000 01609cam a2200361Ii 4500
001 9780429103728
008 180331s2012 flua ob 001 0 eng d
020 _a9780429103728
_q(e-book : PDF)
020 _z9781439831359
_q(hardback)
024 7 _a10.1201/b11310
_2doi
035 _a(OCoLC)768411334
040 _aFlBoTFG
_cFlBoTFG
_erda
050 4 _aQA76.9.A25
_bP385 2012
082 0 4 _a005.8
_bP324
100 1 _aPaul, Goutam.,
_eauthor.
_915314
245 1 0 _aRC4 stream cipher and its variants /
_cGoutam Paul, Subhamoy Maitra.
264 1 _aBoca Raton, Fla. :
_bCRC Press,
_c2012.
300 _a1 online resource (xxv, 285 pages)
336 _atext
_2rdacontent
337 _acomputer
_2rdamedia
338 _aonline resource
_2rdacarrier
490 1 _aDiscrete mathematics and its applications
505 0 _a1. Introduction to cryptology -- 2. Stream ciphers and RC4 -- 3. Analysis of key scheduling -- 4. Key recovery from state information -- 5. Analysis of keystream generation -- 6. Distinguishing attacks -- 7. WEP and WPA attacks -- 8. Fault attacks -- 9. Variants of RC4 -- 10. Stream cipher HC-128 -- 11. Conclusion.
650 0 _aStream ciphers.
_915315
650 0 _aComputer security.
_93970
650 0 _aInternet
_xSecurity measures.
_97338
650 0 _aData encryption (Computer science)
_99168
700 1 _aMaitra, Subhamoy,
_d1970-
_915316
776 0 8 _iPrint version:
_z9781439831359
_w(DLC) 2011039582
830 0 _aDiscrete mathematics and its applications.
_911386
856 4 0 _uhttps://www.taylorfrancis.com/books/9781439831373
_zClick here to view.
942 _cEBK
999 _c70944
_d70944