{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:28:09Z","timestamp":1767338889819},"reference-count":27,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2009,5,6]],"date-time":"2009-05-06T00:00:00Z","timestamp":1241568000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Cryptogr. Commun."],"published-print":{"date-parts":[[2009,9]]},"DOI":"10.1007\/s12095-009-0012-4","type":"journal-article","created":{"date-parts":[[2009,5,5]],"date-time":"2009-05-05T14:55:36Z","timestamp":1241535336000},"page":"269-282","source":"Crossref","is-referenced-by-count":3,"title":["A new distinguishing and key recovery attack on NGG stream cipher"],"prefix":"10.1007","volume":"1","author":[{"given":"Aleksandar","family":"Kircanski","sequence":"first","affiliation":[]},{"given":"Rabeah","family":"Al-Zaidy","sequence":"additional","affiliation":[]},{"given":"Amr M.","family":"Youssef","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2009,5,6]]},"reference":[{"key":"12_CR1","unstructured":"Bernstein, D.: Which eStream cipher have been broken? ECRYPT report. http:\/\/www.ecrypt.eu.org\/stream\/papersdir\/2008\/010.pdf (2008)"},{"key":"12_CR2","series-title":"LNCS","first-page":"270","volume-title":"Proc. of Fast Software Encryption, FSE 2008","author":"E Biham","year":"2008","unstructured":"Biham, E., Carmeli, Y.: Efficient reconstruction of RC4 keys from internal states. In: Proc. of Fast Software Encryption, FSE 2008. LNCS, vol. 5086, pp. 270\u2013288. Springer, New York (2008)"},{"key":"12_CR3","series-title":"LNCS","first-page":"19","volume-title":"Proc. of Fast Software Encryption, FSE 2000","author":"SR Fluhrer","year":"2000","unstructured":"Fluhrer, S.R., McGrew, D.A.: Statistical analysis of the alleged RC4 keystream generator. In: Proc. of Fast Software Encryption, FSE 2000. LNCS, vol. 1978, pp. 19\u201330. Springer, New York (2000)"},{"key":"12_CR4","series-title":"LNCS","first-page":"1","volume-title":"Proc. of Selected Areas in Cryptography, SAC 2001","author":"SR Fluhrer","year":"2001","unstructured":"Fluhrer, S.R., Mantin, I., Shamir, A.: Weaknesses in the key scheduling algorithm of RC4. In: Proc. of Selected Areas in Cryptography, SAC 2001. LNCS, vol. 2259, pp. 1\u201324. Springer, New York (2001)"},{"key":"12_CR5","series-title":"LNCS","doi-asserted-by":"crossref","first-page":"226","DOI":"10.1007\/3-540-69053-0_16","volume-title":"Proc. of EUROCRYPT \u201997","author":"JD Goli\u0107","year":"1997","unstructured":"Goli\u0107, J.D.: Linear statistical weakness of alleged RC4 keystream generator. In: Proc. of EUROCRYPT \u201997. LNCS, vol. 1233, pp. 226\u2013238. Springer, New York (1997)"},{"key":"12_CR6","series-title":"LNCS","first-page":"162","volume-title":"Proc. of CISC 2005","author":"G Gong","year":"2005","unstructured":"Gong, G., Chand, K., Hell, M., Nawaz, Y.: Towards a general RC4-like keystream generator. In: Proc. of CISC 2005. LNCS, vol. 3822, pp. 162\u2013174. Springer, New York (2005)"},{"key":"12_CR7","unstructured":"Hawkes, P., Rose, G.G.: On the applicability of distinguishing attacks against stream ciphers. In: Proc. of the Third NESSIE Workshop (2002)"},{"key":"12_CR8","unstructured":"Klein, A.: Attacks on the RC4 stream cipher. http:\/\/cage.ugent.be\/~klein\/RC4\/RC4-en.ps"},{"key":"12_CR9","series-title":"LNCS","first-page":"327","volume-title":"Proc. of ASIACRYPT\u201998","author":"LR Knudsen","year":"1998","unstructured":"Knudsen, L.R., Meier, W., Prenel, B., Rijmen, V., Verdoolaege, S.: Analysis methods for (alleged) RC4. In: Proc. of ASIACRYPT\u201998. LNCS, vol. 1514, pp. 327\u2013341. Springer, New York (1998)"},{"key":"12_CR10","series-title":"LNCS","first-page":"152","volume-title":"Proc. of fast software encryption, FSE 2001","author":"I Mantin","year":"2001","unstructured":"Mantin, I., Shamir, A.: A practical attack on broadcast RC4. In: Proc. of fast software encryption, FSE 2001. LNCS, vol. 2355, pp. 152\u2013164. Springer, New York (2001)"},{"key":"12_CR11","series-title":"LNCS","doi-asserted-by":"crossref","first-page":"491","DOI":"10.1007\/11426639_29","volume-title":"Proc. of EUROCRYPT\u2019 2005","author":"I Mantin","year":"2005","unstructured":"Mantin, I.: Predicting and distinguishing attacks on RC4 keystream generator. In: Proc. of EUROCRYPT\u2019 2005. LNCS vol. 3494, pp. 491\u2013506. Springer, New York (2005)"},{"key":"12_CR12","series-title":"LNCS","doi-asserted-by":"crossref","first-page":"395","DOI":"10.1007\/11593447_21","volume-title":"Proc. of ASIACRYPT 2005","author":"I Mantin","year":"2005","unstructured":"Mantin, I.: A practical attack on the fixed RC4 in the WEP mode. In: Proc. of ASIACRYPT 2005. LNCS, vol. 3788, pp. 395\u2013411. Springer, New York (2005)"},{"key":"12_CR13","series-title":"LNCS","first-page":"342","volume-title":"Proc. of Fast Software Encryption, FSE 2005","author":"A Maximov","year":"2005","unstructured":"Maximov, A.: Two linear distinguishing attacks on VMPC and RC4A and weakness of RC4 family of stream ciphers. In: Proc. of Fast Software Encryption, FSE 2005. LNCS, vol. 3357, pp. 342\u2013358. Springer, New York (2005)"},{"key":"12_CR14","series-title":"LNCS","doi-asserted-by":"crossref","first-page":"297","DOI":"10.1007\/978-3-540-85174-5_17","volume-title":"Proc. of CRYPTO 2008","author":"A Maximov","year":"2008","unstructured":"Maximov, A., Khovratovich, D.: New state recovery attack on RC4. In: Proc. of CRYPTO 2008. LNCS, vol. 5157, pp. 297\u2013316. Springer, New York (2008)"},{"key":"12_CR15","doi-asserted-by":"crossref","DOI":"10.1201\/9781439821916","volume-title":"Handbook of Applied Cryptographic Research","author":"AJ Menezes","year":"1996","unstructured":"Menezes, A.J., van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptographic Research. CRC, Boca Raton (1996)"},{"key":"12_CR16","series-title":"LNCS","first-page":"304","volume-title":"Proc. of CRYPTO\u2019 2002","author":"I Mironov","year":"2002","unstructured":"Mironov, I.: Not (So) Random shuffle RC4. In: Proc. of CRYPTO\u2019 2002. LNCS, vol. 2442, pp. 304\u2013319. Springer, New York (2002)"},{"key":"12_CR17","unstructured":"Nawaz, Y., Gupta, K.C., Gong, G.: A 32-bit RC4-like keystream generator. Technical report CACR 2005\u201321, Center for Applied Cryptographic Research, University of Waterloo. http:\/\/www.cacr.math.uwaterloo.ca\/tech_reports.html . Also available at Cryptology ePrint Archive, 2005\u2013175, http:\/\/eprint.iacr.org\/2005\/175 (2005)"},{"key":"12_CR18","series-title":"LNCS","doi-asserted-by":"crossref","first-page":"69","DOI":"10.1007\/11935230_5","volume-title":"Proc. of ASIACRYPT 2006","author":"S Paul","year":"2006","unstructured":"Paul, S., Preenel, B.: On the (In)security of stream ciphers based on arrays and modular addition. In: Proc. of ASIACRYPT 2006. LNCS, vol. 4284, pp. 69\u201383. Springer, New York (2006)"},{"key":"12_CR19","series-title":"LNCS","first-page":"245","volume-title":"Proc. of Fast Software Encryption, FSE 2004","author":"S Paul","year":"2004","unstructured":"Paul, S., Preenel, B.: A new