Cryptography Reference
In-Depth Information
[96] R. Lidl and H. Niederreiter. Finite Fields. Cambridge University Press.
Second edition, 1997.
[97] Y. Liu and T. Qin. The key and IV setup of the stream ciphers HC-256
and HC-128. International Conference on Networks Security, Wireless
Communications and Trusted Computing, pages 430-433, 2009.
[98] Y. Lu, W. Meier and S. Vaudenay. The Conditional Correlation Attack:
A Practical Attack on Bluetooth Encryption. CRYPTO 2005, pages 97-
117, vol. 3621, Lecture Notes in Computer Science, Springer, 2001.
[99] M. Luby and C. Rackoff. How to Construct Pseudorandom Permutations
and Pseudorandom Functions. SIAM Journal on Computing, pages 373-
386, vol. 17, 1988.
[100] S. Maitra, G. Paul and S. Sen Gupta. Attack on Broadcast RC4 Re-
visited. FSE 2011, pages 199-217, vol. 6733, Lecture Notes in Computer
Science, Springer.
[101] S. Maitra and G. Paul. Analysis of RC4 and Proposal of Additional
Layers for Better Security Margin. INDOCRYPT 2008, pages 27-39, vol.
5365, Lecture Notes in Computer Science, Springer.
[102] S. Maitra and G. Paul. Analysis of RC4 and Proposal of Additional
Layers for Better Security Margin (Full Version). IACR Eprint Server,
eprint.iacr.org, number 2008/396, September 19, 2008. This is an ex-
tended version of [101].
[103] S. Maitra and G. Paul. New Form of Permutation Bias and Secret Key
Leakage in Keystream Bytes of RC4. FSE 2008, pages 253-269, vol. 5086,
Lecture Notes in Computer Science, Springer.
[104] S. Maitra and G. Paul. Recovering RC4 Permutation from 2048
Keystream Bytes if j is Stuck. ACISP 2008, pages 306-320, vol. 5107,
Lecture Notes in Computer Science, Springer.
[105] S. Maitra, G. Paul and S. Raizada. Some Observations on HC-128. Pro-
ceedings of the International Workshop on Coding and Cryptography
(WCC), May 10-15, 2009, Ullensvang, Norway, pages 527-539.
[106] S. Maitra, G. Paul, S. Raizada, S. Sen and R. Sengupta. Some Observa-
tions on HC-128. Designs, Codes and Cryptography, pages 231-245, vol.
59, no. 1-3, April 2011. This is an extended version of [105].
[107] I. Mantin and A. Shamir. A Practical Attack on Broadcast RC4. FSE
2001, pages 152-164, vol. 2355, Lecture Notes in Computer Science,
Springer.
Search WWH ::




Custom Search