{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:45:15Z","timestamp":1742913915628,"version":"3.40.3"},"publisher-location":"Dordrecht","reference-count":20,"publisher":"Springer Netherlands","isbn-type":[{"type":"print","value":"9789400769953"},{"type":"electronic","value":"9789400769960"}],"license":[{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-94-007-6996-0_42","type":"book-chapter","created":{"date-parts":[[2013,7,13]],"date-time":"2013-07-13T14:05:32Z","timestamp":1373724332000},"page":"407-415","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["RC4 Stream Cipher with a Random Initial State"],"prefix":"10.1007","author":[{"given":"Maytham M.","family":"Hammood","sequence":"first","affiliation":[]},{"given":"Kenji","family":"Yoshigoe","sequence":"additional","affiliation":[]},{"given":"Ali M.","family":"Sagheer","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"42_CR1","unstructured":"Wu Y, Ma D, Li T, Deng RH (2004) Classify encrypted data in wireless sensor networks. In: Proceedings of the vehicular technology conference, 2004. VTC2004-fall. 2004 IEEE 60th, vol.5, pp 3236\u20133239. Vol. 5, 26\u201329 Sept 2004"},{"key":"42_CR2","unstructured":"Turan MS, Doganaksoy A, Calik, C (2006) Statistical analysis of synchronous stream ciphers. In: Proceedings of the SASC 2006: Stream ciphers revisited"},{"key":"42_CR3","doi-asserted-by":"crossref","unstructured":"Ahmad S, Beg MR, Abbas Q, Ahmad J, Atif S (2010) Comparative study between stream cipher and block cipher using RC4 and hill cipher. In: Proceedings of the international journal of computer applications (0975\u20138887), vol 1(25)","DOI":"10.5120\/465-770"},{"key":"42_CR4","unstructured":"Menezes AJ, Oorschot PC, Vanstone SA (2001) Handbook of applied cryptography. CRC Press, Boston, 2001"},{"key":"42_CR5","doi-asserted-by":"crossref","unstructured":"Gupta SS, Chattopadhyay A, Sinha K, Maitra S, Sinha B (2013) High-performance hardware implementation for RC4 stream cipher. IEEE Trans Comput 62(4):730\u2013743","DOI":"10.1109\/TC.2012.19"},{"key":"42_CR6","unstructured":"Sharif SO, Mansoor SP (2010) Performance analysis of stream and block cipher algorithms. In: Proceedings of the 3rd international conference on advanced computer theory and engineering (ICACTE), vol 1. IEEE, pp 522\u2013525"},{"key":"42_CR7","doi-asserted-by":"crossref","unstructured":"Zoltak B (2004) VMPC one-way function and stream cipher. In: Fast software encryption, FSE 2004. LNCS 3017. Springer-Verlag, New York, pp 210\u2013225","DOI":"10.1007\/978-3-540-25937-4_14"},{"key":"42_CR8","doi-asserted-by":"crossref","unstructured":"Maximov A (2005) Two linear distinguishing attacks on VMPC and RC4A and weakness of the RC4 family of stream ciphers. In: Fast software encryption, FSE 2005, vol 3557, Springer, pp 342\u2013358","DOI":"10.1007\/11502760_23"},{"key":"42_CR9","doi-asserted-by":"crossref","unstructured":"Paul S, Preneel B (2004) A new weakness in the RC4 keystream generator and an approach to improve the security of the cipher. In: Fast software encryption, FSE 2004. LNCS 3017. Springer-Verlag, New York, pp 245\u2013259","DOI":"10.1007\/978-3-540-25937-4_16"},{"key":"42_CR10","unstructured":"Kamble BH, Meshram BB (2012) Robustness of RC4 against differential attack. Inter J Adv Res Comput Eng Technol 1(4), ISSN: 2278\u20131323"},{"key":"#cr-split#-42_CR11.1","doi-asserted-by":"crossref","unstructured":"Mironov I (2002) (Not So) Random shuffles of RC4. In: Moti Y","DOI":"10.1007\/3-540-45708-9_20"},{"key":"#cr-split#-42_CR11.2","unstructured":"(ed) Advances in cryptology. Proceedings of the CRYPTO 2002, 22nd annual international cryptology conference. Lecture notes in computer science, vol 2442. Springer, pp 304-319"},{"key":"42_CR12","doi-asserted-by":"crossref","unstructured":"Chefranov AG, Mazurova TA (2006) Pseudo-random number generator RC4 period improvement. In: 2006 IEEE international conference on automation, quality and testing, robotics, vol 2, 25\u201328 May 2006, pp 38\u201341","DOI":"10.1109\/AQTR.2006.254596"},{"key":"42_CR13","doi-asserted-by":"crossref","unstructured":"Fluhrer S, Mantin I, Shamir A (2001) Weaknesses in the key scheduling algorithm of RC4. In: Proceedings of annual workshop on selected areas in cryptography, vol 2259, Springer, Toronto, pp 1\u201324","DOI":"10.1007\/3-540-45537-X_1"},{"key":"42_CR14","unstructured":"Pardeep, Pateriya, P (2012) PC-RC4 algorithm: an enhancement over standard RC4 algorithm. Inter J Comput Sci Net 1(3)"},{"key":"42_CR15","unstructured":"Mousa A, Hamad A (2006) Evaluation of the RC4 algorithm for data encryption. Inter J Comput Sci Appl 3(2)"},{"key":"42_CR16","doi-asserted-by":"crossref","unstructured":"Hammood MM, Yoshigoe K, Sagheer AM (2013) RC4-2S: RC4 stream ciphers with two state tables. In: Proceedings in the 5th FTRA international conference on information technology convergence and services (ITCS\u201913). Lecture notes in electrical engineering, Springer","DOI":"10.1007\/978-94-007-6996-0_2"},{"key":"42_CR17","unstructured":"Roos A (1995) A class of weak keys in the RC4 stream cipher. In: Vironix Soft-ware Laboratories, Westville, South Africa"},{"key":"42_CR18","doi-asserted-by":"crossref","unstructured":"Rukhin A, Soto J, Nechvatal J, Smid M, Barker E, Leigh S, Levenson M, Vangel M, Banks D, Heckert A, Dray J, Vo S (2001) A statistical test suite for random and pseudorandom number generators for cryptographic applications. NIST special publication 800-22, National Institute of Standards and Technology (NIST), Gaithersburg. See http:\/\/csrc.nist.gov\/rng\/","DOI":"10.6028\/NIST.SP.800-22"},{"key":"42_CR19","unstructured":"Stallings W (2011) Cryptography and network security principles and practices, 5th edn. Prentice Hall, Pearson"}],"container-title":["Lecture Notes in Electrical Engineering","Information Technology Convergence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-94-007-6996-0_42","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,11]],"date-time":"2024-05-11T07:07:23Z","timestamp":1715411243000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-94-007-6996-0_42"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9789400769953","9789400769960"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-94-007-6996-0_42","relation":{},"ISSN":["1876-1100","1876-1119"],"issn-type":[{"type":"print","value":"1876-1100"},{"type":"electronic","value":"1876-1119"}],"subject":[],"published":{"date-parts":[[2013]]},"assertion":[{"value":"14 July 2013","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}