{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T12:49:11Z","timestamp":1759063751639,"version":"3.37.3"},"reference-count":12,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2017,3,28]],"date-time":"2017-03-28T00:00:00Z","timestamp":1490659200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100000266","name":"Engineering and Physical Sciences Research Council","doi-asserted-by":"publisher","award":["EP\/H005455\/1;","EP\/K035584\/1"],"award-info":[{"award-number":["EP\/H005455\/1;","EP\/K035584\/1"]}],"id":[{"id":"10.13039\/501100000266","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003816","name":"Huawei Technologies","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100003816","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Des. Codes Cryptogr."],"published-print":{"date-parts":[[2018,4]]},"DOI":"10.1007\/s10623-017-0355-3","type":"journal-article","created":{"date-parts":[[2017,3,28]],"date-time":"2017-03-28T03:28:23Z","timestamp":1490671703000},"page":"743-770","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["Analysing and exploiting the Mantin biases in RC4"],"prefix":"10.1007","volume":"86","author":[{"given":"Remi","family":"Bricout","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Sean","family":"Murphy","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Kenneth G.","family":"Paterson","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Thyla","family":"van der Merwe","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2017,3,28]]},"reference":[{"key":"355_CR1","unstructured":"AlFardan N.J., Bernstein D.J., Paterson K.G., Poettering B., Schuldt J.C.N.: On the Security of RC4 in TLS. In: Proceedings of the 22nd USENIX Conference on Security, SEC\u201913, pp. 305\u2013320. USENIX Association, Berkeley, CA, USA (2013). \n                        http:\/\/dl.acm.org\/citation.cfm?id=2534766.2534793"},{"key":"355_CR2","doi-asserted-by":"crossref","unstructured":"Arnold B., Balakrishnan N., Nagaraja H.: A first course in order statistics. SIAM (2008)","DOI":"10.1137\/1.9780898719062"},{"key":"355_CR3","unstructured":"Fluhrer S.R., McGrew D.: Statistical analysis of the alleged RC4 keystream generator. In: Schneier B. (ed.) FSE. Lecture Notes in Computer Science, vol. 1978, pp. 19\u201330. Springer, New York (2000)."},{"key":"355_CR4","unstructured":"Garman C., Paterson K.G., van\u00a0der Merwe T.: Attacks only get better: Password recovery attacks against RC4 in TLS. In: USENIX Security Symposium (2015). \n                        http:\/\/www.isg.rhul.ac.uk\/tls\/RC4mustdie.html"},{"key":"355_CR5","doi-asserted-by":"publisher","unstructured":"Isobe T., Ohigashi T., Watanabe Y., Morii M.: Full plaintext recovery attack on broadcast RC4. In: S.\u00a0Moriai (ed.) Fast Software Encryption - 20th International Workshop, FSE 2013, Singapore, March 11-13, 2013. Revised Selected Papers. Lecture Notes in Computer Science, vol. 8424, pp. 179\u2013202. Springer (2013). doi:\n                        10.1007\/978-3-662-43933-3_10\n                        \n                    .","DOI":"10.1007\/978-3-662-43933-3_10"},{"key":"355_CR6","doi-asserted-by":"crossref","unstructured":"Mantin I.: Predicting and distinguishing attacks on RC4 keystream generator. In: Cramer R. (ed.) EUROCRYPT. Lecture Notes in Computer Science, vol. 3494, pp. 491\u2013506. Springer, Heidelberg (2005).","DOI":"10.1007\/11426639_29"},{"key":"355_CR7","doi-asserted-by":"publisher","unstructured":"Ohigashi T., Isobe T., Watanabe Y., Morii M.: How to recover any byte of plaintext on RC4. In: Lange, T., Lauter, K.E., Lisonek, P. (eds.) Selected Areas in Cryptography-SAC 2013-20th International Conference, Burnaby, BC, Canada, August 14-16, 2013, Revised Selected Papers. Lecture Notes in Computer Science, vol. 8282, pp. 155\u2013173. Springer, Berlin (2013). doi:\n                        10.1007\/978-3-662-43414-7_8\n                        \n                    .","DOI":"10.1007\/978-3-662-43414-7_8"},{"key":"355_CR8","doi-asserted-by":"publisher","unstructured":"Paterson K.G., Poettering B., Schuldt J.C.N.: Big bias hunting in Amazonia: Large-scale computation and exploitation of RC4 biases (invited paper). In: Sarkar, P., Iwata, T. (eds.) Advances in Cryptology - ASIACRYPT 2014 - 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, R.O.C., December 7-11, 2014. Proceedings, Part I, Lecture Notes in Computer Science, vol. 8873, pp. 398\u2013419. Springer, Berlin (2014). doi:\n                        10.1007\/978-3-662-45611-8_21\n                        \n                    .","DOI":"10.1007\/978-3-662-45611-8_21"},{"key":"355_CR9","doi-asserted-by":"publisher","unstructured":"Paterson K.G., Poettering B., Schuldt J.C.N.: Plaintext recovery attacks against WPA\/TKIP. In: Cid, C., Rechberger, C. (eds.) Fast Software Encryption - 21st International Workshop, FSE 2014, London, UK, March 3-5, 2014. Revised Selected Papers. Lecture Notes in Computer Science, vol. 8540, pp. 325\u2013349. Springer, Berlin (2014). doi:\n                        10.1007\/978-3-662-46706-0_17\n                        \n                    .","DOI":"10.1007\/978-3-662-46706-0_17"},{"key":"355_CR10","doi-asserted-by":"publisher","unstructured":"Paterson K.G., Strefler M.: A practical attack against the use of RC4 in the HIVE hidden volume encryption system. In: Bao, F., Miller, S., Zhou, J., Ahn, G. (eds.) Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security, ASIA CCS \u201915, Singapore, April 14-17, 2015, pp. 475\u2013482. ACM (2015). doi:\n                        10.1145\/2714576.2714596\n                        \n                    .","DOI":"10.1145\/2714576.2714596"},{"issue":"234","key":"355_CR11","doi-asserted-by":"publisher","first-page":"313","DOI":"10.1109\/TCOMM.1994.577040","volume":"42","author":"N Seshadri","year":"1994","unstructured":"Seshadri N., Sundberg C.W.: List Viterbi decoding algorithms with applications. IEEE Trans. Commun. 42(234), 313\u2013323 (1994). doi:\n                        10.1109\/TCOMM.1994.577040\n                        \n                    .","journal-title":"IEEE Trans. Commun."},{"key":"355_CR12","unstructured":"Vanhoef M., Piessens F.: All your biases belong to us: Breaking RC4 in WPA-TKIP and TLS. In: USENIX Security Symposium (2015). \n                        http:\/\/www.rc4nomore.com\/vanhoef-usenix2015.pdf"}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10623-017-0355-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-017-0355-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-017-0355-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,3,3]],"date-time":"2018-03-03T04:27:00Z","timestamp":1520051220000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10623-017-0355-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,3,28]]},"references-count":12,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2018,4]]}},"alternative-id":["355"],"URL":"https:\/\/doi.org\/10.1007\/s10623-017-0355-3","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"type":"print","value":"0925-1022"},{"type":"electronic","value":"1573-7586"}],"subject":[],"published":{"date-parts":[[2017,3,28]]}}}