{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:45:00Z","timestamp":1742913900240,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":35,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783662439326"},{"type":"electronic","value":"9783662439333"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-662-43933-3_9","type":"book-chapter","created":{"date-parts":[[2014,7,7]],"date-time":"2014-07-07T05:23:03Z","timestamp":1404710583000},"page":"155-178","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Smashing WEP in a Passive Attack"],"prefix":"10.1007","author":[{"given":"Pouyan","family":"Sepehrdad","sequence":"first","affiliation":[]},{"given":"Petr","family":"Su\u0161il","sequence":"additional","affiliation":[]},{"given":"Serge","family":"Vaudenay","sequence":"additional","affiliation":[]},{"given":"Martin","family":"Vuagnoux","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,7,8]]},"reference":[{"issue":"3\u20134","key":"9_CR1","doi-asserted-by":"publisher","first-page":"358","DOI":"10.1093\/biomet\/37.3-4.358","volume":"37","author":"FJ Anscombe","year":"1950","unstructured":"Anscombe, F.J.: Sampling theory of the negative binomial and logarithmic series distributions. Biometrika 37(3\u20134), 358\u2013382 (1950)","journal-title":"Biometrika"},{"key":"9_CR2","unstructured":"Beck, M., Tews, E.: Practical attacks against WEP and WPA. In: WISEC, pp. 79\u201386. ACM (2009)"},{"key":"9_CR3","doi-asserted-by":"publisher","first-page":"176","DOI":"10.2307\/3001850","volume":"9","author":"CI Bliss","year":"1953","unstructured":"Bliss, C.I., Fisher, R.A.: Fitting the negative binomial distribution to biological data. Biometrika 9, 176\u2013200 (1953)","journal-title":"Biometrika"},{"key":"9_CR4","series-title":"Semester Project","volume-title":"Break WEP Faster with Statistical Analysis","author":"R Chaabouni","year":"2006","unstructured":"Chaabouni, R.: Break WEP Faster with Statistical Analysis. Semester Project. EPFL, Switzerland (2006)"},{"key":"9_CR5","unstructured":"Devine, C., Otreppe, T.: Aircrack-ng. http:\/\/www.aircrack-ng.org\/. Accessed 22 October 2011"},{"key":"9_CR6","doi-asserted-by":"publisher","first-page":"389","DOI":"10.1214\/aoms\/1177731359","volume":"14","author":"W Feller","year":"1943","unstructured":"Feller, W.: On a general class of \u201ccontagious\u201d distributions. Ann. Math. Stat. 14, 389\u2013400 (1943)","journal-title":"Ann. Math. Stat."},{"key":"9_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/3-540-45537-X_1","volume-title":"Selected Areas in Cryptography","author":"SR Fluhrer","year":"2001","unstructured":"Fluhrer, S.R., Mantin, I., Shamir, A.: Weaknesses in the key scheduling algorithm of RC4. In: Vaudenay, S., Youssef, A.M. (eds.) SAC 2001. LNCS, vol. 2259, pp. 1\u201324. Springer, Heidelberg (2001)"},{"key":"9_CR8","unstructured":"IEEE. IEEE Std 802.11, Standards for Local and Metropolitan Area Networks: Wireless Lan Medium Access Control (MAC) and Physical Layer (PHY) Specifications (1999)"},{"key":"9_CR9","unstructured":"IEEE. ANSI\/IEEE standard 802.11i, Amendment 6 Wireless LAN Medium Access Control (MAC) and Physical Layer (phy) Specifications, Draft 3 (2003)"},{"key":"9_CR10","unstructured":"Jenkins, R.: ISAAC and RC4 (1996). http:\/\/burtleburtle.net\/bob\/rand\/isaac.html"},{"key":"9_CR11","doi-asserted-by":"publisher","first-page":"269","DOI":"10.1007\/s10623-008-9206-6","volume":"48","author":"A Klein","year":"2008","unstructured":"Klein, A.: Attacks on the RC4 Stream Cipher. Des. Codes Crypt. 48, 269\u2013286 (2008)","journal-title":"Des. Codes Crypt."