Cryptography Reference
In-Depth Information
[134] G. Paul and S. Maitra. RC4 State Information at Any Stage Reveals
the Secret Key. IACR Eprint Server, eprint.iacr.org, number 2007/208,
June 1, 2007. This is an extended version of [133].
[135] G. Paul, S. Maitra and R. Srivastava. On Non-Randomness of the Per-
mutation after RC4 Key Scheduling. Applied Algebra, Algebraic Algo-
rithms, and Error Correcting Codes (AAECC) 2007, pages 100-109, vol.
4851, Lecture Notes in Computer Science, Springer.
[136] G. Paul and S. Maitra. On Biases of Permutation and Keystream Bytes
of RC4 towards the Secret Key. Cryptography and Communications, pages
225-268, vol. 1, no. 2., September, 2009. This is an extended version
of [133], [103] with some additional materials.
[137] G. Paul, S. Maitra and S. Raizada. A Theoretical Analysis of the Struc-
ture of HC-128. 6th International Workshop on Security (IWSEC) 2011,
pages 161-177, vol. 7038, Lecture Notes in Computer Science, Springer.
[138] S. Paul and B. Preneel. Analysis of Non-fortuitous Predictive States of
the RC4 Keystream Generator. INDOCRYPT 2003, pages 52-67, vol.
2904, Lecture Notes in Computer Science, Springer.
[139] S. Paul and B. Preneel. A New Weakness in the RC4 Keystream Gener-
ator and an Approach to Improve the Security of the Cipher. FSE 2004,
pages 245-259, vol. 3017, Lecture Notes in Computer Science, Springer.
[140] S. Paul, B. Preneel and G. Sekar. Distinguishing Attacks on the Stream
Cipher Py. FSE 2006, pages 405-421, vol. 4047, Lecture Notes in Com-
puter Science, Springer.
[141] T. P. Pedersen. Signing Contracts and Paying Electronically. Lectures
on Data Security, pages 134-157, vol. 1561, Lecture Notes in Computer
Science, Springer.
[142] B. Preneel and O.A. Logachev (Eds.). Boolean Functions in Cryptology
and Information Security. NATO Science for Peace and Security Series:
Information and Communication Security, vol. 18, IOS Press, July 2008.
[143] E. M. Reingold, J. Nievergelt and N. Deo. Combinatorial Algorithms:
Theorey and Practice. Prentice Hall, 1977.
[144] R. L. Rivest, A. Shamir and L. Adleman. A Method for Obtaining Dig-
ital Signatures and Public Key Cryptosystems. Communications of the
ACM, pages 120-126, vol. 21, 1978.
[145] M. Robshaw and O. Billet (Eds.). New Stream Cipher Designs: The
eSTREAM Finalists. Vol. 4986, Lecture Notes in Computer Science,
Springer, 2008.
Search WWH ::




Custom Search