Cargando…
Tabla de Contenidos:
  • 1. Introduction to cryptology
  • 2. Stream ciphers and RC4
  • 3. Analysis of key scheduling
  • 4. Key recovery from state information
  • 5. Analysis of keystream generation
  • 6. Distinguishing attacks
  • 7. WEP and WPA attacks
  • 8. Fault attacks
  • 9. Variants of RC4
  • 10. Stream cipher HC-128
  • 11. Conclusion.