<--- Back to Details
First PageDocument Content
Computer network security / Stream ciphers / Wireless networking / RC4 / Wired Equivalent Privacy / Related-key attack / Initialization vector / Wi-Fi Protected Access / Transmission Control Protocol / Cryptography / Cryptographic protocols / IEEE 802.11
Date: 2007-09-16 14:46:25
Computer network security
Stream ciphers
Wireless networking
RC4
Wired Equivalent Privacy
Related-key attack
Initialization vector
Wi-Fi Protected Access
Transmission Control Protocol
Cryptography
Cryptographic protocols
IEEE 802.11

Add to Reading List

Source URL: eprint.iacr.org

Download Document from Source Website

File Size: 264,18 KB

Share Document on Facebook

Similar Documents

Data Encryption Standard / Key schedule / Weak key / Block cipher / GOST / Differential cryptanalysis / Blowfish / Khufu and Khafre / RC5 / Related-key attack / ICE / Cryptanalysis

Key-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES John Kelsey Bruce Schneier

DocID: 1pm6K - View Document

Distinguisher and Related-Key Attack on the Full AES-256 (Extended Version) Alex Biryukov, Dmitry Khovratovich, Ivica Nikoli“c University of Luxembourg {alex.biryukov, dmitry.khovratovich, }

DocID: 1okDI - View Document

RC4 / Keystream / ICE / Related-key attack / Cryptography / Stream ciphers / Py

Differential Cryptanalysis of the Stream Ciphers Py, Py6 and Pypy ? Hongjun Wu and Bart Preneel Katholieke Universiteit Leuven, ESAT/SCD-COSIC Kasteelpark Arenberg 10, B-3001 Leuven-Heverlee, Belgium {wu.hongjun,bart.pre

DocID: 1asyo - View Document

RC4 / Related-key attack / Random variable / Fluhrer /  Mantin and Shamir attack / Cryptography / Stream ciphers / Pseudorandom number generators

A Practical Attack on Broadcast RC4 Itsik Mantin and Adi Shamir Computer Science Department, The Weizmann Institute, Rehovot 76100, Israel. {itsik,shamir}@wisdom.weizmann.ac.il Abstract. RC4 is the most widely deployed

DocID: 182wg - View Document