Cargando…
RC4 stream cipher and its variants
This book is the first comprehensive volume on RC4, the most popular and widely deployed state-of-the-art software stream cipher algorithm. After the basic fundamentals of cryptography, the text provides substantial coverage of stream ciphers in general. Other topics covered include key scheduling,...
Autores principales: | , |
---|---|
Lenguaje: | eng |
Publicado: |
CRC Press
2011
|
Materias: | |
Acceso en línea: | http://cds.cern.ch/record/1486280 |
_version_ | 1780926120400519168 |
---|---|
author | Paul, Goutam Maitra, Subhamoy |
author_facet | Paul, Goutam Maitra, Subhamoy |
author_sort | Paul, Goutam |
collection | CERN |
description | This book is the first comprehensive volume on RC4, the most popular and widely deployed state-of-the-art software stream cipher algorithm. After the basic fundamentals of cryptography, the text provides substantial coverage of stream ciphers in general. Other topics covered include key scheduling, key recovery, WEP attacks, and keystream generation. The book also explores both LFSR and non-LFSR-based hardware stream ciphers as well as software stream ciphers. The techniques and analysis presented can be applied to many RC4-like stream ciphers that are based on arrays and modular addition. The |
id | cern-1486280 |
institution | Organización Europea para la Investigación Nuclear |
language | eng |
publishDate | 2011 |
publisher | CRC Press |
record_format | invenio |
spelling | cern-14862802020-07-16T20:01:51Zhttp://cds.cern.ch/record/1486280engPaul, GoutamMaitra, SubhamoyRC4 stream cipher and its variantsComputing and ComputersThis book is the first comprehensive volume on RC4, the most popular and widely deployed state-of-the-art software stream cipher algorithm. After the basic fundamentals of cryptography, the text provides substantial coverage of stream ciphers in general. Other topics covered include key scheduling, key recovery, WEP attacks, and keystream generation. The book also explores both LFSR and non-LFSR-based hardware stream ciphers as well as software stream ciphers. The techniques and analysis presented can be applied to many RC4-like stream ciphers that are based on arrays and modular addition. TheCRC Pressoai:cds.cern.ch:14862802011 |
spellingShingle | Computing and Computers Paul, Goutam Maitra, Subhamoy RC4 stream cipher and its variants |
title | RC4 stream cipher and its variants |
title_full | RC4 stream cipher and its variants |
title_fullStr | RC4 stream cipher and its variants |
title_full_unstemmed | RC4 stream cipher and its variants |
title_short | RC4 stream cipher and its variants |
title_sort | rc4 stream cipher and its variants |
topic | Computing and Computers |
url | http://cds.cern.ch/record/1486280 |
work_keys_str_mv | AT paulgoutam rc4streamcipheranditsvariants AT maitrasubhamoy rc4streamcipheranditsvariants |