共 50 条
- [32] Two linear distinguishing attacks on VMPC and RC4A and weakness of RC4 family of stream ciphers FAST SOFTWARE ENCRYPTION, 2005, 3557 : 342 - 358
- [34] SECURITY EVALUATION AND ENCRYPTION EFFICIENCY ANALYSIS OF RC4 STREAM CIPHER FOR CONVERGED NETWORK APPLICATIONS JOURNAL OF ELECTRICAL ENGINEERING-ELEKTROTECHNICKY CASOPIS, 2013, 64 (03): : 196 - 200
- [35] The analysis and realization of RC4 stream ciphers PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON MODELLING AND SIMULATION (ICMS2009), VOL 4, 2009, : 448 - 452
- [36] Statistical attacks on cookie masking for RC4 CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES, 2018, 10 (05): : 777 - 801
- [37] The effectiveness of brute force attacks on RC4 SECOND ANNUAL CONFERENCE ON COMMUNICATION NETWORKS AND SERVICES RESEARCH, PROCEEDINGS, 2004, : 333 - 336
- [38] Statistical attacks on cookie masking for RC4 Cryptography and Communications, 2018, 10 : 777 - 801
- [39] LT Code Design Based on RC4 Sequential Cipher PROCEEDINGS OF 2012 IEEE 14TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY, 2012, : 1154 - 1158
- [40] (Non-)Random Sequences from (Non-)Random Permutations—Analysis of RC4 Stream Cipher Journal of Cryptology, 2014, 27 : 67 - 108