,et al. Full Plaintext Recovery Attack on Broadcast RC4 , 2013, FSE.
[7] Frank Piessens,et al. All Your Biases Belong to Us: Breaking RC4 in WPA-TKIP and TLS , 2015, USENIX Annual Technical Conference.
[8] B. Arnold,et al. A first course in order statistics , 1994 .
[9] Kenneth G. Paterson,et al. Big Bias Hunting in Amazonia: Large-Scale Computation and Exploitation of RC4 Biases (Invited Paper) , 2014, ASIACRYPT.
[10] Scott R. Fluhrer,et al. Statistical Analysis of the Alleged RC4 Keystream Generator , 2000, FSE.
[11] Kenneth G. Paterson,et al. A Practical Attack Against the Use of RC4 in the HIVE Hidden Volume Encryption System , 2015, AsiaCCS.
[12] Itsik Mantin,et al. Predicting and Distinguishing Attacks on RC4 Keystream Generator , 2005, EUROCRYPT.
[13] Kenneth G. Paterson,et al. Attacks Only Get Better: Password Recovery Attacks Against RC4 in TLS , 2015, USENIX Security Symposium.