{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T00:32:47Z","timestamp":1725496367963},"publisher-location":"Berlin, Heidelberg","reference-count":22,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540773597"},{"type":"electronic","value":"9783540773603"}],"license":[{"start":{"date-parts":[[2007,1,1]],"date-time":"2007-01-01T00:00:00Z","timestamp":1167609600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007]]},"DOI":"10.1007\/978-3-540-77360-3_22","type":"book-chapter","created":{"date-parts":[[2007,12,1]],"date-time":"2007-12-01T08:04:18Z","timestamp":1196496258000},"page":"344-359","source":"Crossref","is-referenced-by-count":33,"title":["Passive\u2013Only Key Recovery Attacks on RC4"],"prefix":"10.1007","author":[{"given":"Serge","family":"Vaudenay","sequence":"first","affiliation":[]},{"given":"Martin","family":"Vuagnoux","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"22_CR1","unstructured":"IEEE: ANSI\/IEEE standard 802.11b: Wireless LAN Medium Access Control (MAC) and Physical Layer (phy) Specifications (1999)"},{"key":"22_CR2","doi-asserted-by":"crossref","unstructured":"Borisov, N., Goldberg, I., Wagner, D.: Intercepting mobile communications: the insecurity of 802.11. In: MOBICOM, pp. 180\u2013189 (2001)","DOI":"10.1145\/381677.381695"},{"key":"22_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/3-540-45537-X_1","volume-title":"Selected Areas in Cryptography","author":"S. Fluhrer","year":"2001","unstructured":"Fluhrer, S., Mantin, I., Shamir, A.: Weaknesses in the key scheduling algorithm of RC4. In: Vaudenay, S., Youssef, A.M. (eds.) SAC 2001. LNCS, vol.\u00a02259, pp. 1\u201324. Springer, Heidelberg (2001)"},{"key":"22_CR4","unstructured":"Roos, A.: A class of weak keys in RC4 stream cipher (sci.crypt) (1995)"},{"key":"22_CR5","unstructured":"Wagner, D.: Weak keys in RC4 (sci.crypt) (1995), http:\/\/www.cs.berkeley.edu\/~daw\/my-posts\/my-rc4-weak-keys"},{"key":"22_CR6","unstructured":"Hulton, D.: Practical exploitation of RC4 weaknesses in WEP environments (2001), http:\/\/www.dachb0den.com\/projects\/bsd-airtools\/wepexp.txt"},{"key":"22_CR7","unstructured":"Bittau, A.: Additional weak IV classes for the FMS attack (2003), http:\/\/www.cs.ucl.ac.uk\/staff\/a.bittau\/sorwep.txt"},{"key":"22_CR8","unstructured":"Korek: Need security pointers (2004), http:\/\/www.netstumbler.org\/showthread.php?postid=89036#post89036"},{"key":"22_CR9","unstructured":"Korek: Next generation of WEP attacks? (2004), http:\/\/www.netstumbler.org\/showpost.php?p=93942&postcount=35"},{"key":"22_CR10","unstructured":"Martin, J.I.S.: Weplab, http:\/\/weplab.sourceforge.net\/"},{"key":"22_CR11","unstructured":"Devine, C., Otreppe, T.: Aircrack, http:\/\/www.aircrack-ng.org\/"},{"key":"22_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"395","DOI":"10.1007\/11593447_21","volume-title":"ASIACRYPT 2005","author":"I. Mantin","year":"2005","unstructured":"Mantin, I.: A practical attack on the fixed RC4 in the WEP mode. In: Roy, B. (ed.) ASIACRYPT 2005. LNCS, vol.\u00a03788, pp. 395\u2013411. Springer, Heidelberg (2005)"},{"key":"22_CR13","unstructured":"Jenkins, R.: Isaac and RC4, http:\/\/burtleburtle.net\/bob\/rand\/isaac.html"},{"key":"22_CR14","unstructured":"Klein, A.: Attacks on the RC4 stream cipher. Personal Andreas Klein website (2006), http:\/\/cage.ugent.be\/~klein\/RC4\/RC4-en.ps"},{"key":"22_CR15","first-page":"386","volume-title":"S&P","author":"A. Bittau","year":"2006","unstructured":"Bittau, A., Handley, M., Lackey, J.: The final nail in WEP\u2019s coffin. In: S&P, pp. 386\u2013400. IEEE Computer Society Press, Los Alamitos (2006)"},{"key":"22_CR16","unstructured":"Paul, G., Rathi, S., Maitra, S.: On non-negligible bias of the first output bytes of RC4 towards the first three bytes of the secret key. In: WCC 2007. International Workshop on Coding and Cryptography, pp. 285\u2013294 (2007)"},{"key":"22_CR17","unstructured":"IEEE: ANSI\/IEEE standard 802.11i: Amendment 6 Wireless LAN Medium Access Control (MAC) and Physical Layer (phy) Specifications, Draft 3 (2003)"},{"key":"22_CR18","unstructured":"IEEE: ANSI\/IEEE standard 802.11i: Amendment 6: Wireless LAN Medium Access Control (MAC) and Physical Layer (phy) Specifications (2004)"},{"key":"22_CR19","doi-asserted-by":"crossref","unstructured":"Tews, E., Weinmann, R.P., Pyshkin, A.: Breaking 104 bit WEP in less than 60 seconds. Cryptology ePrint Archive, Report 2007\/120 (2007), http:\/\/eprint.iacr.org\/","DOI":"10.1007\/978-3-540-77535-5_14"},{"key":"22_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"304","DOI":"10.1007\/3-540-45708-9_20","volume-title":"CRYPTO 2002","author":"I. Mironov","year":"2002","unstructured":"Mironov, I.: (Not so) random shuffles of RC4. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol.\u00a02442, pp. 304\u2013319. Springer, Heidelberg (2002)"},{"key":"22_CR21","unstructured":"Postel, R.: Rfc1042 (1988) http:\/\/rfc.net\/rfc1042.html"},{"key":"22_CR22","unstructured":"Chaabouni, R.: Breaking WEP Faster with Statistical Analysis. Ecole Polytechnique F\u00e9d\u00e9rale de Lausanne, LASEC, Semester Project (2006)"}],"container-title":["Lecture Notes in Computer Science","Selected Areas in Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-77360-3_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,15]],"date-time":"2023-05-15T02:05:44Z","timestamp":1684116344000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-77360-3_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007]]},"ISBN":["9783540773597","9783540773603"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-77360-3_22","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2007]]}}}