Browse
Publications
Preprints
About
About UCL Open: Env.
Aims and Scope
Editorial Board
Indexing
APCs
How to cite
Publishing policies
Editorial policy
Peer review policy
Equality, Diversity & Inclusion
About UCL Press
Contact us
For authors
Information for authors
How it works
Benefits of publishing with us
Submit
How to submit
Preparing your manuscript
Article types
Open Data
ORCID
APCs
Contributor agreement
For reviewers
Information for reviewers
Review process
How to peer review
Peer review policy
My ScienceOpen
Sign in
Register
Dashboard
Search
Browse
Publications
Preprints
About
About UCL Open: Env.
Aims and Scope
Editorial Board
Indexing
APCs
How to cite
Publishing policies
Editorial policy
Peer review policy
Equality, Diversity & Inclusion
About UCL Press
Contact us
For authors
Information for authors
How it works
Benefits of publishing with us
Submit
How to submit
Preparing your manuscript
Article types
Open Data
ORCID
APCs
Contributor agreement
For reviewers
Information for reviewers
Review process
How to peer review
Peer review policy
My ScienceOpen
Sign in
Register
Dashboard
Search
38
views
4
references
Top references
cited by
9
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
3,344
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Fast Software Encryption
Statistical Analysis of the Alleged RC4 Keystream Generator
other
Author(s):
Scott R. Fluhrer
,
David A. McGrew
Publication date
(Online):
January 18 2002
Publisher:
Springer Berlin Heidelberg
Read this book at
Publisher
Further versions
open (via free pdf)
Powered by
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Core Readings in Statistical Mediation Analysis
Most cited references
4
Record
: found
Abstract
: not found
Book
: not found
Applied cryptography
B. SCHNEIER
,
B. Schneier
,
B. Schneier
…
(1996)
0
comments
Cited
36
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
Analysis Methods for (Alleged) RC4
Lars Knudsen
,
Willi Meier
,
Bart Preneel
…
(1998)
0
comments
Cited
13
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
Linear Statistical Weakness of Alleged RC4 Keystream Generator
Jovan Golic
(1997)
0
comments
Cited
13
times
– based on
0
reviews
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
2001
Publication date (Online):
January 18 2002
Pages
: 19-30
DOI:
10.1007/3-540-44706-7_2
SO-VID:
65ce0656-52a3-4575-b61b-48cfd2bf6b63
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 1
Real Time Cryptanalysis of A5/1 on a PC
pp. 19
Statistical Analysis of the Alleged RC4 Keystream Generator
pp. 49
Mercy: A Fast Large Block Cipher for Disk Sector Encryption
pp. 75
Amplified Boomerang Attacks Against Reduced-Round MARS and Serpent
pp. 134
Bitslice Ciphers and Power Analysis Attacks
pp. 150
Securing the AES Finalists Against Power Analysis Attacks
pp. 181
A Simple Algorithm for Fast Correlation Attacks on Stream Ciphers
pp. 213
Improved Cryptanalysis of Rijndael
pp. 273
Provable Security against Differential and Linear Cryptanalysis for the SPN Structure
pp. 284
Unforgeable Encryption and Chosen Ciphertext Secure Modes of Operation
Similar content
3,344
On the Existence of Secure Keystream Generators
Authors:
Andrew Klapper
Developing a new Hybrid Cipher using AES, RC4 and SERPENT for Encryption and Decryption
Authors:
Naser Aghajanzadeh
,
Fatemeh Aghajanzadeh
,
Hamid Reza Kargar
On non-negligible bias of the first output byte of RC4 towards the first three bytes of the secret key
Authors:
Goutam Paul
,
Siddheshwar Rathi
,
Subhamoy Maitra
See all similar
Cited by
12
Weaknesses in the Key Scheduling Algorithm of RC4
Authors:
Scott Fluhrer
,
Itsik Mantin
,
Adi Shamir
A Practical Attack on Broadcast RC4
Authors:
Itsik Mantin
,
Adi Shamir
A New Weakness in the RC4 Keystream Generator and an Approach to Improve the Security of the Cipher
Authors:
Souradyuti Paul
,
Bart Preneel
See all cited by