{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,31]],"date-time":"2025-05-31T05:07:58Z","timestamp":1748668078951,"version":"3.37.3"},"reference-count":34,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2019]]},"DOI":"10.1109\/access.2019.2956160","type":"journal-article","created":{"date-parts":[[2019,11,27]],"date-time":"2019-11-27T22:15:34Z","timestamp":1574892934000},"page":"172045-172054","source":"Crossref","is-referenced-by-count":14,"title":["MRC4: A Modified RC4 Algorithm Using Symmetric Random Function Generator for Improved Cryptographic Features"],"prefix":"10.1109","volume":"7","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3921-9512","authenticated-orcid":false,"given":"Rahul","family":"Saha","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7338-973X","authenticated-orcid":false,"given":"G.","family":"Geetha","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0026-149X","authenticated-orcid":false,"given":"Gulshan","family":"Kumar","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0117-8102","authenticated-orcid":false,"given":"Tai-Hoon","family":"Kim","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0809-3523","authenticated-orcid":false,"given":"William J.","family":"Buchanan","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","first-page":"27","article-title":"Analysis of RC4 and proposal of additional layers for better security margin","volume":"5365","author":"maitra","year":"2008","journal-title":"Progress in Cryptology"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-25937-4_14"},{"journal-title":"Wireless Cryptography and Stream Ciphers","year":"2017","author":"buchanan","key":"ref31"},{"key":"ref30","first-page":"187","article-title":"Lightweight cryptography methods","volume":"1","author":"buchanan","year":"2017","journal-title":"Security Journal"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ICRAIE.2014.6909247"},{"key":"ref10","first-page":"1","article-title":"Weaknesses in the key scheduling algorithm of RC4","author":"fluhrer","year":"2001","journal-title":"Proc Int Workshop Sel Areas Cryptogr"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"245","DOI":"10.1007\/978-3-540-25937-4_16","article-title":"A new weakness in the RC4 keystream generator and an approach to improve the security of the cipher","volume":"3017","author":"paul","year":"2004","journal-title":"Fast Software Encryption"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2006.10.010"},{"article-title":"Differential cryptanalysis of stream ciphers","year":"2007","author":"biham","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-77360-3_23"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03317-9_3"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.camwa.2012.09.013"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/2523514.2523615"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipl.2014.01.002"},{"key":"ref19","first-page":"v7-156","article-title":"An improved RC4 stream cipher","author":"xie","year":"2010","journal-title":"Proc Int Conf Comput Appl Syst Modeling (ICCASM)"},{"key":"ref28","article-title":"A mathematical theory of cryptography","author":"shannon","year":"1945","journal-title":"Bell Syst Tech"},{"journal-title":"Industrial IoT Technologies and Applications Second EAI International Conference Industrial IoT 2017 Wuhu China March 25&#x2013;26 2017 Proceedings","year":"2017","author":"chen","key":"ref4"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/s12095-012-0069-3"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TASE.2015.2511301"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2017.08.020"},{"key":"ref29","first-page":"511","article-title":"State of the art in lightweight symmetric cryptography","volume":"2017","author":"biryukov","year":"2017","journal-title":"IACR Cryptology ePrint"},{"journal-title":"Cryptographic Boolean functions and Applications","year":"2009","author":"cusick","key":"ref5"},{"article-title":"A related-key cryptanalysis of RC4","year":"2000","author":"grosul","key":"ref8"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"697","DOI":"10.1016\/j.procs.2015.02.129","article-title":"RC4 encryption-a literature survey","volume":"46","author":"jindal","year":"2015","journal-title":"Procedia Comput Sci"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/LES.2016.2630729"},{"key":"ref9","first-page":"19","article-title":"Statistical analysis of the alleged RC4 keystream generator","author":"fluhrer","year":"2000","journal-title":"Fast Software Encryption"},{"journal-title":"Security and Cryptography for Networks","year":"2006","author":"stallings","key":"ref1"},{"key":"ref20","first-page":"2278","article-title":"Robustness of RC4 against differential attack","volume":"14","author":"kamble","year":"2012","journal-title":"Int J Adv Res Comput Eng Technol"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-016-3603-3"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ICIInfS.2013.6731957"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.5815\/ijcnis.2016.12.01"},{"key":"ref23","first-page":"74","article-title":"A proposal to improve RC4 algorithm based on hybrid chaotic maps","volume":"6","author":"sadiq","year":"2016","journal-title":"Journal of Advanced Computer Science and Technology Research"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-007-9013-7"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-2738-3_25"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/8600701\/08915779.pdf?arnumber=8915779","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,27]],"date-time":"2022-01-27T01:31:57Z","timestamp":1643247117000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8915779\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"references-count":34,"URL":"https:\/\/doi.org\/10.1109\/access.2019.2956160","relation":{},"ISSN":["2169-3536"],"issn-type":[{"type":"electronic","value":"2169-3536"}],"subject":[],"published":{"date-parts":[[2019]]}}}