Cryptography Reference
In-Depth Information
[108] I. Mantin. A Practical Attack on the Fixed RC4 in the WEP Mode. ASI-
ACRYPT 2005, pages 395-411, volume 3788, Lecture Notes in Computer
Science, Springer.
[109] I. Mantin. Predicting and Distinguishing Attacks on RC4 Keystream
Generator. EUROCRYPT 2005, pages 491-506, vol. 3494, Lecture Notes
in Computer Science, Springer.
[110] I. Mantin. Analysis of the stream cipher RC4. Master's Thesis, The
Weizmann Institute of Science, Israel, 2001.
[111] M. Matsui. Key Collisions of the RC4 Stream Cipher. FSE 2009, pages
38-50, vol. 5665, Lecture Notes in Computer Science, Springer.
[112] D. P. Matthews Jr. Methods and Apparatus for Accelerating ARC4 Pro-
cessing. US Patent no. 7403615, Morgan Hill, CA, July 2008. Available at
http://www.freepatentsonline.com/7403615.html [last accessed on
April 30, 2011].
[113] A. Maximov. Two Linear Distinguishing Attacks on VMPC and RC4A
and Weakness of RC4 Family of Stream Ciphers. FSE 2005, pages 342-
358, vol. 3557, Lecture Notes in Computer Science, Springer.
[114] A. Maximov. Two Linear Distinguishing Attacks on VMPC and RC4A
and Weakness of RC4 Family of Stream Ciphers (Corrected). IACR
Eprint Server, eprint.iacr.org, number 2007/070, February 22, 2007. This
is a corrected version of [113].
[115] A. Maximov. Cryptanalysis of the “Grain” Family of Stream Ciphers.
ACM Symposium on Information, Computation and Communications
Security (ASIACCS), pages 283-288, 2006.
[116] A. Maximov and D. Khovratovich. New State Recovery Attack on RC4.
CRYPTO 2008, pages 297-316, vol. 5157, Lecture Notes in Computer
Science, Springer.
[117] A. Maximov and D. Khovratovich. New State Recovery Attack on RC4.
IACR Eprint Server, eprint.iacr.org, number 2008/017, January 10, 2008.
This is an extended version of [116].
[118] M. E. McKague. Design and Analysis of RC4-like Stream Ciphers. Mas-
ter's Thesis, University of Waterloo, Canada, 2005.
[119] A. J. Menezes, P. C. van Oorschot and S. A. Vanstone. Handbook of
Applied Cryptography. CRC Press, 5th Printing, 2001.
[120] A. J. Menezes and N. Koblitz. A Survey of Public-key Cryptosystems.
SIAM Review, pages 599-634, vol. 46, 2004.
Search WWH ::




Custom Search