RC4

Results: 194



#Item
11Analysing and Exploiting the Mantin Biases in RC4 Remi Bricout1 , Sean Murphy2 , Kenneth G. Paterson2 , and Thyla van der Merwe2 1

Analysing and Exploiting the Mantin Biases in RC4 Remi Bricout1 , Sean Murphy2 , Kenneth G. Paterson2 , and Thyla van der Merwe2 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2016-02-22 02:10:52
12Dependence in IV-related bytes of RC4 key enhances vulnerabilities in WPA? Sourav Sen Gupta1?? , Subhamoy Maitra1 , Willi Meier2 , Goutam Paul1 , and Santanu Sarkar3 1

Dependence in IV-related bytes of RC4 key enhances vulnerabilities in WPA? Sourav Sen Gupta1?? , Subhamoy Maitra1 , Willi Meier2 , Goutam Paul1 , and Santanu Sarkar3 1

Add to Reading List

Source URL: www.souravsengupta.com

Language: English - Date: 2014-03-16 03:17:41
    13Analysis and Implementation of RC4 Stream Cipher A thesis presented to Indian Statistical Institute in fulfillment of the thesis requirement for the degree of Doctor of Philosophy in Computer Science

    Analysis and Implementation of RC4 Stream Cipher A thesis presented to Indian Statistical Institute in fulfillment of the thesis requirement for the degree of Doctor of Philosophy in Computer Science

    Add to Reading List

    Source URL: www.souravsengupta.com

    Language: English - Date: 2014-03-16 03:13:29
      14RC4-Hash : A New Hash Function based on RC4 (Extended Abstract) Donghoon Chang1 , Kishan Chand Gupta2 , and Mridul Nandi3 1  2

      RC4-Hash : A New Hash Function based on RC4 (Extended Abstract) Donghoon Chang1 , Kishan Chand Gupta2 , and Mridul Nandi3 1 2

      Add to Reading List

      Source URL: www.isical.ac.in

      Language: English - Date: 2011-12-28 03:46:39
        15A preliminary version of this paper appears in the proceedings of the USENIX Security SymposiumThis is the full version. On the Security of RC4 in TLS and WPA∗ Nadhem J. AlFardan1 Daniel J. Bernstein2

        A preliminary version of this paper appears in the proceedings of the USENIX Security SymposiumThis is the full version. On the Security of RC4 in TLS and WPA∗ Nadhem J. AlFardan1 Daniel J. Bernstein2

        Add to Reading List

        Source URL: tls.mbed.org

        Language: English
        16Proof of Empirical RC4 Biases and New Key Correlations Sourav Sen Gupta1 , Subhamoy Maitra1 , Goutam Paul2 , and Santanu Sarkar1 1  2

        Proof of Empirical RC4 Biases and New Key Correlations Sourav Sen Gupta1 , Subhamoy Maitra1 , Goutam Paul2 , and Santanu Sarkar1 1 2

        Add to Reading List

        Source URL: www.souravsengupta.com

        Language: English - Date: 2014-09-05 01:19:12
          17Attack on Broadcast RC4 Revisited Subhamoy Maitra1 , Goutam Paul2 , and Sourav Sen Gupta1 1 2

          Attack on Broadcast RC4 Revisited Subhamoy Maitra1 , Goutam Paul2 , and Sourav Sen Gupta1 1 2

          Add to Reading List

          Source URL: www.souravsengupta.com

          Language: English - Date: 2014-03-16 03:17:27
            18Motivation  RC4 in TLS Attack Setting

            Motivation RC4 in TLS Attack Setting

            Add to Reading List

            Source URL: www.usenix.org

            Language: English - Date: 2015-08-19 13:12:21
              19Evaluation of RC4 Stream Cipher July 31, 2002 Information Security Research Centre Queensland University of Technology Ed Dawson, Helen Gustafson, Matt Henricksen, Bill Millan

              Evaluation of RC4 Stream Cipher July 31, 2002 Information Security Research Centre Queensland University of Technology Ed Dawson, Helen Gustafson, Matt Henricksen, Bill Millan

              Add to Reading List

              Source URL: www.ipa.go.jp

              Language: English - Date: 2013-06-03 22:32:58