陈嘉耕

华中师范大学


Curriculum vitae


[email protected]


QQ: 939288955


计算机学院

伍伦贡联合研究院

湖北省武汉市洪山区珞喻路152号华中师范大学


A New Practical Key Recovery Attack on the Stream Cipher RC4 under Related-Key Model


Conference paper


Jiageng Chen, Atsuko Miyaji
Lecture Notes in Computer Science, Xuejia Lai, Moti Yung, Dongdai Lin, Information Security and Cryptology - 6th International Conference, Inscrypt 2010, Shanghai, China, October 20-24, 2010, Revised Selected Papers, vol. 6584, Springer, 2010, pp. 62--76

Cite

Cite

APA   Click to copy
Chen, J., & Miyaji, A. (2010). A New Practical Key Recovery Attack on the Stream Cipher RC4 under Related-Key Model. In X. Lai, M. Yung, & D. Lin (Eds.), Information Security and Cryptology - 6th International Conference, Inscrypt 2010, Shanghai, China, October 20-24, 2010, Revised Selected Papers (Vol. 6584, pp. 62–76). Springer.


Chicago/Turabian   Click to copy
Chen, Jiageng, and Atsuko Miyaji. “A New Practical Key Recovery Attack on the Stream Cipher RC4 under Related-Key Model.” In Information Security and Cryptology - 6th International Conference, Inscrypt 2010, Shanghai, China, October 20-24, 2010, Revised Selected Papers, edited by Xuejia Lai, Moti Yung, and Dongdai Lin, 6584:62–76. Lecture Notes in Computer Science. Springer, 2010.


MLA   Click to copy
Chen, Jiageng, and Atsuko Miyaji. “A New Practical Key Recovery Attack on the Stream Cipher RC4 under Related-Key Model.” Information Security and Cryptology - 6th International Conference, Inscrypt 2010, Shanghai, China, October 20-24, 2010, Revised Selected Papers, edited by Xuejia Lai et al., vol. 6584, Springer, 2010, pp. 62–76.


BibTeX   Click to copy

@inproceedings{chen2010a,
  title = {A New Practical Key Recovery Attack on the Stream Cipher RC4 under Related-Key Model},
  year = {2010},
  pages = {62--76},
  publisher = {Springer},
  series = {Lecture Notes in Computer Science},
  volume = {6584},
  author = {Chen, Jiageng and Miyaji, Atsuko},
  editor = {Lai, Xuejia and Yung, Moti and Lin, Dongdai},
  booktitle = {Information Security and Cryptology - 6th International Conference, Inscrypt 2010, Shanghai, China, October 20-24, 2010, Revised Selected Papers}
}


Share

Tools
Translate to