},{"key":"9_CR12","unstructured":"Korek. chopchop (experimental WEP attacks) (2004). http:\/\/www.netstumbler.org\/showthread.php?t=12489"},{"key":"9_CR13","unstructured":"Korek. Need Security Pointers (2004). http:\/\/www.netstumbler.org\/showthread.php?postid=89036#post89036"},{"key":"9_CR14","unstructured":"Korek. Next Generation of WEP Attacks? (2004). http:\/\/www.netstumbler.org\/showpost.php?p=93942&postcount=35"},{"key":"9_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"253","DOI":"10.1007\/978-3-540-71039-4_16","volume-title":"Fast Software Encryption","author":"S Maitra","year":"2008","unstructured":"Maitra, S., Paul, G.: New form of permutation bias and secret key leakage in keystream bytes of RC4. In: Nyberg, K. (ed.) FSE 2008. LNCS, vol. 5086, pp. 253\u2013269. Springer, Heidelberg (2008)"},{"key":"9_CR16","unstructured":"Mantin, I.: Analysis of the stream cipher RC4. Master\u2019s thesis, Weizmann Institute of Science (2001)"},{"key":"9_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"342","DOI":"10.1007\/11502760_23","volume-title":"Fast Software Encryption","author":"A Maximov","year":"2005","unstructured":"Maximov, A.: Two linear distinguishing attacks on VMPC and RC4A and weakness of RC4 family of stream ciphers. In: Gilbert, H., Handschuh, H. (eds.) FSE 2005. LNCS, vol. 3557, pp. 342\u2013358. Springer, Heidelberg (2005)"},{"key":"9_CR18","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1214\/aoms\/1177732245","volume":"10","author":"J Neyman","year":"1939","unstructured":"Neyman, J.: On a new class of \u201ccontagious\u201d distributions, applicable in entomology and bacteriology. Ann. Math. Stat. 10, 35\u201357 (1939)","journal-title":"Ann. Math. Stat."},{"key":"9_CR19","series-title":"Springer Series in Operations Research","volume-title":"Numerical Optimization","author":"J Nocedal","year":"2006","unstructured":"Nocedal, J., Wright, S.J.: Numerical Optimization. Springer Series in Operations Research, 2nd edn. Springer, New York (2006)","edition":"2"},{"key":"9_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"360","DOI":"10.1007\/978-3-540-77360-3_23","volume-title":"Selected Areas in Cryptography","author":"G Paul","year":"2007","unstructured":"Paul, G., Maitra, S.: Permutation after RC4 key scheduling reveals the secret key. In: Adams, C., Miri, A., Wiener, M. (eds.) SAC 2007. LNCS, vol. 4876, pp. 360\u2013377. Springer, Heidelberg (2007)"},{"key":"9_CR21","doi-asserted-by":"crossref","unstructured":"Postel, J., Reynolds, J.: A standard for the transmission of IP datagrams over IEEE 802 networks (1988). http:\/\/www.cs.berkeley.edu\/~daw\/my-posts\/my-rc4-weak-keys","DOI":"10.17487\/rfc1042"},{"key":"9_CR22","unstructured":"Roos, A.: A Class of Weak Keys in RC4 Stream Cipher (sci.crypt) (1995). http:\/\/marcel.wanda.ch\/Archive\/WeakKeys"},{"issue":"1","key":"9_CR23","first-page":"67","volume":"27","author":"SS Gupta","year":"2012","unstructured":"Gupta, S.S., Maitra, S., Paul, G., Sarkar, S.: (Non)Random sequences from (Non)Random permutations - analysis of RC4 stream cipher. J. Crypt. 27(1), 67\u2013108 (2012)","journal-title":"J. Crypt."