{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,9]],"date-time":"2026-01-09T03:29:52Z","timestamp":1767929392659,"version":"3.49.0"},"reference-count":26,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1109\/igcc.2016.7892594","type":"proceedings-article","created":{"date-parts":[[2017,4,7]],"date-time":"2017-04-07T03:56:23Z","timestamp":1491537383000},"page":"1-6","source":"Crossref","is-referenced-by-count":2,"title":["GB-RC4: Effective brute force attacks on RC4 algorithm using GPU"],"prefix":"10.1109","author":[{"family":"Pei Xue","sequence":"first","affiliation":[]},{"family":"Tao Li","sequence":"additional","affiliation":[]},{"family":"Han Dong","sequence":"additional","affiliation":[]},{"family":"Chunbo Liu","sequence":"additional","affiliation":[]},{"given":"Wenjing","family":"Ma","sequence":"additional","affiliation":[]},{"family":"Songwen Pei","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-44491-7_13"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/NAS.2015.7255234"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/PDP.2016.29"},{"key":"ref13","first-page":"2289","article-title":"Hardware implementation of the improved WEP and RC4 encryption algorithms for wireless terminals","year":"2000","journal-title":"Proc Eur Signal Processing Conf"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"1363","DOI":"10.1109\/MWSCAS.2003.1562548","article-title":"Hardware implementation of the RC4stream cipher","author":"kitsos","year":"2003","journal-title":"Proc IEEE Midwest Symp Circuits and Syst"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"333","DOI":"10.1109\/DNSR.2004.1344747","article-title":"The effectiveness of bruteforce attacks on RC4","author":"couture","year":"2004","journal-title":"Proc 2nd Annu Conf Communication Networks and Services Research (CNSR 04)"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/FPGA.2002.1106657"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2008.2000670"},{"key":"ref18","first-page":"15","article-title":"The violent crack of RC4 encryption algorithm based on distributed computing [J]","volume":"30","author":"zhang","year":"2008","journal-title":"Computer Engineering and Science"},{"key":"ref19","article-title":"Study of Brute Force for RC4 Algorithm Based on GPU[J]","volume":"1","author":"chao","year":"2012","journal-title":"Journal of Computer Technology and Education"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-007-6996-0_2"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICIInfS.2013.6731957"},{"key":"ref6","article-title":"WEP Implimentation using Linear Feedback Shift Register(LFSR) and Dynamic key[C]","author":"gupta","year":"2011","journal-title":"Int Conf on Computer Communi"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSN.2010.113"},{"key":"ref8","first-page":"60","article-title":"Research on The Application of the General Calculation of GPU","volume":"33","author":"zhang","year":"2005","journal-title":"Computer and Digital Engineering"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/IMCCC.2012.379"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-81-322-2250-7_25"},{"key":"ref9","year":"0","journal-title":"NVidia CUDA"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ICGCIoT.2015.7380693"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/DATE.2002.998307"},{"key":"ref22","article-title":"Analysis of the security of wireless local area network protocol [J]","volume":"7","author":"hong","year":"2003","journal-title":"Electronic Journal"},{"key":"ref21","first-page":"156","article-title":"An Improved RC4 Stream Cipher","author":"xie","year":"2010","journal-title":"2010 International Conference on Computer Application and System Modeling (ICCASM 2010)"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2012.19"},{"key":"ref23","article-title":"Different attacks on the RC4 stream cipher. Lecture Notes","author":"klein","year":"0","journal-title":"Department of Pure Mathematics and Computer Algebra Ghent University Belgium"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ICPPW.2014.60"},{"key":"ref25","article-title":"Statistical analysis of the alleged rc4 key stream generator","year":"2000","journal-title":"Fast Software Encryption FSE 94"}],"event":{"name":"2016 Seventh International Green and Sustainable Computing Conference (IGSC)","location":"Hangzhou, China","start":{"date-parts":[[2016,11,7]]},"end":{"date-parts":[[2016,11,9]]}},"container-title":["2016 Seventh International Green and Sustainable Computing Conference (IGSC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7888616\/7892581\/07892594.pdf?arnumber=7892594","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,5]],"date-time":"2020-10-05T03:47:36Z","timestamp":1601869656000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7892594\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/igcc.2016.7892594","relation":{},"subject":[],"published":{"date-parts":[[2016]]}}}