Browse
Publications
Preprints
About
About UCL Open: Env.
Aims and Scope
Editorial Board
Indexing
APCs
How to cite
Publishing policies
Editorial policy
Peer review policy
Equality, Diversity & Inclusion
About UCL Press
Contact us
For authors
Information for authors
How it works
Benefits of publishing with us
Submit
How to submit
Preparing your manuscript
Article types
Open Data
ORCID
APCs
Contributor agreement
For reviewers
Information for reviewers
Review process
How to peer review
Peer review policy
My ScienceOpen
Sign in
Register
Dashboard
Search
Browse
Publications
Preprints
About
About UCL Open: Env.
Aims and Scope
Editorial Board
Indexing
APCs
How to cite
Publishing policies
Editorial policy
Peer review policy
Equality, Diversity & Inclusion
About UCL Press
Contact us
For authors
Information for authors
How it works
Benefits of publishing with us
Submit
How to submit
Preparing your manuscript
Article types
Open Data
ORCID
APCs
Contributor agreement
For reviewers
Information for reviewers
Review process
How to peer review
Peer review policy
My ScienceOpen
Sign in
Register
Dashboard
Search
6
views
9
references
Top references
cited by
12
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
3,494
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Fast Software Encryption
A New Weakness in the RC4 Keystream Generator and an Approach to Improve the Security of the Cipher
other
Author(s):
Souradyuti Paul
,
Bart Preneel
Publication date
(Print):
2004
Publisher:
Springer Berlin Heidelberg
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
High Entropy Alloys and Complex Concentrated Alloys
Most cited references
9
Record
: found
Abstract
: not found
Book Chapter
: not found
Weaknesses in the Key Scheduling Algorithm of RC4
Scott Fluhrer
,
Itsik Mantin
,
Adi Shamir
(2001)
0
comments
Cited
37
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
(Not So) Random Shuffles of RC4
Ilya Mironov
(2002)
0
comments
Cited
22
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
A Practical Attack on Broadcast RC4
Itsik Mantin
,
Adi Shamir
(2002)
0
comments
Cited
19
times
– based on
0
reviews
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
2004
Pages
: 245-259
DOI:
10.1007/978-3-540-25937-4_16
SO-VID:
9ea47b45-91ad-427a-b519-c2fb5b60220e
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 1
New Cryptographic Primitives Based on Multiword T-Functions
pp. 226
A New Stream Cipher HC-256
pp. 245
A New Weakness in the RC4 Keystream Generator and an Approach to Improve the Security of the Cipher
pp. 260
Improving Immunity of Feistel Ciphers against Differential Cryptanalysis by Using Multiple MDS Matrices
pp. 49
Algebraic Attacks on SOBER-t32 and SOBER-t16 without Stuttering
pp. 65
Improving Fast Algebraic Attacks
pp. 279
ICEBERG : An Involutional Cipher Efficient for Block Encryption in Reconfigurable Hardware
pp. 299
Related Key Differential Attacks on 27 Rounds of XTEA and Full-Round GOST
pp. 332
Two Power Analysis Attacks against One-Mask Methods
pp. 348
Nonce-Based Symmetric Encryption
pp. 359
Ciphers Secure against Related-Key Attacks
pp. 389
The EAX Mode of Operation
pp. 408
CWC: A High-Performance Conventional Authenticated Encryption Mode
Similar content
3,494
Using Bernstein-Vazirani Algorithm to Attack Block Ciphers
Authors:
Li Gang Yang
,
Huiqin Xie
The MICKEY stream ciphers
Authors:
Babbage
Disperse rotation operator DRT and use in some stream ciphers
Authors:
Yong-Jin Kim
,
Yong-Ho Yon
,
Son-Gyong Kim
See all similar
Cited by
12
Attacks on the RC4 stream cipher
Authors:
Andreas Klein
Predicting and Distinguishing Attacks on RC4 Keystream Generator
Authors:
Itsik Mantin
A Practical Attack on the Fixed RC4 in the WEP Mode
Authors:
Itsik Mantin
See all cited by