{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T16:19:47Z","timestamp":1725898787822},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642371189"},{"type":"electronic","value":"9783642371196"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-37119-6_3","type":"book-chapter","created":{"date-parts":[[2013,3,27]],"date-time":"2013-03-27T00:34:59Z","timestamp":1364344499000},"page":"33-44","source":"Crossref","is-referenced-by-count":3,"title":["MARC: Modified ARC4"],"prefix":"10.1007","author":[{"given":"Jianliang","family":"Zheng","sequence":"first","affiliation":[]},{"given":"Jie","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"unstructured":"Schneier, B.: Applied Cryptography: Protocols, Algorithms, and Source Code in C, 2nd edn. John Wiley & Sons (1995)","key":"3_CR1"},{"key":"3_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/3-540-45537-X_1","volume-title":"Selected Areas in Cryptography","author":"S. Fluhrer","year":"2001","unstructured":"Fluhrer, S., Mantin, I., Shamir, A.: Weaknesses in the Key Scheduling Algorithm of RC4. In: Vaudenay, S., Youssef, A.M. (eds.) SAC 2001. LNCS, vol.\u00a02259, pp. 1\u201324. Springer, Heidelberg (2001)"},{"unstructured":"RSA Security Response to Weaknesses in Key Scheduling Algorithm of RC4, \n                    \n                      http:\/\/www.rsa.com\/rsalabs\/node.asp?id=2009","key":"3_CR3"},{"unstructured":"Wu, H.: The Stream Cipher HC-128, \n                    \n                      http:\/\/www.ecrypt.eu.org\/stream\/hcpf.html","key":"3_CR4"},{"unstructured":"Boesgaard, M., et al.: The Stream Cipher Rabbit. eSTREAM report 2005\/024 (2005), \n                    \n                      http:\/\/www.ecrypt.eu.org\/stream\/papers.html","key":"3_CR5"},{"unstructured":"Bernstein, D.J.: Salsa20\/8 and Salsa20\/12. eSTREAM report 2006\/007 (2006), \n                    \n                      http:\/\/www.ecrypt.eu.org\/stream\/papers.html","key":"3_CR6"},{"unstructured":"Berbain, C., et al.: Sosemanuk, a fast software-oriented stream cipher. eSTREAM report 2005\/027 (2005), \n                    \n                      http:\/\/www.ecrypt.eu.org\/stream\/papers.html","key":"3_CR7"},{"key":"3_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1007\/978-3-540-25937-4_16","volume-title":"Fast Software Encryption","author":"S. Paul","year":"2004","unstructured":"Paul, S., Preneel, B.: A New Weakness in the RC4 Keystream Generator and an Approach to Improve the Security of the Cipher. In: Roy, B., Meier, W. (eds.) FSE 2004. LNCS, vol.\u00a03017, pp. 245\u2013259. Springer, Heidelberg (2004)"},{"key":"3_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"210","DOI":"10.1007\/978-3-540-25937-4_14","volume-title":"Fast Software Encryption","author":"B. Zoltak","year":"2004","unstructured":"Zoltak, B.: VMPC One-Way Function and Stream Cipher. In: Roy, B., Meier, W. (eds.) FSE 2004. LNCS, vol.\u00a03017, pp. 210\u2013225. Springer, Heidelberg (2004)"},{"doi-asserted-by":"crossref","unstructured":"Maitra, S., Paul, G.: Analysis of RC4 and Proposal of Additional Layers for Better Security Margin. In: International Conference on Cryptology in India. IIT, Kharagpur (2008)","key":"3_CR10","DOI":"10.1007\/978-3-540-89754-5_3"},{"unstructured":"Khine, L.L.: A New Variant of RC4 Stream Cipher. World Academy of Science, Engineering and Technology 50 (2009)","key":"3_CR11"},{"unstructured":"Roos, A.: A Class of Weak Keys in the RC4 Stream Cipher. Posting to sci.crypt (1995)","key":"3_CR12"},{"key":"3_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"226","DOI":"10.1007\/3-540-69053-0_16","volume-title":"Advances in Cryptology - EUROCRYPT \u201997","author":"J.D.. Goli\u0107","year":"1997","unstructured":"Goli\u0107, J.D.: Linear Statistical Weakness of Alleged RC4 Keystream Generator. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol.\u00a01233, pp. 226\u2013238. Springer, Heidelberg (1997)"},{"key":"3_CR14","doi-asserted-by":"publisher","first-page":"269","DOI":"10.1007\/s10623-008-9206-6","volume":"48","author":"A. Klein","year":"2008","unstructured":"Klein, A.: Attacks on the RC4 Stream Cipher. Designs, Codes and Cryptography\u00a048, 269\u2013286 (2008)","journal-title":"Designs, Codes and Cryptography"},{"key":"3_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"188","DOI":"10.1007\/978-3-540-77535-5_14","volume-title":"Information Security Applications","author":"E. Tews","year":"2008","unstructured":"Tews, E., Weinmann, R.-P., Pyshkin, A.: Breaking 104 Bit WEP in Less Than 60 Seconds. In: Kim, S., Yung, M., Lee, H.-W. (eds.) WISA 2007. LNCS, vol.\u00a04867, pp. 188\u2013202. Springer, Heidelberg (2008)"},{"unstructured":"Runkin, A., et al.: Statistical Test Suite for Random and Pseudo Random Number Generators for Cryptographic Applications. NIST special publication 800-22","key":"3_CR16"},{"unstructured":"Marsaglia, G.: DIEHARD Battery of Tests. New version, \n                    \n                      http:\/\/www.csis.hku.hk\/~diehard\/","key":"3_CR17"},{"doi-asserted-by":"crossref","unstructured":"L\u2019Ecuyer, P., Simard, R.J.: Testu01: A C Library for Empirical Testing of Random Number Generators. ACM Trans. Math. Softw.\u00a033(4) (2007)","key":"3_CR18","DOI":"10.1145\/1268776.1268777"},{"unstructured":"Soong, T.T.: Fundamentals of Probability and Statistics for Engineers, p. 327. John-Wiley and Sons Ltd. (2004) ISBN: 0470868147","key":"3_CR19"},{"doi-asserted-by":"crossref","unstructured":"Marsaglia, G., Tsang, W.: Some Difficult-to-Pass Tests of Randomness. Journal Statistical Software\u00a07(3) (2002)","key":"3_CR20","DOI":"10.18637\/jss.v007.i03"},{"unstructured":"Leitner, F.V.: Source Code Optimization, \n                    \n                      http:\/\/www.linux-kongress.org\/2009\/slides\/compiler_survey_felix_von_leitner.pdf","key":"3_CR21"}],"container-title":["Lecture Notes in Computer Science","Foundations and Practice of Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-37119-6_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,12]],"date-time":"2019-05-12T00:25:35Z","timestamp":1557620735000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-37119-6_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642371189","9783642371196"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-37119-6_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}