weakness in the RC4 keystream generator and an approach to improve the security of the cipher. In: Proc. of Fast Software Encryption, FSE 2004. LNCS, vol. 3017, pp. 245\u2013259. Springer, New York (2004)"},{"key":"12_CR20","series-title":"LNCS","first-page":"360","volume-title":"Proc. of Selected Areas in Cryptography, SAC 2007","author":"G Paul","year":"2007","unstructured":"Paul, G., Maitra, S.: Permutation after RC4 key scheduling reveals the secret key. In: Proc. of Selected Areas in Cryptography, SAC 2007. LNCS, vol. 4876, pp. 360\u2013377. Springer, New York (2007)"},{"key":"12_CR21","series-title":"LNCS","first-page":"245","volume-title":"Proc. of Fast Software Encryption, FSE 2004","author":"S Paul","year":"2004","unstructured":"Paul, S., Preneel, B.: A new weakness in RC4 keystream generator and an approach to improve the security of the cipher. In: Proc. of Fast Software Encryption, FSE 2004. LNCS, vol. 3017, pp. 245\u2013259. Springer, New York (2004)"},{"key":"12_CR22","doi-asserted-by":"crossref","unstructured":"Tews, E., Weinmann, R.P., Pyshkin, A.: Breaking of 104 bit WEP in less than 60 seconds. http:\/\/eprint.iacr.org\/2007\/120.pdf (2007)","DOI":"10.1007\/978-3-540-77535-5_14"},{"issue":"7","key":"12_CR23","first-page":"1715","volume":"177","author":"V Toma\u0161evi\u0107","year":"2007","unstructured":"Toma\u0161evi\u0107 , V., Bojani\u0107, S., Nieto-Taladriz, O.: Finding an internal state of RC4 stream cipher. Inf. Sci. Int. J. 177(7), 1715\u20131727 (2007)","journal-title":"Inf. Sci. Int. J."},{"key":"12_CR24","doi-asserted-by":"crossref","unstructured":"Tsunoo, Y., Saito, T., Kubo, H., Suzaki, T.: A distinguishing attack on a fast software-implemented RC4-like stream cipher. IEEE Trans. Inf. Theory 53(9) (2007)","DOI":"10.1109\/TIT.2007.903136"},{"key":"12_CR25","series-title":"LNCS","first-page":"344","volume-title":"Proc. of Selected Areas in Cryptography, SAC 2007","author":"S Vaudenay","year":"2007","unstructured":"Vaudenay, S., Vuagnoux, M.: Passive-only key recovery attacks on RC4. In: Proc. of Selected Areas in Cryptography, SAC 2007. LNCS, vol. 4876, pp. 344\u2013359. Springer, New York (2007)"},{"key":"12_CR26","unstructured":"Wu, H.: Cryptanalysis of a 32-bit RC4-like stream cipher, Cryptology ePrint archive, 2005\u2013219, IACR. eprint.iacr.org\/2005\/219.pdf (2005)"},{"key":"12_CR27","series-title":"LNCS","first-page":"210","volume-title":"Proc. of Fast Software Encryption, FSE 2004","author":"B Zoltak","year":"2004","unstructured":"Zoltak, B.: VMPC one-way function and stream cipher. In: Proc. of Fast Software Encryption, FSE 2004. LNCS, vol. 3017, pp. 210\u2013225. Springer, New York (2004)"}],"container-title":["Cryptography and Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-009-0012-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s12095-009-0012-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-009-0012-4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,4]],"date-time":"2021-10-04T23:51:19Z","timestamp":1633391479000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s12095-009-0012-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,5,6]]},"references-count":27,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2009,9]]}},"alternative-id":["12"],"URL":"https:\/\/doi.org\/10.1007\/s12095-009-0012-4","relation":{},"ISSN":["1936-2447","1936-2455"],"issn-type":[{"value":"1936-2447","type":"print"},{"value":"1936-2455","type":"electronic"}],"subject":[],"published":{"date-parts":[[2009,5,6]]}}}