},{"key":"9_CR24","unstructured":"Sepehrdad, P.: Statistical and Algebraic Cryptanalysis of Lightweight and Ultra-lightweight Symmetric Primitives. Ph.D. thesis, EPFL, Switzerland (2012)"},{"key":"9_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1007\/978-3-642-19574-7_5","volume-title":"Selected Areas in Cryptography","author":"P Sepehrdad","year":"2011","unstructured":"Sepehrdad, P., Vaudenay, S., Vuagnoux, M.: Discovery and exploitation of new biases in RC4. In: Biryukov, A., Gong, G., Stinson, D.R. (eds.) SAC 2010. LNCS, vol. 6544, pp. 74\u201391. Springer, Heidelberg (2011)"},{"key":"9_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"343","DOI":"10.1007\/978-3-642-20465-4_20","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2011","author":"P Sepehrdad","year":"2011","unstructured":"Sepehrdad, P., Vaudenay, S., Vuagnoux, M.: Statistical attack on RC4: Distinguishing WPA. In: Paterson, K.G. (ed.) EUROCRYPT 2011. LNCS, vol. 6632, pp. 343\u2013363. Springer, Heidelberg (2011)"},{"key":"9_CR27","unstructured":"Stubblefield, A., Ioannidis, J., Rubin, A.D.: Using the Fluhrer, Mantin, and Shamir attack to break WEP. In: Network and Distributed System Security Symposium (NDSS) (2002)"},{"key":"9_CR28","doi-asserted-by":"crossref","unstructured":"Stubblefield, A., Ioannidis, J., Rubin, A.D.: A key recovery attack on the 802.11b wired equivalent privacy protocol (WEP). In: ACM Transactions on Information and System Security (TISSEC), vol. 7(2) (2004)","DOI":"10.1145\/996943.996948"},{"key":"9_CR29","doi-asserted-by":"crossref","unstructured":"Student. On the error of counting with a haemocytometer. Biometrika 5, 351\u2013360 (1907)","DOI":"10.1093\/biomet\/5.3.351"},{"key":"9_CR30","unstructured":"Tews, E.: Attacks on the WEP protocol. Cryptology ePrint Archive (2007). http:\/\/eprint.iacr.org\/2007\/471.pdf"},{"key":"9_CR31","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"188","DOI":"10.1007\/978-3-540-77535-5_14","volume-title":"Information Security Applications","author":"E Tews","year":"2008","unstructured":"Tews, E., Weinmann, R.-P., Pyshkin, A.: Breaking 104 bit WEP in less than 60 seconds. In: Kim, S., Yung, M., Lee, H.-W. (eds.) WISA 2007. LNCS, vol. 4867, pp. 188\u2013202. Springer, Heidelberg (2008)"},{"key":"9_CR32","first-page":"185","volume":"8","author":"HCS Thom","year":"1957","unstructured":"Thom, H.C.S.: The frequency of hail occurrence. Theoret. Appl. Climatol. 8, 185\u2013194 (1957)","journal-title":"Theoret. Appl. Climatol."},{"key":"9_CR33","doi-asserted-by":"crossref","unstructured":"Thom, H.C.S.: Tornado Probabilities. In: American Meteorological Society, pp. 730\u2013736 (1963)","DOI":"10.1175\/1520-0493(1963)091<0730:TP>2.3.CO;2"},{"key":"9_CR34","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"344","DOI":"10.1007\/978-3-540-77360-3_22","volume-title":"Selected Areas in Cryptography","author":"S Vaudenay","year":"2007","unstructured":"Vaudenay, S., Vuagnoux, M.: Passive\u2013only key recovery attacks on RC4. In: Adams, C., Miri, A., Wiener, M. (eds.) SAC 2007. LNCS, vol. 4876, pp. 344\u2013359. Springer, Heidelberg (2007)"},{"key":"9_CR35","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1093\/biomet\/10.1.36","volume":"10","author":"L Whitaker","year":"1914","unstructured":"Whitaker, L.: On the Poisson law of small numbers. Biometrika 10, 36\u201371 (1914)","journal-title":"Biometrika"}],"container-title":["Lecture Notes in Computer Science","Fast Software Encryption"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-43933-3_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,9,1]],"date-time":"2021-09-01T00:43:05Z","timestamp":1630456985000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-662-43933-3_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783662439326","9783662439333"],"references-count":35,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-43933-3_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]},"assertion":[{"value":"8 July 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}