{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,28]],"date-time":"2026-03-28T16:55:57Z","timestamp":1774716957510,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540430667","type":"print"},{"value":"9783540455370","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2001]]},"DOI":"10.1007\/3-540-45537-x_1","type":"book-chapter","created":{"date-parts":[[2007,6,3]],"date-time":"2007-06-03T21:29:27Z","timestamp":1180906167000},"page":"1-24","source":"Crossref","is-referenced-by-count":412,"title":["Weaknesses in the Key Scheduling Algorithm of RC4"],"prefix":"10.1007","author":[{"given":"Scott","family":"Fluhrer","sequence":"first","affiliation":[]},{"given":"Itsik","family":"Mantin","sequence":"additional","affiliation":[]},{"given":"Adi","family":"Shamir","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,12,20]]},"reference":[{"key":"1_CR1","doi-asserted-by":"crossref","unstructured":"A. Biryukov, A. Shamir, and D. Wagner. Real time cryptanalysis of A5\/1 on a PC. In FSE: Fast Software Encryption, 2000.","DOI":"10.1007\/3-540-44706-7_1"},{"key":"1_CR2","doi-asserted-by":"crossref","unstructured":"Fluhrer and McGrew. Statistical analysis of the alleged RC4 keystream generator. In FSE: Fast Software Encryption, 2000.","DOI":"10.1007\/3-540-44706-7_2"},{"key":"1_CR3","doi-asserted-by":"crossref","unstructured":"Goli\u0107. Linear statistical weakness of alleged RC4 keystream generator. In EUROCRYPT: Advances in Cryptology: Proceedings of EUROCRYPT, 1997.","DOI":"10.1007\/3-540-69053-0_16"},{"key":"1_CR4","unstructured":"A. L. Grosul and D. S. Wallach. a related-key cryptanalysis of RC4. June 2000."},{"key":"1_CR5","series-title":"Lect Notes Comput Sci","volume-title":"ASIACRYPT: Advances in Cryptology-ASIACRYPT: International Conference on the Theory and Application of Cryptology","author":"Knudsen","year":"1998","unstructured":"Knudsen, Meier, Preneel, Rijmen, and Verdoolaege. Analysis methods for (alleged) RC4. In ASIACRYPT: Advances in Cryptology-ASIACRYPT: International Conference on the Theory and Application of Cryptology. LNCS, Springer-Verlag, 1998."},{"key":"1_CR6","unstructured":"Wireless lan medium access control (MAC) and physical layer (PHY) specifications. (IEEE Standard 802.11), 1999 Edition. L. M. S. C. of the IEEE Computer Society."},{"key":"1_CR7","doi-asserted-by":"crossref","unstructured":"I. Mantin and A. Shamir. A practical attack on broadcast RC4. In FSE: Fast Software Encryption, 2001.","DOI":"10.1007\/3-540-45473-X_13"},{"key":"1_CR8","series-title":"Lect Notes Comput Sci","volume-title":"SAC: Annual International Workshop on Selected Areas in Cryptography","author":"Mister","year":"1998","unstructured":"Mister and Tavares. Cryptanalysis of RC4-like ciphers. In SAC: Annual International Workshop on Selected Areas in Cryptography. LNCS, 1998."},{"key":"1_CR9","unstructured":"Arnold Reinhold. The ciphersaber home page. 2001."},{"key":"1_CR10","unstructured":"A. Roos. A class of weak keys in the RC4 stream cipher. September 1995."},{"key":"1_CR11","unstructured":"Adam Stubblefield, John Ioannidis, and Aviel D. Rubin. Using the fluhrer, mantin and shamir attack to break WEP. (TD-4ZCPZZ), 2001. AT&T Labs, Technical Report."},{"key":"1_CR12","unstructured":"D. Wagner. Re: Weak keys in RC4. September 1995."}],"container-title":["Lecture Notes in Computer Science","Selected Areas in Cryptography"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-45537-X_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,28]],"date-time":"2019-04-28T16:58:11Z","timestamp":1556470691000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-45537-X_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2001]]},"ISBN":["9783540430667","9783540455370"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/3-540-45537-x_1","relation":{},"ISSN":["0302-9743"],"issn-type":[{"value":"0302-9743","type":"print"}],"subject":[],"published":{"date-parts":[[2001]]}}}