{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T13:17:39Z","timestamp":1772111859196,"version":"3.50.1"},"reference-count":26,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2014,12,3]],"date-time":"2014-12-03T00:00:00Z","timestamp":1417564800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cryptogr. Commun."],"published-print":{"date-parts":[[2015,9]]},"DOI":"10.1007\/s12095-014-0119-0","type":"journal-article","created":{"date-parts":[[2014,12,2]],"date-time":"2014-12-02T12:42:54Z","timestamp":1417524174000},"page":"317-330","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["Further non-randomness in RC4, RC4A and VMPC"],"prefix":"10.1007","volume":"7","author":[{"given":"Santanu","family":"Sarkar","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,12,3]]},"reference":[{"key":"119_CR1","unstructured":"AlFardan, N., Bernstein, D., Paterson, K., Poettering, B., Schuldt, J. On the security of RC4 in TLS. Published online at http:\/\/www.isg.rhul.ac.uk\/tls\/"},{"key":"119_CR2","unstructured":"Biham, E., Seberry. Py (Roo), J.: A Fast and Secure Stream Cipher using Rolling Arrays eSTREAM, ECRYPT Stream Cipher Project, Report 2005\/023 (2005)"},{"key":"119_CR3","unstructured":"Biham, E., Seberry, J. : C Code of Py6. eSTREAM, ECRYPT Stream Cipher Project (2005). http:\/\/www.ecrypt.eu.org\/stream\/py.html"},{"key":"119_CR4","doi-asserted-by":"crossref","unstructured":"Fluhrer, S.R., McGrew, D.A.: Statistical Analysis of the Alleged RC4 Keystream Generator In: Proceedings of FSE 2000, LNCS, vol. 1978, pp 19\u201330. Springer (2000)","DOI":"10.1007\/3-540-44706-7_2"},{"key":"119_CR5","doi-asserted-by":"crossref","unstructured":"Gong, G., Gupta, K.C., Hell, M., Nawaz, Y.: Towards a General RC4-Like Keystream Generator In: Proceedings of CISC 2005, LNCS, vol. 3822, pp 162\u2013174. Springer (2005)","DOI":"10.1007\/11599548_14"},{"key":"119_CR6","doi-asserted-by":"crossref","unstructured":"Isobe, T., Ohigashi, T., Watanabe, Y., Morii, M.: Full plaintext recovery attack on broadcast RC4. To appear in proceedings of FSE (2013)","DOI":"10.1007\/978-3-662-43933-3_10"},{"key":"119_CR7","doi-asserted-by":"crossref","unstructured":"Jenkins, R. J. Jr.: ISAAC. In: Proceedings of FSE 1996, LNCS, vol. 1039, pp 41\u201349. Springer (1996)","DOI":"10.1007\/3-540-60865-6_41"},{"key":"119_CR8","doi-asserted-by":"crossref","unstructured":"Keller, N., Miller, S., Mironov, I., Venkatesan, R.: MV3: A New Word Based Stream Cipher Using Rapid Mixing and Revolving Buffers In: Proceedings of CT-RSA 2007, LNCS, vol. 4377, pp 1\u201319 (2007)","DOI":"10.1007\/11967668_1"},{"key":"119_CR9","doi-asserted-by":"crossref","unstructured":"Maitra, S., Paul, G., Sen Gupta, S.: Attack on broadcast RC4 Revisited In: Proceedings of FSE 2011, LNCS, vol. 6733, pp 199\u2013217. Springer (2011)","DOI":"10.1007\/978-3-642-21702-9_12"},{"key":"119_CR10","volume-title":"Analysis of the stream cipher RC4. Master\u2019s thesis","author":"I Mantin","year":"2001","unstructured":"Mantin, I.: Analysis of the stream cipher RC4. Master\u2019s thesis. The Weizmann Institute of Science, Israel (2001)"},{"key":"119_CR11","doi-asserted-by":"crossref","unstructured":"Mantin, I. : Predicting and Distinguishing Attacks on RC4 Keystream Generator In: Proceedings of Eurocrypt 2005, LNCS, vol. 3494, pp 491\u2013506. Springer (2005)","DOI":"10.1007\/11426639_29"},{"key":"119_CR12","doi-asserted-by":"crossref","unstructured":"Mantin, I., Shamir, A.: A Practical Attack on Broadcast RC4 In: Proceedings of FSE 2001, LNCS, vol. 2355, pp 152\u2013164. Springer (2001)","DOI":"10.1007\/3-540-45473-X_13"},{"key":"119_CR13","doi-asserted-by":"crossref","unstructured":"Maximov, A.: Two Linear Distinguishing Attacks on VMPC and RC4A and Weakness of the RC4 Family of Stream Ciphers In: Proceedings of FSE 2005, LNCS, vol. 3557, pp 342\u2013358. Springer (2005)","DOI":"10.1007\/11502760_23"},{"key":"119_CR14","doi-asserted-by":"crossref","unstructured":"Mironov, I.: (Not So) Random Shuffles of RC4 In: Proceedings of Crypto 2002, LNCS, vol. 2442, pp 304\u2013319. Springer (2002)","DOI":"10.1007\/3-540-45708-9_20"},{"key":"119_CR15","doi-asserted-by":"crossref","unstructured":"Ohigashi, T., Isobe, T., Watanabe, Y., Morii, M.: How to Recover Any Byte of Plaintext on RC4. Accepted in SAC (2013)","DOI":"10.1007\/978-3-662-43414-7_8"},{"key":"119_CR16","unstructured":"Nawaz, Y., Gupta, K.C., Gong, G.: A 32-bit RC4-like Keystream Generator. Cryptology ePrint. Archive: 2005\/175"},{"key":"119_CR17","doi-asserted-by":"crossref","unstructured":"Paterson, K., Schuldt, J., Poettering, B.: Plaintext Recovery Attacks Against WPA\/TKIP. Accepted in FSE (2014)","DOI":"10.1007\/978-3-662-46706-0_17"},{"key":"119_CR18","doi-asserted-by":"crossref","unstructured":"Paul, S., Preneel, B.: A New Weakness in the RC4 Keystream Generator and an Approach to Improve the Security of the Cipher In: Proceedings of FSE 2004, LNCS, vol. 3017, pp 245\u2013259. Springer (2004)","DOI":"10.1007\/978-3-540-25937-4_16"},{"key":"119_CR19","doi-asserted-by":"crossref","unstructured":"Paul, S., Preneel, B., Sekar, G.: Distinguishing Attacks on the Stream Cipher Py In: Proceedings of FSE 2006, LNCS, vol. 4047, pp 405\u2013421. Springer (2006)","DOI":"10.1007\/11799313_26"},{"key":"119_CR20","doi-asserted-by":"crossref","unstructured":"Paul, S., Preneel, B.: On the (In)security of Stream Ciphers Based on Arrays and Modular Addition In: Proceedings of Asiacrypt 2006, LNCS, vol. 4284, pp 69\u201373. Springer (2006)","DOI":"10.1007\/11935230_5"},{"key":"119_CR21","unstructured":"Sepehrdad, P.: Statistical and Algebraic Cryptanalysis of Lightweight and Ultra-Lightweight Symmetric Primitives. Ph.D. thesis, \u00c9cole Polytechnique F\u00e9d\u00e9rale de Lausanne (EPFL), 2012. http:\/\/lasecwww.epfl.ch\/~sepehrdad\/Pouyan_Sepehrdad_PhD_Thesis.pdf"},{"key":"119_CR22","doi-asserted-by":"crossref","unstructured":"Sepehrdad, P., Vaudenay, S., Vuagnoux, M.: Discovery and Exploitation of New Biases in RC4 In: Proceedings of SAC 2010, LNCS, vol. 6544, pp 74\u201391. Springer (2010)","DOI":"10.1007\/978-3-642-19574-7_5"},{"key":"119_CR23","doi-asserted-by":"crossref","unstructured":"Sepehrdad, P., Vaudenay, S., Vuagnoux, M.: Statistical Attack on RC4 \u2013 Distinguishing WPA In: Proceedings of EUROCRYPT 2011, LNCS, vol. 6632, pp 343\u2013363. Springer (2011)","DOI":"10.1007\/978-3-642-20465-4_20"},{"key":"119_CR24","unstructured":"Tsunoo, Y., Saito, T., Kubo, H., Shigeri, M., Suzaki, T., Kawabata, T.: The Most Efficient Distinguishing Attack on VMPC and RC4A. In: Proceedings of SKEW (2005)"},{"key":"119_CR25","doi-asserted-by":"crossref","unstructured":"Zoltak, B.: VMPC One-Way Function and Stream Cipher In: Proceedings of FSE 2004, LNCS, vol. 3017, pp 210\u2013225. Springer (2004)","DOI":"10.1007\/978-3-540-25937-4_14"},{"key":"119_CR26","unstructured":"Zoltak, B.: Personal communication"}],"container-title":["Cryptography and Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-014-0119-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s12095-014-0119-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-014-0119-0","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,13]],"date-time":"2025-05-13T22:21:57Z","timestamp":1747174917000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s12095-014-0119-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,12,3]]},"references-count":26,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2015,9]]}},"alternative-id":["119"],"URL":"https:\/\/doi.org\/10.1007\/s12095-014-0119-0","relation":{},"ISSN":["1936-2447","1936-2455"],"issn-type":[{"value":"1936-2447","type":"print"},{"value":"1936-2455","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,12,3]]}}}