RC4

Results: 194



#Item
81Key / RSA / Cryptography / Public-key cryptography / RC4

CITI Technical Report 97−2 Provably Secure Videoconferencing Peter Honeyman Andy Adamson Kevin Coffman

Add to Reading List

Source URL: www.citi.umich.edu

Language: English - Date: 1999-01-07 15:14:12
82IEEE 802.11 / Wireless networking / Stream ciphers / Wired Equivalent Privacy / RC4 / Initialization vector / Keystream / Block cipher modes of operation / Chosen-plaintext attack / Cryptography / Cryptographic protocols / Computer network security

Intercepting Mobile Communications: The Insecurity of[removed]Nikita Borisov Ian Goldberg Zero-Knowledge Systems

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2015-01-21 19:48:40
83Py / ISAAC / Block cipher / VEST / Cipher / Distinguishing attack / HC-256 / Blowfish / Symmetric-key algorithm / Cryptography / Stream ciphers / RC4

A shortened version of this paper appears under the same title in the proceedings of Asiacrypt[removed]Xuejia Lai, ed.), LNCS, Springer-Verlag. On the (In)security of Stream Ciphers Based on Arrays and Modular Addition? So

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2007-03-15 14:18:24
84Cryptographic protocols / IEEE 802.11 / Pseudorandom number generators / Wired Equivalent Privacy / Fluhrer /  Mantin and Shamir attack / RC4 / Related-key attack / Initialization vector / Stream cipher / Cryptography / Wireless networking / Computer network security

AT&T Labs Technical Report TD-4ZCPZZ Using the Fluhrer, Mantin, and Shamir Attack to Break WEP Revision 2

Add to Reading List

Source URL: www.cs.jhu.edu

Language: English - Date: 2004-07-14 23:06:25
85Cryptographic software / Cryptographic protocols / Internet protocols / Secure communication / RC4 / Stream cipher / Initialization vector / Transport Layer Security / Symmetric-key algorithm / Cryptography / Software / Computing

The Misuse of RC4 in Microsoft Word and Excel Hongjun Wu Institute for Infocomm Research, Singapore [removed] Abstract. In this report, we point out a serious security flaw in Microsoft Word and Excel. T

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-01-10 07:26:49
86Keystream / RC4 / Stream ciphers / Cryptography / Py

17th March[removed]FSE 2006 Email: [removed]

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2006-04-18 10:40:57
87RC4 / Distinguishing attack / Py / Permutation / Weak key / Related-key attack / Keystream / Fluhrer /  Mantin and Shamir attack / Cryptography / Stream ciphers / Pseudorandom number generators

Predicting and Distinguishing Attacks on RC4 Keystream Generator Itsik Mantin NDS Technologies, Israel [removed]

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2005-03-18 09:06:03
88Keccak / Stream cipher / Hash function / Cryptography / NIST hash function competition / RC4

Spritz—a spongy RC4-like stream cipher and hash function Ronald L. Rivest MIT CSAIL Cambridge, MA[removed]removed]

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2014-10-27 13:26:00
89Computing / Cryptography / Internet / Internet standards / Electronic commerce / Transport Layer Security / Cipher suite / HTTP Secure / RC4 / Cryptographic protocols / Secure communication / Internet protocols

This POODLE Bites: Exploiting The  SSL 3.0 Fallback  Security Advisory  Bodo Möller, Thai Duong, Krzysztof Kotowicz  Google  September 2014 

Add to Reading List

Source URL: www.openssl.org

Language: English - Date: 2014-10-14 16:57:53
90Software development / Computing / Internet protocols / HTTP / HTTP Secure / DevOps / RC4 / Cipher suite / Man-in-the-middle attack / Cryptography / Secure communication / Cryptographic protocols

Recipes for enabling HTTPS The DevOps Approach to Setting up Robust HTTPS Web Apps [removed]

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2013-09-02 17:08:46
UPDATE