全部文献期刊会议图书|学者科研项目
中外文文献  中文文献  外文文献
作者:Xiaoqun Zeng , Qing Pan , Yuxing Guo ...
来源:[J].Journal of Proteomics(IF 4.088), 2018
摘要:... To investigate the mechanism of nitrite degradation by lactic acid bacteria, Lactobacillus fermentum RC4 were grown in broth containing NaNO 2 at 0, 100, 300, or 500 mg/L, and 8-plex iTRAQ proteomics and bioinformatics analysis were employed to explore protein expression patt...
作者:Jiageng Chen , Atsuko Miyaji
来源:[J].Computers and Mathematics with Applications(IF 2.069), 2013, Vol.66 (1), pp.81-90
摘要:Abstract(#br)The property that the stream cipher RC4 can generate the same keystream outputs under two different secret keys has been discovered recently. The principle of how the two different keys can achieve a collision has been studied in the previous researches by investigat...
作者:Rastislav Róka
来源:[J].Journal of Electrical Engineering, 2019, Vol.70 (1), pp.25-31
摘要:... This contribution shortly discusses theoretical characteristics of the RC4 reference channel. A main part is focused on the network throughput and on the interphase PLC signal liaising presented in the RC4 reference channel for higher frequencies than 10 MHz. For evaluation o...
作者:Santanu Sarkar
来源:[J].Information Processing Letters(IF 0.488), 2014, Vol.114 (5), pp.234-238
摘要:Abstract(#br)In view of the recent attacks on practical network protocols like WEP, WPA and TLS, there has been a renewed interest in the non-random behavior of RC4, the stream cipher that constitutes the core of all these protocols. While most of the non-random events in the ci...
作者:Violeta Tomašević , Slobodan Bojanić , Octavio Nieto-Taladriz
来源:[J].Information Sciences(IF 3.643), 2006, Vol.177 (7), pp.1715-1727
摘要:Abstract(#br)The RC4 is a stream cipher widely deployed in software applications due to its simplicity and efficiency. The paper presents a cryptanalytic attack that employs the tree representation of this cipher and introduces an abstraction in the form of general conditions for...
作者:Kenneth G. Paterson , Jacob C. N. Schuldt
来源:[J].Cryptography and Communications, 2018, Vol.10 (5), pp.777-801
摘要:... In particular, the masking methods potentially make it viable to continue to use the RC4 algorithm in SSL/TLS. In this paper, we provide a detailed analysis of TLS Scramble and MCookies when used in conjunction with RC4 in SSL/TLS. We show that, in fact, both are vulnerable t...
作者:Suman Das , Ranjan Ghosh , Rajat Kumar Pal
来源:[J].Sādhanā(IF 0.393), 2019, Vol.44 (11), pp.1-17
摘要:Abstract(#br)Many years of research on the RC4 stream cipher proves it to be strong enough, but there are claims that its swap function is responsible for essential biases in the output. There are suggestions to discard some initial bytes from the key-stream, to get rid of this, ...
作者:Poonam Jindal , Brahmjit Singh
来源:[J].Wireless Personal Communications(IF 0.428), 2017, Vol.92 (3), pp.1221-1250
摘要:Abstract(#br)In this paper, we have investigated different vulnerabilities in RC4 and its enhanced variants to overcome the security attacks. It is established that in spite of several proposals, RC4 is not secure enough and a trade-off is always sought between security and netw...
作者:Goutam Paul , Souvik Ray
来源:[J].Cryptography and Communications, 2018, Vol.10 (5), pp.881-908
摘要:Abstract(#br)The internal state of RC4 stream cipher is a permutation over ℤ N ${\mathbb Z}_{N}$ and its state transition is effectively a transposition or swapping of two elements. How the randomness of RC4 state evolves due to its state transitions has been studied for many ...
作者:Santanu Sarkar , Sourav Sen Gupta , Goutam Paul ...
来源:[J].Designs, Codes and Cryptography(IF 0.779), 2015, Vol.77 (1), pp.231-253
摘要:Abstract(#br)After a series of results on RC4 cryptanalysis in flagship cryptology conferences and journals, one of the most significant recent attacks on the cipher has been the discovery of vulnerabilities in the SSL/TLS protocol, by AlFardan et al. (USENIX 2013 ). Through exte...

我们正在为您处理中,这可能需要一些时间,请稍等。

资源合作:cnki.scholar@cnki.net, +86-10-82896619   意见反馈:scholar@cnki.net

×