[書籍][B] RC4 stream cipher and its variants

G Paul, S Maitra - 2011 - books.google.com
RC4 Stream Cipher and Its Variants is the first book to fully cover the popular software
stream cipher RC4. With extensive expertise in stream cipher cryptanalysis and RC4 …

Measuring avalanche properties on RC4 stream cipher variants

EJ Madarro-Capó, CM Legón-Pérez, O Rojas… - Applied Sciences, 2021 - mdpi.com
In the last three decades, the RC4 has been the most cited stream cipher, due to a large
amount of research carried out on its operation. In this sense, dissimilar works have been …

RC4-AccSuite: A hardware acceleration suite for RC4-like stream ciphers

A Khalid, G Paul… - IEEE Transactions on Very …, 2016 - ieeexplore.ieee.org
We present RC4-AccSuite, a hardware accelerator, which combines the flexibility of an
application specific instruction set processor and the performance of an application specific …

Security evaluation of Tree Parity Re-keying Machine implementations utilizing side-channel emissions

J Martínez Padilla, U Meyer-Baese, S Foo - EURASIP Journal on …, 2018 - Springer
In this work, side-channel attacks (SCAs) are considered as a security metric for the
implementation of hybrid cryptosystems utilizing the neural network-based Tree Parity Re …

[PDF][PDF] A survey on recent cryptographic hash function designs

R Purohit, U Mishra, A Bansal - International Journal of Emerging Trends & …, 2013 - Citeseer
Hash Functions are important tool in information security over the internet. The hash
functions that are used in various security related applications are called cryptographic hash …

RC4 state information at any stage reveals the secret key

G Paul, S Maitra - Cryptology ePrint Archive, 2007 - eprint.iacr.org
A theoretical analysis of the RC4 Key Scheduling Algorithm (KSA) is presented in this paper,
where the nonlinear operation is swap** among the permutation bytes. Explicit formulae …

A new symmetric cryptography algorithm to secure e-commerce transactions

FJ Kherad, HR Naji, MV Malakooti… - … on Financial Theory …, 2010 - ieeexplore.ieee.org
In this research we have proposed a new self-developed symmetric algorithm called FJ RC-
4, which is derived from RC4. Our studies shown that KSA is the vulnerable stage of RC4 …

[PDF][PDF] A new variant of RC4 stream cipher

LL Khine - International Journal of Physical and Mathematical …, 2009 - Citeseer
RC4 was used as an encryption algorithm in WEP (Wired Equivalent Privacy) protocol that is
a standardized for 802.11 wireless network. A few attacks followed, indicating certain …

Efficient FPGA implementation of the RC4 stream cipher using block RAM and pipelining

E Taqieddin, O Abu-Rjei, K Mhaidat… - Procedia Computer …, 2015 - Elsevier
RC4 is a popular stream cipher, which is widely used in many security protocols and
standards due to its speed and flexibility. Several hardware implementations were …

Affine equivalence and non-linearity of permutations over

Y Kumar, PR Mishra, NR Pillai, RK Sharma - Applicable Algebra in …, 2017 - Springer
In this paper, we explore further the non-linearity and affine equivalence as proposed by
Mishra et al.(Non-linearity and affine equivalence of permutations. 2014. http://eprint. iacr …