Browse
Publications
Preprints
About
About UCL Open: Env.
Aims and Scope
Editorial Board
Indexing
APCs
How to cite
Publishing policies
Editorial policy
Peer review policy
Equality, Diversity & Inclusion
About UCL Press
Contact us
For authors
Information for authors
How it works
Benefits of publishing with us
Submit
How to submit
Preparing your manuscript
Article types
Open Data
ORCID
APCs
Contributor agreement
For reviewers
Information for reviewers
Review process
How to peer review
Peer review policy
My ScienceOpen
Sign in
Register
Dashboard
Search
Browse
Publications
Preprints
About
About UCL Open: Env.
Aims and Scope
Editorial Board
Indexing
APCs
How to cite
Publishing policies
Editorial policy
Peer review policy
Equality, Diversity & Inclusion
About UCL Press
Contact us
For authors
Information for authors
How it works
Benefits of publishing with us
Submit
How to submit
Preparing your manuscript
Article types
Open Data
ORCID
APCs
Contributor agreement
For reviewers
Information for reviewers
Review process
How to peer review
Peer review policy
My ScienceOpen
Sign in
Register
Dashboard
Search
39
views
4
references
Top references
cited by
37
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
1,808
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Selected Areas in Cryptography
Weaknesses in the Key Scheduling Algorithm of RC4
other
Author(s):
Scott Fluhrer
,
Itsik Mantin
,
Adi Shamir
Publication date
(Online):
December 20 2001
Publisher:
Springer Berlin Heidelberg
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Genome Engineering using CRISPR
Most cited references
4
Record
: found
Abstract
: not found
Book Chapter
: not found
A Practical Attack on Broadcast RC4
Itsik Mantin
,
Adi Shamir
(2002)
0
comments
Cited
19
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
Real Time Cryptanalysis of A5/1 on a PC
Alex Biryukov
,
Adi Shamir
,
David K. Wagner
(2001)
0
comments
Cited
15
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
Analysis Methods for (Alleged) RC4
Lars Knudsen
,
Willi Meier
,
Bart Preneel
…
(1998)
0
comments
Cited
13
times
– based on
0
reviews
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
2001
Publication date (Online):
December 20 2001
Pages
: 1-24
DOI:
10.1007/3-540-45537-X_1
SO-VID:
0786f8f1-4c70-41b0-bc4e-125ff4e3de4e
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 1
Weaknesses in the Key Scheduling Algorithm of RC4
pp. 103
A Simple Algebraic Representation of Rijndael
pp. 165
Algorithms for Multi-exponentiation
pp. 212
Random Walks Revisited: Extensions of Pollard’s Rho Algorithm for Computing Multiple Discrete Logarithms
Similar content
1,808
Information Theory Based Evaluation of the RC4 Stream Cipher Outputs
Authors:
Evaristo Madarro-Capó
,
Carlos Legón-Pérez
,
Omar Rojas
…
A Distinguishing Attack on a Fast Software-Implemented RC4-Like Stream Cipher
Authors:
Yukiyasu Tsunoo
,
Teruo Saito
,
Hiroyasu Kubo
…
Recovering RC4 Permutation from 2048 Keystream Bytes if j Is Stuck
Authors:
Subhamoy Maitra
,
Goutam Paul
See all similar
Cited by
36
Big healthcare data: preserving security and privacy
Authors:
Karim Abouelmehdi
,
Abderrahim Beni-Hessane
,
Hayat Khaloufi
(Not So) Random Shuffles of RC4
Authors:
Ilya Mironov
Sensor Data Cryptography in Wireless Sensor Networks
Authors:
T.C. Aysal
,
K.E. Barner
See all cited by