›› 2012, Vol. 42 ›› Issue (05): 1231-1236.
Previous Articles Next Articles
HU Liang1, CHI Ling1, YUAN Wei2, CHU Jian-feng2, XU Xiao-bo2
CLC Number:
| [1] Rivest R L. The RC4 encryption algorithm[Z]. RSA Data Security, Inc, 992. [2] Forouzan Behrouz A. Cryptography and Network Security[M]. NewYork: McFraw-Hill, 2008. [3] 谷利泽,郑世慧,杨义先. 现代密码学教程[M]. 北京:北京邮电大学出版社,2009. [4] Hoch Jonathan J, Shamir Adi. Fault analysis of stream ciphers//CHES 2004.Berlin:Springer-Velag, 2004. [5] 杜育松,沈静. 对RC4算法的故障引入攻击研究[J]. 电子科技大学学报,2009,38(2):253-257. Du Yu-song, Shen Jing. Research on fault induction attack on RC4 algorithm[J]. Journal of University of Electronic Science and Technology of China, 2009, 38(2): 253-257. [6] Miyaji A, Sukegawa M. New analysis based on correlations of RC4 PRGA with nonzero-bit differences[J]. IEICE Transactions on Fundamentals of Electronic Communications and Computer Sciences, 2010, E93A(6): 1066-1077. [7] Sichani M H, Movaghar A. A new analysis of RC4 a data mining approach(J48)//Proceesdings of the International Conference on Security and Cryptography, Portugal 2009. [8] Biham E, Granboulan L, Nguyen P Q. Impossible fault analysis of RC4 and differential fault analysis of RC4//FSE 2005, Berlin,Germany: Springer-Verlag, 2005. [9] Chen J G, Miyaji A. Generalized RC4 key collisions and hash collisions[J]. Lecture Notes in Computer Science, 2010, 6280:73-87. [10] Chen J G, Miyaji A. New class of RC4 colliding key pairs with greater hamming distance[J]. Lecture Notes in Computer Science, 2010, 6047: 30-44. [11] Matsui M. Key collisions of the RC4 stream cipher[J]. Lecture Notes in Computer Science, 2009, 5665: 38-50. |
| [1] | ZHAO Bo, QIN Gui-He, ZHAO Yong-Zhe, YANG Wen-Di. Public key cryptosystem based on semi-trapdoor one-way function [J]. 吉林大学学报(工学版), 2018, 48(1): 259-267. |
| [2] | YU Bin-bin, WU Xin-yu, CHU Jian-feng, HU Liang. Signature protocol for wireless sensor network based on group key agreement [J]. 吉林大学学报(工学版), 2017, 47(3): 924-929. |
| [3] | WEI Xiao-hui, LI Xiang, LI Hong-liang, LI Cong, ZHUANG Yuan, YU Hong-mei. Flexible Online MapReduce model and topology protocols supporting large-scale stream data processing [J]. 吉林大学学报(工学版), 2016, 46(4): 1222-1231. |
| [4] | CHE Xiang-jiu, LIANG Sen. Improved algorithm of SPIHT based on Max-Heap tree [J]. 吉林大学学报(工学版), 2016, 46(3): 865-869. |
| [5] | FU Shuai, MA Jian-feng, LI Hong-tao, WANG Chang-guang. Improved data aggregation algorithm based on clustered wireless sensor network [J]. 吉林大学学报(工学版), 2014, 44(4): 1118-1125. |
| [6] | LIU San-min, SUN Zhi-xin. P2P traffic identification based on support vector data description [J]. , 2012, 42(04): 947-951. |
| [7] | ZHANG Rui-Hua, CHENG He-You, JIA Zhi-Beng. Energyefficient clustering algorithm for wireless sensor networks [J]. 吉林大学学报(工学版), 2010, 40(06): 1663-1667. |
| [8] | LIU Yan-Hang, SUN Xin, WANG Jian, LI Wei-Ping, ZHU Jian-Qi. Emailworm propagation with user behavior and network topology [J]. 吉林大学学报(工学版), 2010, 40(06): 1655-1662. |
| [9] | WEI Da, Gu-Xiang-Peng, WANG Jian, Liu-Yan-Hang. New access model and implementation of trusted network based on trusted certificate [J]. 吉林大学学报(工学版), 2010, 40(02): 496-0500. |
| [10] | LIU Yan-Heng, SUN Lei, TIAN Da-Xin, WU Jing. Method of anomaly detection based on fusion principal components match [J]. 吉林大学学报(工学版), 2009, 39(05): 1314-1320. |
| [11] | WANG Xiao-yan,LIU Shu-fen,YU Hai . Interface automata based approach to Web service composition [J]. 吉林大学学报(工学版), 2009, 39(03): 743-0748. |
| [12] |
MEI Fang,LIU Yan-heng,ZHANG Xu-li,Gu Tian-ye,WANG Wang .
Dynamic conflict resolution mechanism for resource management policy in mobile network [J]. 吉林大学学报(工学版), 2009, 39(02): 430-0435. |
| [13] | SUN Zhi-xin, YANG Xi, GONG Jing . New P2P architecture description language [J]. 吉林大学学报(工学版), 2008, 38(05): 1131-1135. |
| [14] | Yang Chao,Cao Chun-jie,Wang Wei,Ma Jian-feng . New authentication protocol of roaming for wireless mesh network [J]. 吉林大学学报(工学版), 2008, 38(02): 423-0428. |
| [15] | Hu De-bin,Wang Jin-ling,Yu Meng-tao,Lin Yu,Hu Liang . ID alias IBE scheme with a trusted third party [J]. 吉林大学学报(工学版), 2008, 38(02): 419-0422. |
|
||