Home
Publishing
DrugRxiv
Drug Repurposing
Network Medicine
About
REPO4EU
Meet the team
Drug Repurposing Research Collection
Conference
Blog
My ScienceOpen
Sign in
Register
Dashboard
Search
Home
Publishing
DrugRxiv
Drug Repurposing
Network Medicine
About
REPO4EU
Meet the team
Drug Repurposing Research Collection
Conference
My ScienceOpen
Sign in
Register
Dashboard
Search
28
views
14
references
Top references
cited by
9
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
4,140
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Advances in Cryptology – EUROCRYPT 2005
Predicting and Distinguishing Attacks on RC4 Keystream Generator
other
Author(s):
Itsik Mantin
Publication date
(Print):
2005
Publisher:
Springer Berlin Heidelberg
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
ScienceOpen Research
Most cited references
14
Record
: found
Abstract
: not found
Book Chapter
: not found
Weaknesses in the Key Scheduling Algorithm of RC4
Scott Fluhrer
,
Itsik Mantin
,
Adi Shamir
(2001)
0
comments
Cited
37
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
(Not So) Random Shuffles of RC4
Ilya Mironov
(2002)
0
comments
Cited
22
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
A Practical Attack on Broadcast RC4
Itsik Mantin
,
Adi Shamir
(2002)
0
comments
Cited
19
times
– based on
0
reviews
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
2005
Pages
: 491-506
DOI:
10.1007/11426639_29
SO-VID:
8aa62cc2-451f-4ffe-8e90-d036abbf0516
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 491
Predicting and Distinguishing Attacks on RC4 Keystream Generator
pp. 36
Collisions of SHA-0 and Reduced SHA-1
pp. 78
Smooth Projective Hashing and Two-Message Oblivious Transfer
pp. 96
On Robust Combiners for Oblivious Transfer and Other Primitives
pp. 128
Tag-KEM/DEM: A New Framework for Hybrid Encryption and A New Analysis of Kurosawa-Desmedt KEM
pp. 198
Group Signatures with Efficient Concurrent Join
pp. 215
Floating-Point LLL Revisited
pp. 285
Approximate Quantum Error-Correcting Codes and Secret Sharing Schemes
pp. 404
Universally Composable Password-Based Key Exchange
pp. 474
Second Preimages on n-Bit Hash Functions for Much Less than 2 n Work
pp. 507
Related-Key Boomerang and Rectangle Attacks
pp. 542
Public Traceability in Traitor Tracing Schemes
Similar content
4,140
A spatiotemporal chaotic image encryption scheme based on self adaptive model and dynamic keystream fetching technique
Authors:
Gayathri J.
,
S Subashini
,
J. Gayathri
Connectomicslab/connectomemapper3: connectome mapper v3.0.0-RC4 (version v3.0.0-RC4)
Authors:
S Tourbier
,
Y Alemán-Gómez
,
E. Mullier
…
A new keystream generator MUGI. In: FSE 2002.
Authors:
D. WATANABE
See all similar
Cited by
9
A Practical Attack on the Fixed RC4 in the WEP Mode
Authors:
Itsik Mantin
New Form of Permutation Bias and Secret Key Leakage in Keystream Bytes of RC4
Authors:
Subhamoy Maitra
,
Goutam Paul
New State Recovery Attack on RC4
Authors:
Alexander Maximov
,
Dmitry Khovratovich
See all cited by