Home
Publishing
DrugRxiv
Drug Repurposing
Network Medicine
About
REPO4EU
Meet the team
Drug Repurposing Research Collection
Conference
Blog
My ScienceOpen
Sign in
Register
Dashboard
Search
Home
Publishing
DrugRxiv
Drug Repurposing
Network Medicine
About
REPO4EU
Meet the team
Drug Repurposing Research Collection
Conference
My ScienceOpen
Sign in
Register
Dashboard
Search
25
views
11
references
Top references
cited by
4
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
4,460
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Selected Areas in Cryptography
Permutation After RC4 Key Scheduling Reveals the Secret Key
other
Author(s):
Goutam Paul
,
Subhamoy Maitra
Publication date
(Print):
2007
Publisher:
Springer Berlin Heidelberg
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Genome Engineering using CRISPR
Most cited references
11
Record
: found
Abstract
: not found
Book Chapter
: not found
Weaknesses in the Key Scheduling Algorithm of RC4
Scott Fluhrer
,
Itsik Mantin
,
Adi Shamir
(2001)
0
comments
Cited
37
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
(Not So) Random Shuffles of RC4
Ilya Mironov
(2002)
0
comments
Cited
22
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
A Practical Attack on Broadcast RC4
Itsik Mantin
,
Adi Shamir
(2002)
0
comments
Cited
19
times
– based on
0
reviews
Bookmark
All references
Author and book information
Book Chapter
Pages
: 360-377
DOI:
10.1007/978-3-540-77360-3_23
SO-VID:
05f11aae-07c3-4c2c-bbe4-7743110b9002
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 84
Improved Side-Channel Collision Attacks on AES
pp. 344
Passive–Only Key Recovery Attacks on RC4
pp. 360
Permutation After RC4 Key Scheduling Reveals the Secret Key
pp. 56
Collisions for 70-Step SHA-1: On the Full Cost of Collision Search
pp. 264
Cryptanalysis of White-Box DES Implementations with Arbitrary External Encodings
pp. 278
Cryptanalysis of White Box DES Implementations
Similar content
4,460
Altering the orientation of a fused protein to the RNA-binding ribosomal protein L7Ae and its derivatives through circular permutation
Authors:
Shoji J. Ohuchi
,
Fumihiko Sagawa
,
Taiichi Sakamoto
…
On some permutation polynomials over F_q of the form x^r*h(x^((q-1)/d)))
Authors:
Michael E. Zieve
An Improvement on the Gilbert–Varshamov Bound for Permutation Codes
Authors:
Fei Gao
,
Yiting Yang
,
Gennian Ge
See all similar
Cited by
4
New Form of Permutation Bias and Secret Key Leakage in Keystream Bytes of RC4
Authors:
Subhamoy Maitra
,
Goutam Paul
Analysis of RC4 and Proposal of Additional Layers for Better Security Margin
Authors:
Subhamoy Maitra
,
Goutam Paul
On Some Sequences of the Secret Pseudo-random Index j in RC4 Key Scheduling
Authors:
Riddhipratim Basu
,
Subhamoy Maitra
,
Goutam Paul
…
See all cited by