{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,13]],"date-time":"2025-05-13T22:47:23Z","timestamp":1747176443876},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783662434130"},{"type":"electronic","value":"9783662434147"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-662-43414-7_8","type":"book-chapter","created":{"date-parts":[[2014,5,20]],"date-time":"2014-05-20T14:57:06Z","timestamp":1400597826000},"page":"155-173","source":"Crossref","is-referenced-by-count":12,"title":["How to Recover Any Byte of Plaintext on RC4"],"prefix":"10.1007","author":[{"given":"Toshihiro","family":"Ohigashi","sequence":"first","affiliation":[]},{"given":"Takanori","family":"Isobe","sequence":"additional","affiliation":[]},{"given":"Yuhei","family":"Watanabe","sequence":"additional","affiliation":[]},{"given":"Masakatu","family":"Morii","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,5,21]]},"reference":[{"key":"8_CR1","unstructured":"AlFardan, N.J., Bernstein, D.J., Paterson, K.G., Poettering, B., Schuldt, J.C.N.: On the security of RC4 in TLS. In: USENIX Security 2013 (2013) (to appear)"},{"key":"8_CR2","unstructured":"AlFardan, N.J., Bernstein, D.J., Paterson, K.G., Poettering, B., Schuldt, J.C.N.: On the security of RC4 in TLS and WPA. \n                      http:\/\/www.isg.rhul.ac.uk\/tls\/RC4biases.pdf\n                      \n                     (2013)"},{"key":"8_CR3","series-title":"LNCS","doi-asserted-by":"crossref","first-page":"583","DOI":"10.1007\/978-3-540-45146-4_34","volume-title":"CRYPTO 2003","author":"B Canvel","year":"2003","unstructured":"Canvel, B., Hiltgen, A.P., Vaudenay, S., Vuagnoux, M.: Password interception in a SSL\/TLS channel. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 583\u2013599. Springer, Heidelberg (2003)"},{"key":"8_CR4","doi-asserted-by":"crossref","unstructured":"Fluhrer, S.R., McGrew, D.A.: Statistical analysis of the alleged RC4 keystream generator. In: Schneier [14], pp. 19\u201330","DOI":"10.1007\/3-540-44706-7_2"},{"key":"8_CR5","series-title":"LNCS","first-page":"151","volume-title":"SAC 2011","author":"S Sen Gupta","year":"2012","unstructured":"Sen Gupta, S., Maitra, S., Paul, G., Sarkar, S.: Proof of empirical RC4 biases and new key correlations. In: Miri, A., Vaudenay, S. (eds.) SAC 2011. LNCS, vol. 7118, pp. 151\u2013168. Springer, Heidelberg (2012)"},{"key":"8_CR6","unstructured":"Sen Gupta, S., Maitra, S., Paul, G., Sarkar, S.: (Non-)random sequences from (Non-) random permutations - analysis of RC4 stream cipher. J. Cryptol. 1\u201342 (2012). \n                      http:\/\/dblp.uni-trier.de\/rec\/bibtex\/journals\/joc\/GuptaMPS14"},{"key":"8_CR7","doi-asserted-by":"crossref","unstructured":"Isobe, T., Ohigashi, T., Watanabe, Y., Morii, M.: Full plaintext recovery attack on broadcast RC4. Preproceeding of Fast Software Encryption (FSE) (2013)","DOI":"10.1007\/978-3-662-43933-3_10"},{"key":"8_CR8","unstructured":"Josefsson, S., Strombergson, J., Mavrogiannopoulos, N.: The salsa20 stream cipher for transport layer security (TLS) and datagram transport layer security (DTLS). Network Working Group Internet-Draft, March 2013. \n                      http:\/\/tools.ietf.org\/html\/draft-josefsson-salsa20-tls-01\n                      \n                     (2013)"},{"key":"8_CR9","series-title":"LNCS","first-page":"199","volume-title":"FSE 2011","author":"S Maitra","year":"2011","unstructured":"Maitra, S., Paul, G., Sen Gupta, S.: Attack on broadcast RC4 revisited. In: Joux, A. (ed.) FSE 2011. LNCS, vol. 6733, pp. 199\u2013217. Springer, Heidelberg (2011)"},{"key":"8_CR10","unstructured":"Mantin, I.: Analysis of the stream cipher RC4. Master\u2019s Thesis, The Weizmann Institute of Science, Israel. \n                      http:\/\/www.wisdom.weizmann.ac.il\/itsik\/RC4\/rc4.html\n                      \n                     (2001)"},{"key":"8_CR11","series-title":"LNCS","doi-asserted-by":"crossref","first-page":"491","DOI":"10.1007\/11426639_29","volume-title":"EUROCRYPT 2005","author":"I Mantin","year":"2005","unstructured":"Mantin, I.: Predicting and distinguishing attacks on RC4 keystream generator. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 491\u2013506. Springer, Heidelberg (2005)"},{"key":"8_CR12","series-title":"LNCS","first-page":"152","volume-title":"FSE 2001","author":"I Mantin","year":"2002","unstructured":"Mantin, I., Shamir, A.: A practical attack on broadcast RC4. In: Matsui, M. (ed.) FSE 2001. LNCS, vol. 2355, pp. 152\u2013164. Springer, Heidelberg (2002)"},{"key":"8_CR13","series-title":"LNCS","doi-asserted-by":"crossref","first-page":"304","DOI":"10.1007\/3-540-45708-9_20","volume-title":"CRYPTO 2002","author":"I Mironov","year":"2002","unstructured":"Mironov, I.: (not so) random shuffles of RC4. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 304\u2013319. Springer, Heidelberg (2002)"},{"key":"8_CR14","series-title":"LNCS","volume-title":"FSE 2000","year":"2001","unstructured":"Schneier, B. (ed.): FSE 2000. LNCS, vol. 1978. Springer, Heidelberg (2001)"},{"key":"8_CR15","unstructured":"Yarrkov, E.: Why the recent RC4 attack doesn\u2019t surprise me. \n                      https:\/\/cipherdev.org\/rc4_2013-03-13.html\n                      \n                     (2013)"}],"container-title":["Lecture Notes in Computer Science","Selected Areas in Cryptography -- SAC 2013"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-43414-7_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,26]],"date-time":"2019-05-26T21:53:48Z","timestamp":1558907628000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-662-43414-7_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783662434130","9783662434147"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-43414-7_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}