On the security of RC4 in TLS, USENIX 2013, pp.305-320, 2013. ,
Efficient Reconstruction of RC4 Keys from Internal States, FSE 2008, pp.270-288 ,
DOI : 10.1007/978-3-540-71039-4_17
Full Plaintext Recovery Attack on Broadcast RC4, FSE 2013, pp.179-202, 2013. ,
DOI : 10.1007/978-3-662-43933-3_10
Attacks on the RC4 stream cipher, Designs, Codes and Cryptography, vol.45, issue.7, pp.269-286, 2008. ,
DOI : 10.1007/s10623-008-9206-6
New Form of Permutation Bias and Secret Key Leakage in Keystream Bytes of RC4, fy ) for 16 byte key P(S N [y] = fy ) for 17 byte key 1 N + 1, pp.253-269, 2008. ,
DOI : 10.1007/978-3-540-71039-4_16
Attack on Broadcast RC4 Revisited, FSE 2011, pp.199-217, 2011. ,
DOI : 10.1007/978-3-642-19574-7_5
A Practical Attack on Broadcast RC4, FSE 2001, p.152164, 2002. ,
DOI : 10.1007/3-540-45473-X_13
Analysis of the stream cipher RC4 The Weizmann Institute of, Science, 2001. ,
New Results on Generalization of Roos-Type Biases and Related Keystreams of RC4, Africacrypt, p.222239, 2002. ,
DOI : 10.1007/978-3-642-38553-7_13
Design and Analysis of RC4-like Stream Ciphers, 2005. ,
Handbook of the Normal Distribution., Biometrics, vol.38, issue.4, 1996. ,
DOI : 10.2307/2529920
Permutation After RC4 Key Scheduling Reveals the Secret Key, SAC 2007, pp.360-377 ,
DOI : 10.1007/978-3-540-77360-3_23
Big Bias Hunting in Amazonia: Large-Scale Computation and Exploitation of RC4 Biases (Invited Paper), ASIACRYPT 2014, pp.398-419, 2014. ,
DOI : 10.1007/978-3-662-45611-8_21
A class of weak keys in the RC4 stream cipher. Two posts in sci.crypt, message-id 43u1eh$1j3@hermes, 1995. ,
Statistical Attack on RC4 -Distinguishing WPA, EUROCRYPT 2011, pp.343-363 ,