Author of the publication

Dependence in IV-Related Bytes of RC4 Key Enhances Vulnerabilities in WPA.

, , , , and . FSE, volume 8540 of Lecture Notes in Computer Science, page 350-369. Springer, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Error Correction of Partially Exposed RSA Private Keys from MSB Side., , and . ICISS, volume 8303 of Lecture Notes in Computer Science, page 345-359. Springer, (2013)(Non-)Random Sequences from (Non-)Random Permutations - Analysis of RC4 Stream Cipher., , , and . J. Cryptology, 27 (1): 67-108 (2014)Security is an Architectural Design Constraint., , , , , and . IACR Cryptology ePrint Archive, (2019)Improving Speed of Dilithium's Signing Procedure., , , and . IACR Cryptology ePrint Archive, (2019)Proving TLS-attack related open biases of RC4., , , and . Des. Codes Cryptogr., 77 (1): 231-253 (2015)High-Performance Hardware Implementation for RC4 Stream Cipher., , , , and . IEEE Trans. Computers, 62 (4): 730-743 (2013)HiPAcc-LTE: An Integrated High Performance Accelerator for 3GPP LTE Stream Ciphers., , and . INDOCRYPT, volume 7107 of Lecture Notes in Computer Science, page 196-215. Springer, (2011)One Byte per Clock: A Novel RC4 Hardware., , , and . INDOCRYPT, volume 6498 of Lecture Notes in Computer Science, page 347-363. Springer, (2010)Automating ETL and Mining of Ethereum Blockchain Network., , and . WSDM, page 1581-1584. ACM, (2022)Distinguishing WPA., , and . IACR Cryptology ePrint Archive, (2013)