{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,5]],"date-time":"2026-02-05T22:45:55Z","timestamp":1770331555745,"version":"3.49.0"},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540438694","type":"print"},{"value":"9783540454731","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2002]]},"DOI":"10.1007\/3-540-45473-x_13","type":"book-chapter","created":{"date-parts":[[2007,5,13]],"date-time":"2007-05-13T09:28:04Z","timestamp":1179048484000},"page":"152-164","source":"Crossref","is-referenced-by-count":130,"title":["A Practical Attack on Broadcast RC4"],"prefix":"10.1007","author":[{"given":"Itsik","family":"Mantin","sequence":"first","affiliation":[]},{"given":"Adi","family":"Shamir","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2002,6,21]]},"reference":[{"key":"13_CR1","unstructured":"H. Finney. an RC4 cycle that can\u2019t happen. September 1994."},{"key":"13_CR2","doi-asserted-by":"crossref","unstructured":"Fluhrer and McGrew. Statistical analysis of the alleged RC4 keystream generator. In FSE: Fast Software Encryption, 2000.","DOI":"10.1007\/3-540-44706-7_2"},{"key":"13_CR3","doi-asserted-by":"crossref","unstructured":"Goli\u0107. Linear statistical weakness of alleged RC4 keystream generator. In EUROCRYPT: Advances in Cryptology: Proceedings of EUROCRYPT, 1997.","DOI":"10.1007\/3-540-69053-0_16"},{"key":"13_CR4","doi-asserted-by":"crossref","unstructured":"O. Goldreich. Foundations of Cryptogtaphy. 1 edition, 1999.","DOI":"10.1007\/978-3-662-12521-2_1"},{"key":"13_CR5","unstructured":"A. L. Grosul and D. S. Wallach. a related-key cryptanalysis of RC4. June 2000."},{"key":"13_CR6","unstructured":"Robert J. Jenkins. ISAAC and RC4. Published on the internet at http:\/\/burtleburtle.net\/bob\/rand\/isaac.html ."},{"key":"13_CR7","series-title":"Lect Notes Comput Sci","volume-title":"ASIACRYPT: Advances in Cryptology \u2014 ASIACRYPT: International Conference on the Theory and Application of Cryptology","author":"M. Knudsen","year":"1998","unstructured":"Knudsen, Meier, Preneel, Rijmen, and Verdoolaege. Analysis methods for (alleged) RC4. In ASIACRYPT: Advances in Cryptology \u2014 ASIACRYPT: International Conference on the Theory and Application of Cryptology. LNCS, Springer-Verlag, 1998."},{"key":"13_CR8","series-title":"Lect Notes Comput Sci","volume-title":"SAC: Annual International Workshop on Selected Areas in Cryptography","author":"Mister","year":"1998","unstructured":"Mister and Tavares. Cryptanalysis of RC4-like ciphers. In SAC: Annual International Workshop on Selected Areas in Cryptography. LNCS, 1998."},{"key":"13_CR9","unstructured":"A. Roos. A class of weak keys in the RC4 stream cipher. September 1995."},{"key":"13_CR10","volume-title":"Applied Cryptography","author":"B. Schneier","year":"1996","unstructured":"B. Schneier. Applied Cryptography. John Wiley & Sons, Inc, Toronto, Canada, 2 edition, 1996.","edition":"2 edition"}],"container-title":["Lecture Notes in Computer Science","Fast Software Encryption"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-45473-X_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,27]],"date-time":"2019-04-27T17:52:48Z","timestamp":1556387568000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-45473-X_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002]]},"ISBN":["9783540438694","9783540454731"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/3-540-45473-x_13","relation":{},"ISSN":["0302-9743"],"issn-type":[{"value":"0302-9743","type":"print"}],"subject":[],"published":{"date-parts":[[2002]]}}}